repo stringlengths 6 47 | file_url stringlengths 77 269 | file_path stringlengths 5 186 | content stringlengths 0 32.8k | language stringclasses 1
value | license stringclasses 7
values | commit_sha stringlengths 40 40 | retrieved_at stringdate 2026-01-07 08:35:43 2026-01-07 08:55:24 | truncated bool 2
classes |
|---|---|---|---|---|---|---|---|---|
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/pkg/cargo/regenerate_package_index.go | registry/app/api/controller/pkg/cargo/regenerate_package_index.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package cargo
import (
"context"
"fmt"
"github.com/harness/gitness/registry/app/pkg"
"github.com/harness/gitness/registry/app/pkg/base"
"github.com/harness/gitness/registry/app/pkg/cargo"
"github.com/harness/gitness/registry/app/pkg/response"
cargotype "github.com/harness/gitness/registry/app/pkg/types/cargo"
registrytypes "github.com/harness/gitness/registry/types"
)
func (c *controller) RegeneratePackageIndex(
ctx context.Context, info *cargotype.ArtifactInfo,
) (*RegeneratePackageIndexResponse, error) {
f := func(registry registrytypes.Registry, a pkg.Artifact) response.Response {
info.RegIdentifier = registry.Name
info.RegistryID = registry.ID
cargoRegistry, ok := a.(cargo.Registry)
if !ok {
return &RegeneratePackageIndexResponse{
BaseResponse{
Error: fmt.Errorf("invalid registry type: expected cargo.Registry"),
ResponseHeaders: nil,
}, false,
}
}
headers, err := cargoRegistry.RegeneratePackageIndex(ctx, *info)
return &RegeneratePackageIndexResponse{
BaseResponse{
Error: err,
ResponseHeaders: headers,
}, false,
}
}
result, err := base.NoProxyWrapper(ctx, c.registryDao, f, info)
if err != nil {
return &RegeneratePackageIndexResponse{
BaseResponse{
Error: err,
ResponseHeaders: nil,
}, false,
}, err
}
putResponse, ok := result.(*RegeneratePackageIndexResponse)
if !ok {
return &RegeneratePackageIndexResponse{
BaseResponse: BaseResponse{
Error: fmt.Errorf("invalid response type: expected RegeneratePackageIndexResponse"),
ResponseHeaders: nil,
},
Ok: false,
}, fmt.Errorf("invalid response type: expected RegeneratePackageIndexResponse")
}
putResponse.Ok = true
return putResponse, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/pkg/cargo/download_package.go | registry/app/api/controller/pkg/cargo/download_package.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package cargo
import (
"context"
"fmt"
"github.com/harness/gitness/registry/app/pkg"
"github.com/harness/gitness/registry/app/pkg/base"
"github.com/harness/gitness/registry/app/pkg/cargo"
"github.com/harness/gitness/registry/app/pkg/commons"
"github.com/harness/gitness/registry/app/pkg/response"
cargotype "github.com/harness/gitness/registry/app/pkg/types/cargo"
registrytypes "github.com/harness/gitness/registry/types"
)
func (c *controller) DownloadPackage(
ctx context.Context,
info *cargotype.ArtifactInfo,
) *GetPackageResponse {
f := func(registry registrytypes.Registry, a pkg.Artifact) response.Response {
info.UpdateRegistryInfo(registry)
cargoRegistry, ok := a.(cargo.Registry)
if !ok {
return c.getDownloadPackageErrorResponse(
fmt.Errorf("invalid registry type: expected cargo.Registry"),
nil,
)
}
headers, fileReader, readCloser, redirectURL, err := cargoRegistry.DownloadPackage(
ctx, *info,
)
return &GetPackageResponse{
DownloadFileResponse{
BaseResponse: BaseResponse{
err,
headers,
},
RedirectURL: redirectURL,
Body: fileReader,
ReadCloser: readCloser,
},
}
}
result, err := base.ProxyWrapper(ctx, c.registryDao, c.quarantineFinder, f, info, true)
if err != nil {
return c.getDownloadPackageErrorResponse(
err,
nil,
)
}
getResponse, ok := result.(*GetPackageResponse)
if !ok {
return c.getDownloadPackageErrorResponse(
fmt.Errorf("invalid response type: expected GetPackageResponse"),
nil,
)
}
return getResponse
}
func (c *controller) getDownloadPackageErrorResponse(
err error, headers *commons.ResponseHeaders,
) *GetPackageResponse {
return &GetPackageResponse{
DownloadFileResponse{
BaseResponse: BaseResponse{
err,
headers},
RedirectURL: "",
Body: nil,
ReadCloser: nil,
},
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/artifact_repository.go | registry/app/api/controller/mocks/artifact_repository.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
artifact "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
json "encoding/json"
mock "github.com/stretchr/testify/mock"
types "github.com/harness/gitness/registry/types"
)
// ArtifactRepository is an autogenerated mock type for the ArtifactRepository type
type ArtifactRepository struct {
mock.Mock
}
// GetByUUID provides a mock function with given fields: ctx, uuid
func (_m *ArtifactRepository) GetByUUID(ctx context.Context, uuid string) (*types.Artifact, error) {
ret := _m.Called(ctx, uuid)
if len(ret) == 0 {
panic("no return value specified for GetByUUID")
}
var r0 *types.Artifact
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) (*types.Artifact, error)); ok {
return rf(ctx, uuid)
}
if rf, ok := ret.Get(0).(func(context.Context, string) *types.Artifact); ok {
r0 = rf(ctx, uuid)
} else {
r0 = ret.Get(0).(*types.Artifact)
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, uuid)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Get provides a mock function with given fields: ctx, id
func (_m *ArtifactRepository) Get(ctx context.Context, id int64) (*types.Artifact, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for Get")
}
var r0 *types.Artifact
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*types.Artifact, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.Artifact); ok {
r0 = rf(ctx, id)
} else {
r0 = ret.Get(0).(*types.Artifact)
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Count provides a mock function with given fields: ctx
func (_m *ArtifactRepository) Count(ctx context.Context) (int64, error) {
ret := _m.Called(ctx)
if len(ret) == 0 {
panic("no return value specified for Count")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context) (int64, error)); ok {
return rf(ctx)
}
if rf, ok := ret.Get(0).(func(context.Context) int64); ok {
r0 = rf(ctx)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context) error); ok {
r1 = rf(ctx)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountAllArtifactsByParentID provides a mock function with given fields: ctx, parentID, registryIDs, search, latestVersion, packageTypes
func (_m *ArtifactRepository) CountAllArtifactsByParentID(ctx context.Context, parentID int64, registryIDs *[]string, search string, latestVersion bool, packageTypes []string) (int64, error) {
ret := _m.Called(ctx, parentID, registryIDs, search, latestVersion, packageTypes)
if len(ret) == 0 {
panic("no return value specified for CountAllArtifactsByParentID")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, bool, []string) (int64, error)); ok {
return rf(ctx, parentID, registryIDs, search, latestVersion, packageTypes)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, bool, []string) int64); ok {
r0 = rf(ctx, parentID, registryIDs, search, latestVersion, packageTypes)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, int64, *[]string, string, bool, []string) error); ok {
r1 = rf(ctx, parentID, registryIDs, search, latestVersion, packageTypes)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountAllVersionsByRepoAndImage provides a mock function with given fields: ctx, parentID, repoKey, image, search, artifactType
func (_m *ArtifactRepository) CountAllVersionsByRepoAndImage(ctx context.Context, parentID int64, repoKey string, image string, search string, artifactType *artifact.ArtifactType) (int64, error) {
ret := _m.Called(ctx, parentID, repoKey, image, search, artifactType)
if len(ret) == 0 {
panic("no return value specified for CountAllVersionsByRepoAndImage")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string, *artifact.ArtifactType) (int64, error)); ok {
return rf(ctx, parentID, repoKey, image, search, artifactType)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string, *artifact.ArtifactType) int64); ok {
r0 = rf(ctx, parentID, repoKey, image, search, artifactType)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string, string, *artifact.ArtifactType) error); ok {
r1 = rf(ctx, parentID, repoKey, image, search, artifactType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountArtifactsByRepo provides a mock function with given fields: ctx, parentID, repoKey, search, labels, artifactType
func (_m *ArtifactRepository) CountArtifactsByRepo(ctx context.Context, parentID int64, repoKey string, search string, labels []string, artifactType *artifact.ArtifactType) (int64, error) {
ret := _m.Called(ctx, parentID, repoKey, search, labels, artifactType)
if len(ret) == 0 {
panic("no return value specified for CountArtifactsByRepo")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, []string, *artifact.ArtifactType) (int64, error)); ok {
return rf(ctx, parentID, repoKey, search, labels, artifactType)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, []string, *artifact.ArtifactType) int64); ok {
r0 = rf(ctx, parentID, repoKey, search, labels, artifactType)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string, []string, *artifact.ArtifactType) error); ok {
r1 = rf(ctx, parentID, repoKey, search, labels, artifactType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountByImageName provides a mock function with given fields: ctx, regID, name
func (_m *ArtifactRepository) CountByImageName(ctx context.Context, regID int64, name string) (int64, error) {
ret := _m.Called(ctx, regID, name)
if len(ret) == 0 {
panic("no return value specified for CountByImageName")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (int64, error)); ok {
return rf(ctx, regID, name)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) int64); ok {
r0 = rf(ctx, regID, name)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, regID, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountLatestByName provides a mock function with given fields: ctx, regID, name
func (_m *ArtifactRepository) CountLatestByName(ctx context.Context, regID int64, name string) (int64, error) {
ret := _m.Called(ctx, regID, name)
if len(ret) == 0 {
panic("no return value specified for CountLatestByName")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (int64, error)); ok {
return rf(ctx, regID, name)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) int64); ok {
r0 = rf(ctx, regID, name)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, regID, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CreateOrUpdate provides a mock function with given fields: ctx, _a1
func (_m *ArtifactRepository) CreateOrUpdate(ctx context.Context, _a1 *types.Artifact) (int64, error) {
ret := _m.Called(ctx, _a1)
if len(ret) == 0 {
panic("no return value specified for CreateOrUpdate")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Artifact) (int64, error)); ok {
return rf(ctx, _a1)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.Artifact) int64); ok {
r0 = rf(ctx, _a1)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, *types.Artifact) error); ok {
r1 = rf(ctx, _a1)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// DeleteByImageNameAndRegistryID provides a mock function with given fields: ctx, regID, image
func (_m *ArtifactRepository) DeleteByImageNameAndRegistryID(ctx context.Context, regID int64, image string) error {
ret := _m.Called(ctx, regID, image)
if len(ret) == 0 {
panic("no return value specified for DeleteByImageNameAndRegistryID")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) error); ok {
r0 = rf(ctx, regID, image)
} else {
r0 = ret.Error(0)
}
return r0
}
// DeleteByVersionAndImageName provides a mock function with given fields: ctx, image, version, regID
func (_m *ArtifactRepository) DeleteByVersionAndImageName(ctx context.Context, image string, version string, regID int64) error {
ret := _m.Called(ctx, image, version, regID)
if len(ret) == 0 {
panic("no return value specified for DeleteByVersionAndImageName")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, string, string, int64) error); ok {
r0 = rf(ctx, image, version, regID)
} else {
r0 = ret.Error(0)
}
return r0
}
// DuplicateArtifact provides a mock function with given fields: ctx, sourceArtifact, targetImageID
func (_m *ArtifactRepository) DuplicateArtifact(ctx context.Context, sourceArtifact *types.Artifact, targetImageID int64) (*types.Artifact, error) {
ret := _m.Called(ctx, sourceArtifact, targetImageID)
if len(ret) == 0 {
panic("no return value specified for DuplicateArtifact")
}
var r0 *types.Artifact
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Artifact, int64) (*types.Artifact, error)); ok {
return rf(ctx, sourceArtifact, targetImageID)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.Artifact, int64) *types.Artifact); ok {
r0 = rf(ctx, sourceArtifact, targetImageID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Artifact)
}
}
if rf, ok := ret.Get(1).(func(context.Context, *types.Artifact, int64) error); ok {
r1 = rf(ctx, sourceArtifact, targetImageID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetAllArtifactsByParentID provides a mock function with given fields: ctx, id, i, field, order, limit, offset, term, version, packageTypes
func (_m *ArtifactRepository) GetAllArtifactsByParentID(ctx context.Context, id int64, i *[]string, field string, order string, limit int, offset int, term string, version bool, packageTypes []string) (*[]types.ArtifactMetadata, error) {
ret := _m.Called(ctx, id, i, field, order, limit, offset, term, version, packageTypes)
if len(ret) == 0 {
panic("no return value specified for GetAllArtifactsByParentID")
}
var r0 *[]types.ArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, string, int, int, string, bool, []string) (*[]types.ArtifactMetadata, error)); ok {
return rf(ctx, id, i, field, order, limit, offset, term, version, packageTypes)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, string, int, int, string, bool, []string) *[]types.ArtifactMetadata); ok {
r0 = rf(ctx, id, i, field, order, limit, offset, term, version, packageTypes)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.ArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, *[]string, string, string, int, int, string, bool, []string) error); ok {
r1 = rf(ctx, id, i, field, order, limit, offset, term, version, packageTypes)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetAllArtifactsByRepo provides a mock function with given fields: ctx, registryID, batchSize, artifactID
func (_m *ArtifactRepository) GetAllArtifactsByRepo(ctx context.Context, registryID int64, batchSize int, artifactID int64) (*[]types.ArtifactMetadata, error) {
ret := _m.Called(ctx, registryID, batchSize, artifactID)
if len(ret) == 0 {
panic("no return value specified for GetAllArtifactsByRepo")
}
var r0 *[]types.ArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, int, int64) (*[]types.ArtifactMetadata, error)); ok {
return rf(ctx, registryID, batchSize, artifactID)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, int, int64) *[]types.ArtifactMetadata); ok {
r0 = rf(ctx, registryID, batchSize, artifactID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.ArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, int, int64) error); ok {
r1 = rf(ctx, registryID, batchSize, artifactID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetAllVersionsByRepoAndImage provides a mock function with given fields: ctx, id, image, field, order, limit, offset, term, artifactType
func (_m *ArtifactRepository) GetAllVersionsByRepoAndImage(ctx context.Context, id int64, image string, field string, order string, limit int, offset int, term string, artifactType *artifact.ArtifactType) (*[]types.NonOCIArtifactMetadata, error) {
ret := _m.Called(ctx, id, image, field, order, limit, offset, term, artifactType)
if len(ret) == 0 {
panic("no return value specified for GetAllVersionsByRepoAndImage")
}
var r0 *[]types.NonOCIArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string, int, int, string, *artifact.ArtifactType) (*[]types.NonOCIArtifactMetadata, error)); ok {
return rf(ctx, id, image, field, order, limit, offset, term, artifactType)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string, int, int, string, *artifact.ArtifactType) *[]types.NonOCIArtifactMetadata); ok {
r0 = rf(ctx, id, image, field, order, limit, offset, term, artifactType)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.NonOCIArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string, string, int, int, string, *artifact.ArtifactType) error); ok {
r1 = rf(ctx, id, image, field, order, limit, offset, term, artifactType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetArtifactMetadata provides a mock function with given fields: ctx, id, identifier, image, version, artifactType
func (_m *ArtifactRepository) GetArtifactMetadata(ctx context.Context, id int64, identifier string, image string, version string, artifactType *artifact.ArtifactType) (*types.ArtifactMetadata, error) {
ret := _m.Called(ctx, id, identifier, image, version, artifactType)
if len(ret) == 0 {
panic("no return value specified for GetArtifactMetadata")
}
var r0 *types.ArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string, *artifact.ArtifactType) (*types.ArtifactMetadata, error)); ok {
return rf(ctx, id, identifier, image, version, artifactType)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string, *artifact.ArtifactType) *types.ArtifactMetadata); ok {
r0 = rf(ctx, id, identifier, image, version, artifactType)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.ArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string, string, *artifact.ArtifactType) error); ok {
r1 = rf(ctx, id, identifier, image, version, artifactType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetArtifactsByRepo provides a mock function with given fields: ctx, parentID, repoKey, sortByField, sortByOrder, limit, offset, search, labels, artifactType
func (_m *ArtifactRepository) GetArtifactsByRepo(ctx context.Context, parentID int64, repoKey string, sortByField string, sortByOrder string, limit int, offset int, search string, labels []string, artifactType *artifact.ArtifactType) (*[]types.ArtifactMetadata, error) {
ret := _m.Called(ctx, parentID, repoKey, sortByField, sortByOrder, limit, offset, search, labels, artifactType)
if len(ret) == 0 {
panic("no return value specified for GetArtifactsByRepo")
}
var r0 *[]types.ArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string, int, int, string, []string, *artifact.ArtifactType) (*[]types.ArtifactMetadata, error)); ok {
return rf(ctx, parentID, repoKey, sortByField, sortByOrder, limit, offset, search, labels, artifactType)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string, int, int, string, []string, *artifact.ArtifactType) *[]types.ArtifactMetadata); ok {
r0 = rf(ctx, parentID, repoKey, sortByField, sortByOrder, limit, offset, search, labels, artifactType)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.ArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string, string, int, int, string, []string, *artifact.ArtifactType) error); ok {
r1 = rf(ctx, parentID, repoKey, sortByField, sortByOrder, limit, offset, search, labels, artifactType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetArtifactsByRepoAndImageBatch provides a mock function with given fields: ctx, registryID, imageName, batchSize, artifactID
func (_m *ArtifactRepository) GetArtifactsByRepoAndImageBatch(ctx context.Context, registryID int64, imageName string, batchSize int, artifactID int64) (*[]types.ArtifactMetadata, error) {
ret := _m.Called(ctx, registryID, imageName, batchSize, artifactID)
if len(ret) == 0 {
panic("no return value specified for GetArtifactsByRepoAndImageBatch")
}
var r0 *[]types.ArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int64) (*[]types.ArtifactMetadata, error)); ok {
return rf(ctx, registryID, imageName, batchSize, artifactID)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int64) *[]types.ArtifactMetadata); ok {
r0 = rf(ctx, registryID, imageName, batchSize, artifactID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.ArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, int, int64) error); ok {
r1 = rf(ctx, registryID, imageName, batchSize, artifactID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByName provides a mock function with given fields: ctx, imageID, version
func (_m *ArtifactRepository) GetByName(ctx context.Context, imageID int64, version string) (*types.Artifact, error) {
ret := _m.Called(ctx, imageID, version)
if len(ret) == 0 {
panic("no return value specified for GetByName")
}
var r0 *types.Artifact
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (*types.Artifact, error)); ok {
return rf(ctx, imageID, version)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.Artifact); ok {
r0 = rf(ctx, imageID, version)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Artifact)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, imageID, version)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByRegistryIDAndImage provides a mock function with given fields: ctx, registryID, image
func (_m *ArtifactRepository) GetByRegistryIDAndImage(ctx context.Context, registryID int64, image string) (*[]types.Artifact, error) {
ret := _m.Called(ctx, registryID, image)
if len(ret) == 0 {
panic("no return value specified for GetByRegistryIDAndImage")
}
var r0 *[]types.Artifact
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (*[]types.Artifact, error)); ok {
return rf(ctx, registryID, image)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *[]types.Artifact); ok {
r0 = rf(ctx, registryID, image)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.Artifact)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, registryID, image)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByRegistryImageAndVersion provides a mock function with given fields: ctx, registryID, image, version
func (_m *ArtifactRepository) GetByRegistryImageAndVersion(ctx context.Context, registryID int64, image string, version string) (*types.Artifact, error) {
ret := _m.Called(ctx, registryID, image, version)
if len(ret) == 0 {
panic("no return value specified for GetByRegistryImageAndVersion")
}
var r0 *types.Artifact
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) (*types.Artifact, error)); ok {
return rf(ctx, registryID, image, version)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) *types.Artifact); ok {
r0 = rf(ctx, registryID, image, version)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Artifact)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string) error); ok {
r1 = rf(ctx, registryID, image, version)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetLatestArtifactMetadata provides a mock function with given fields: ctx, id, identifier, image
func (_m *ArtifactRepository) GetLatestArtifactMetadata(ctx context.Context, id int64, identifier string, image string) (*types.ArtifactMetadata, error) {
ret := _m.Called(ctx, id, identifier, image)
if len(ret) == 0 {
panic("no return value specified for GetLatestArtifactMetadata")
}
var r0 *types.ArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) (*types.ArtifactMetadata, error)); ok {
return rf(ctx, id, identifier, image)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) *types.ArtifactMetadata); ok {
r0 = rf(ctx, id, identifier, image)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.ArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string) error); ok {
r1 = rf(ctx, id, identifier, image)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetLatestArtifactsByRepo provides a mock function with given fields: ctx, registryID, batchSize, artifactID
func (_m *ArtifactRepository) GetLatestArtifactsByRepo(ctx context.Context, registryID int64, batchSize int, artifactID int64) (*[]types.ArtifactMetadata, error) {
ret := _m.Called(ctx, registryID, batchSize, artifactID)
if len(ret) == 0 {
panic("no return value specified for GetLatestArtifactsByRepo")
}
var r0 *[]types.ArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, int, int64) (*[]types.ArtifactMetadata, error)); ok {
return rf(ctx, registryID, batchSize, artifactID)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, int, int64) *[]types.ArtifactMetadata); ok {
r0 = rf(ctx, registryID, batchSize, artifactID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.ArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, int, int64) error); ok {
r1 = rf(ctx, registryID, batchSize, artifactID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetLatestByImageID provides a mock function with given fields: ctx, imageID
func (_m *ArtifactRepository) GetLatestByImageID(ctx context.Context, imageID int64) (*types.Artifact, error) {
ret := _m.Called(ctx, imageID)
if len(ret) == 0 {
panic("no return value specified for GetLatestByImageID")
}
var r0 *types.Artifact
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*types.Artifact, error)); ok {
return rf(ctx, imageID)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.Artifact); ok {
r0 = rf(ctx, imageID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Artifact)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, imageID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// SearchByImageName provides a mock function with given fields: ctx, regID, name, limit, offset
func (_m *ArtifactRepository) SearchByImageName(ctx context.Context, regID int64, name string, limit int, offset int) (*[]types.ArtifactMetadata, error) {
ret := _m.Called(ctx, regID, name, limit, offset)
if len(ret) == 0 {
panic("no return value specified for SearchByImageName")
}
var r0 *[]types.ArtifactMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int) (*[]types.ArtifactMetadata, error)); ok {
return rf(ctx, regID, name, limit, offset)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int) *[]types.ArtifactMetadata); ok {
r0 = rf(ctx, regID, name, limit, offset)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.ArtifactMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, int, int) error); ok {
r1 = rf(ctx, regID, name, limit, offset)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// SearchLatestByName provides a mock function with given fields: ctx, regID, name, limit, offset
func (_m *ArtifactRepository) SearchLatestByName(ctx context.Context, regID int64, name string, limit int, offset int) (*[]types.Artifact, error) {
ret := _m.Called(ctx, regID, name, limit, offset)
if len(ret) == 0 {
panic("no return value specified for SearchLatestByName")
}
var r0 *[]types.Artifact
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int) (*[]types.Artifact, error)); ok {
return rf(ctx, regID, name, limit, offset)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int) *[]types.Artifact); ok {
r0 = rf(ctx, regID, name, limit, offset)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.Artifact)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, int, int) error); ok {
r1 = rf(ctx, regID, name, limit, offset)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// UpdateArtifactMetadata provides a mock function with given fields: ctx, metadata, artifactID
func (_m *ArtifactRepository) UpdateArtifactMetadata(ctx context.Context, metadata json.RawMessage, artifactID int64) error {
ret := _m.Called(ctx, metadata, artifactID)
if len(ret) == 0 {
panic("no return value specified for UpdateArtifactMetadata")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, json.RawMessage, int64) error); ok {
r0 = rf(ctx, metadata, artifactID)
} else {
r0 = ret.Error(0)
}
return r0
}
// NewArtifactRepository creates a new instance of ArtifactRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewArtifactRepository(t interface {
mock.TestingT
Cleanup(func())
}) *ArtifactRepository {
mock := &ArtifactRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/cleanup_policy_repository.go | registry/app/api/controller/mocks/cleanup_policy_repository.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
types "github.com/harness/gitness/registry/types"
mock "github.com/stretchr/testify/mock"
)
// CleanupPolicyRepository is an autogenerated mock type for the CleanupPolicyRepository type
type CleanupPolicyRepository struct {
mock.Mock
}
type CleanupPolicyRepository_Expecter struct {
mock *mock.Mock
}
func (_m *CleanupPolicyRepository) EXPECT() *CleanupPolicyRepository_Expecter {
return &CleanupPolicyRepository_Expecter{mock: &_m.Mock}
}
// Create provides a mock function with given fields: ctx, cleanupPolicy
func (_m *CleanupPolicyRepository) Create(ctx context.Context, cleanupPolicy *types.CleanupPolicy) (int64, error) {
ret := _m.Called(ctx, cleanupPolicy)
if len(ret) == 0 {
panic("no return value specified for Create")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.CleanupPolicy) (int64, error)); ok {
return rf(ctx, cleanupPolicy)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.CleanupPolicy) int64); ok {
r0 = rf(ctx, cleanupPolicy)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, *types.CleanupPolicy) error); ok {
r1 = rf(ctx, cleanupPolicy)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CleanupPolicyRepository_Create_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Create'
type CleanupPolicyRepository_Create_Call struct {
*mock.Call
}
// Create is a helper method to define mock.On call
// - ctx context.Context
// - cleanupPolicy *types.CleanupPolicy
func (_e *CleanupPolicyRepository_Expecter) Create(ctx interface{}, cleanupPolicy interface{}) *CleanupPolicyRepository_Create_Call {
return &CleanupPolicyRepository_Create_Call{Call: _e.mock.On("Create", ctx, cleanupPolicy)}
}
func (_c *CleanupPolicyRepository_Create_Call) Run(run func(ctx context.Context, cleanupPolicy *types.CleanupPolicy)) *CleanupPolicyRepository_Create_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.CleanupPolicy))
})
return _c
}
func (_c *CleanupPolicyRepository_Create_Call) Return(id int64, err error) *CleanupPolicyRepository_Create_Call {
_c.Call.Return(id, err)
return _c
}
func (_c *CleanupPolicyRepository_Create_Call) RunAndReturn(run func(context.Context, *types.CleanupPolicy) (int64, error)) *CleanupPolicyRepository_Create_Call {
_c.Call.Return(run)
return _c
}
// Delete provides a mock function with given fields: ctx, id
func (_m *CleanupPolicyRepository) Delete(ctx context.Context, id int64) error {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for Delete")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64) error); ok {
r0 = rf(ctx, id)
} else {
r0 = ret.Error(0)
}
return r0
}
// CleanupPolicyRepository_Delete_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Delete'
type CleanupPolicyRepository_Delete_Call struct {
*mock.Call
}
// Delete is a helper method to define mock.On call
// - ctx context.Context
// - id int64
func (_e *CleanupPolicyRepository_Expecter) Delete(ctx interface{}, id interface{}) *CleanupPolicyRepository_Delete_Call {
return &CleanupPolicyRepository_Delete_Call{Call: _e.mock.On("Delete", ctx, id)}
}
func (_c *CleanupPolicyRepository_Delete_Call) Run(run func(ctx context.Context, id int64)) *CleanupPolicyRepository_Delete_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64))
})
return _c
}
func (_c *CleanupPolicyRepository_Delete_Call) Return(err error) *CleanupPolicyRepository_Delete_Call {
_c.Call.Return(err)
return _c
}
func (_c *CleanupPolicyRepository_Delete_Call) RunAndReturn(run func(context.Context, int64) error) *CleanupPolicyRepository_Delete_Call {
_c.Call.Return(run)
return _c
}
// GetByRegistryID provides a mock function with given fields: ctx, id
func (_m *CleanupPolicyRepository) GetByRegistryID(ctx context.Context, id int64) (*[]types.CleanupPolicy, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for GetByRegistryID")
}
var r0 *[]types.CleanupPolicy
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*[]types.CleanupPolicy, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *[]types.CleanupPolicy); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.CleanupPolicy)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CleanupPolicyRepository_GetByRegistryID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByRegistryID'
type CleanupPolicyRepository_GetByRegistryID_Call struct {
*mock.Call
}
// GetByRegistryID is a helper method to define mock.On call
// - ctx context.Context
// - id int64
func (_e *CleanupPolicyRepository_Expecter) GetByRegistryID(ctx interface{}, id interface{}) *CleanupPolicyRepository_GetByRegistryID_Call {
return &CleanupPolicyRepository_GetByRegistryID_Call{Call: _e.mock.On("GetByRegistryID", ctx, id)}
}
func (_c *CleanupPolicyRepository_GetByRegistryID_Call) Run(run func(ctx context.Context, id int64)) *CleanupPolicyRepository_GetByRegistryID_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64))
})
return _c
}
func (_c *CleanupPolicyRepository_GetByRegistryID_Call) Return(cleanupPolicies *[]types.CleanupPolicy, err error) *CleanupPolicyRepository_GetByRegistryID_Call {
_c.Call.Return(cleanupPolicies, err)
return _c
}
func (_c *CleanupPolicyRepository_GetByRegistryID_Call) RunAndReturn(run func(context.Context, int64) (*[]types.CleanupPolicy, error)) *CleanupPolicyRepository_GetByRegistryID_Call {
_c.Call.Return(run)
return _c
}
// GetIDsByRegistryID provides a mock function with given fields: ctx, id
func (_m *CleanupPolicyRepository) GetIDsByRegistryID(ctx context.Context, id int64) ([]int64, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for GetIDsByRegistryID")
}
var r0 []int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) ([]int64, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) []int64); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]int64)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CleanupPolicyRepository_GetIDsByRegistryID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetIDsByRegistryID'
type CleanupPolicyRepository_GetIDsByRegistryID_Call struct {
*mock.Call
}
// GetIDsByRegistryID is a helper method to define mock.On call
// - ctx context.Context
// - id int64
func (_e *CleanupPolicyRepository_Expecter) GetIDsByRegistryID(ctx interface{}, id interface{}) *CleanupPolicyRepository_GetIDsByRegistryID_Call {
return &CleanupPolicyRepository_GetIDsByRegistryID_Call{Call: _e.mock.On("GetIDsByRegistryID", ctx, id)}
}
func (_c *CleanupPolicyRepository_GetIDsByRegistryID_Call) Run(run func(ctx context.Context, id int64)) *CleanupPolicyRepository_GetIDsByRegistryID_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64))
})
return _c
}
func (_c *CleanupPolicyRepository_GetIDsByRegistryID_Call) Return(ids []int64, err error) *CleanupPolicyRepository_GetIDsByRegistryID_Call {
_c.Call.Return(ids, err)
return _c
}
func (_c *CleanupPolicyRepository_GetIDsByRegistryID_Call) RunAndReturn(run func(context.Context, int64) ([]int64, error)) *CleanupPolicyRepository_GetIDsByRegistryID_Call {
_c.Call.Return(run)
return _c
}
// ModifyCleanupPolicies provides a mock function with given fields: ctx, cleanupPolicies, ids
func (_m *CleanupPolicyRepository) ModifyCleanupPolicies(ctx context.Context, cleanupPolicies *[]types.CleanupPolicy, ids []int64) error {
ret := _m.Called(ctx, cleanupPolicies, ids)
if len(ret) == 0 {
panic("no return value specified for ModifyCleanupPolicies")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *[]types.CleanupPolicy, []int64) error); ok {
r0 = rf(ctx, cleanupPolicies, ids)
} else {
r0 = ret.Error(0)
}
return r0
}
// CleanupPolicyRepository_ModifyCleanupPolicies_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'ModifyCleanupPolicies'
type CleanupPolicyRepository_ModifyCleanupPolicies_Call struct {
*mock.Call
}
// ModifyCleanupPolicies is a helper method to define mock.On call
// - ctx context.Context
// - cleanupPolicies *[]types.CleanupPolicy
// - ids []int64
func (_e *CleanupPolicyRepository_Expecter) ModifyCleanupPolicies(ctx interface{}, cleanupPolicies interface{}, ids interface{}) *CleanupPolicyRepository_ModifyCleanupPolicies_Call {
return &CleanupPolicyRepository_ModifyCleanupPolicies_Call{Call: _e.mock.On("ModifyCleanupPolicies", ctx, cleanupPolicies, ids)}
}
func (_c *CleanupPolicyRepository_ModifyCleanupPolicies_Call) Run(run func(ctx context.Context, cleanupPolicies *[]types.CleanupPolicy, ids []int64)) *CleanupPolicyRepository_ModifyCleanupPolicies_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*[]types.CleanupPolicy), args[2].([]int64))
})
return _c
}
func (_c *CleanupPolicyRepository_ModifyCleanupPolicies_Call) Return(_a0 error) *CleanupPolicyRepository_ModifyCleanupPolicies_Call {
_c.Call.Return(_a0)
return _c
}
func (_c *CleanupPolicyRepository_ModifyCleanupPolicies_Call) RunAndReturn(run func(context.Context, *[]types.CleanupPolicy, []int64) error) *CleanupPolicyRepository_ModifyCleanupPolicies_Call {
_c.Call.Return(run)
return _c
}
// NewCleanupPolicyRepository creates a new instance of CleanupPolicyRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewCleanupPolicyRepository(t interface {
mock.TestingT
Cleanup(func())
}) *CleanupPolicyRepository {
mock := &CleanupPolicyRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/blob_repository.go | registry/app/api/controller/mocks/blob_repository.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
types "github.com/harness/gitness/registry/types"
digest "github.com/opencontainers/go-digest"
mock "github.com/stretchr/testify/mock"
)
// BlobRepository is an autogenerated mock type for the BlobRepository type
type BlobRepository struct {
mock.Mock
}
// CreateOrFind provides a mock function with given fields: ctx, b
func (_m *BlobRepository) CreateOrFind(ctx context.Context, b *types.Blob) (*types.Blob, bool, error) {
ret := _m.Called(ctx, b)
if len(ret) == 0 {
panic("no return value specified for CreateOrFind")
}
var r0 *types.Blob
var r1 bool
var r2 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Blob) (*types.Blob, bool, error)); ok {
return rf(ctx, b)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.Blob) *types.Blob); ok {
r0 = rf(ctx, b)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Blob)
}
}
if rf, ok := ret.Get(1).(func(context.Context, *types.Blob) bool); ok {
r1 = rf(ctx, b)
} else {
r1 = ret.Get(1).(bool)
}
if rf, ok := ret.Get(2).(func(context.Context, *types.Blob) error); ok {
r2 = rf(ctx, b)
} else {
r2 = ret.Error(2)
}
return r0, r1, r2
}
// DeleteByID provides a mock function with given fields: ctx, id
func (_m *BlobRepository) DeleteByID(ctx context.Context, id int64) error {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for DeleteByID")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64) error); ok {
r0 = rf(ctx, id)
} else {
r0 = ret.Error(0)
}
return r0
}
// ExistsBlob provides a mock function with given fields: ctx, repoID, d, image
func (_m *BlobRepository) ExistsBlob(ctx context.Context, repoID int64, d digest.Digest, image string) (bool, error) {
ret := _m.Called(ctx, repoID, d, image)
if len(ret) == 0 {
panic("no return value specified for ExistsBlob")
}
var r0 bool
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, digest.Digest, string) (bool, error)); ok {
return rf(ctx, repoID, d, image)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, digest.Digest, string) bool); ok {
r0 = rf(ctx, repoID, d, image)
} else {
r0 = ret.Get(0).(bool)
}
if rf, ok := ret.Get(1).(func(context.Context, int64, digest.Digest, string) error); ok {
r1 = rf(ctx, repoID, d, image)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindByDigestAndRepoID provides a mock function with given fields: ctx, d, repoID, imageName
func (_m *BlobRepository) FindByDigestAndRepoID(ctx context.Context, d digest.Digest, repoID int64, imageName string) (*types.Blob, error) {
ret := _m.Called(ctx, d, repoID, imageName)
if len(ret) == 0 {
panic("no return value specified for FindByDigestAndRepoID")
}
var r0 *types.Blob
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, digest.Digest, int64, string) (*types.Blob, error)); ok {
return rf(ctx, d, repoID, imageName)
}
if rf, ok := ret.Get(0).(func(context.Context, digest.Digest, int64, string) *types.Blob); ok {
r0 = rf(ctx, d, repoID, imageName)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Blob)
}
}
if rf, ok := ret.Get(1).(func(context.Context, digest.Digest, int64, string) error); ok {
r1 = rf(ctx, d, repoID, imageName)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindByDigestAndRootParentID provides a mock function with given fields: ctx, d, rootParentID
func (_m *BlobRepository) FindByDigestAndRootParentID(ctx context.Context, d digest.Digest, rootParentID int64) (*types.Blob, error) {
ret := _m.Called(ctx, d, rootParentID)
if len(ret) == 0 {
panic("no return value specified for FindByDigestAndRootParentID")
}
var r0 *types.Blob
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, digest.Digest, int64) (*types.Blob, error)); ok {
return rf(ctx, d, rootParentID)
}
if rf, ok := ret.Get(0).(func(context.Context, digest.Digest, int64) *types.Blob); ok {
r0 = rf(ctx, d, rootParentID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Blob)
}
}
if rf, ok := ret.Get(1).(func(context.Context, digest.Digest, int64) error); ok {
r1 = rf(ctx, d, rootParentID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindByID provides a mock function with given fields: ctx, id
func (_m *BlobRepository) FindByID(ctx context.Context, id int64) (*types.Blob, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for FindByID")
}
var r0 *types.Blob
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*types.Blob, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.Blob); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Blob)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// TotalSizeByRootParentID provides a mock function with given fields: ctx, id
func (_m *BlobRepository) TotalSizeByRootParentID(ctx context.Context, id int64) (int64, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for TotalSizeByRootParentID")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (int64, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) int64); ok {
r0 = rf(ctx, id)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// NewBlobRepository creates a new instance of BlobRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewBlobRepository(t interface {
mock.TestingT
Cleanup(func())
}) *BlobRepository {
mock := &BlobRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/manifest_repository.go | registry/app/api/controller/mocks/manifest_repository.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
types "github.com/harness/gitness/registry/types"
digest "github.com/opencontainers/go-digest"
mock "github.com/stretchr/testify/mock"
)
// ManifestRepository is an autogenerated mock type for the ManifestRepository type
type ManifestRepository struct {
mock.Mock
}
// AssociateLayerBlob provides a mock function with given fields: ctx, m, b
func (_m *ManifestRepository) AssociateLayerBlob(ctx context.Context, m *types.Manifest, b *types.Blob) error {
ret := _m.Called(ctx, m, b)
if len(ret) == 0 {
panic("no return value specified for AssociateLayerBlob")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Manifest, *types.Blob) error); ok {
r0 = rf(ctx, m, b)
} else {
r0 = ret.Error(0)
}
return r0
}
// Count provides a mock function with given fields: ctx
func (_m *ManifestRepository) Count(ctx context.Context) (int, error) {
ret := _m.Called(ctx)
if len(ret) == 0 {
panic("no return value specified for Count")
}
var r0 int
var r1 error
if rf, ok := ret.Get(0).(func(context.Context) (int, error)); ok {
return rf(ctx)
}
if rf, ok := ret.Get(0).(func(context.Context) int); ok {
r0 = rf(ctx)
} else {
r0 = ret.Get(0).(int)
}
if rf, ok := ret.Get(1).(func(context.Context) error); ok {
r1 = rf(ctx)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Create provides a mock function with given fields: ctx, m
func (_m *ManifestRepository) Create(ctx context.Context, m *types.Manifest) error {
ret := _m.Called(ctx, m)
if len(ret) == 0 {
panic("no return value specified for Create")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Manifest) error); ok {
r0 = rf(ctx, m)
} else {
r0 = ret.Error(0)
}
return r0
}
// CreateOrFind provides a mock function with given fields: ctx, m
func (_m *ManifestRepository) CreateOrFind(ctx context.Context, m *types.Manifest) error {
ret := _m.Called(ctx, m)
if len(ret) == 0 {
panic("no return value specified for CreateOrFind")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Manifest) error); ok {
r0 = rf(ctx, m)
} else {
r0 = ret.Error(0)
}
return r0
}
// Delete provides a mock function with given fields: ctx, registryID, id
func (_m *ManifestRepository) Delete(ctx context.Context, registryID int64, id int64) error {
ret := _m.Called(ctx, registryID, id)
if len(ret) == 0 {
panic("no return value specified for Delete")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64, int64) error); ok {
r0 = rf(ctx, registryID, id)
} else {
r0 = ret.Error(0)
}
return r0
}
// DeleteManifest provides a mock function with given fields: ctx, repoID, imageName, d
func (_m *ManifestRepository) DeleteManifest(ctx context.Context, repoID int64, imageName string, d digest.Digest) (bool, error) {
ret := _m.Called(ctx, repoID, imageName, d)
if len(ret) == 0 {
panic("no return value specified for DeleteManifest")
}
var r0 bool
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, digest.Digest) (bool, error)); ok {
return rf(ctx, repoID, imageName, d)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, digest.Digest) bool); ok {
r0 = rf(ctx, repoID, imageName, d)
} else {
r0 = ret.Get(0).(bool)
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, digest.Digest) error); ok {
r1 = rf(ctx, repoID, imageName, d)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// DissociateLayerBlob provides a mock function with given fields: ctx, m, b
func (_m *ManifestRepository) DissociateLayerBlob(ctx context.Context, m *types.Manifest, b *types.Blob) error {
ret := _m.Called(ctx, m, b)
if len(ret) == 0 {
panic("no return value specified for DissociateLayerBlob")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Manifest, *types.Blob) error); ok {
r0 = rf(ctx, m, b)
} else {
r0 = ret.Error(0)
}
return r0
}
// FindAll provides a mock function with given fields: ctx
func (_m *ManifestRepository) FindAll(ctx context.Context) (types.Manifests, error) {
ret := _m.Called(ctx)
if len(ret) == 0 {
panic("no return value specified for FindAll")
}
var r0 types.Manifests
var r1 error
if rf, ok := ret.Get(0).(func(context.Context) (types.Manifests, error)); ok {
return rf(ctx)
}
if rf, ok := ret.Get(0).(func(context.Context) types.Manifests); ok {
r0 = rf(ctx)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(types.Manifests)
}
}
if rf, ok := ret.Get(1).(func(context.Context) error); ok {
r1 = rf(ctx)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindManifestByDigest provides a mock function with given fields: ctx, repoID, imageName, _a3
func (_m *ManifestRepository) FindManifestByDigest(ctx context.Context, repoID int64, imageName string, _a3 types.Digest) (*types.Manifest, error) {
ret := _m.Called(ctx, repoID, imageName, _a3)
if len(ret) == 0 {
panic("no return value specified for FindManifestByDigest")
}
var r0 *types.Manifest
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, types.Digest) (*types.Manifest, error)); ok {
return rf(ctx, repoID, imageName, _a3)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, types.Digest) *types.Manifest); ok {
r0 = rf(ctx, repoID, imageName, _a3)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Manifest)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, types.Digest) error); ok {
r1 = rf(ctx, repoID, imageName, _a3)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindManifestByTagName provides a mock function with given fields: ctx, repoID, imageName, tag
func (_m *ManifestRepository) FindManifestByTagName(ctx context.Context, repoID int64, imageName string, tag string) (*types.Manifest, error) {
ret := _m.Called(ctx, repoID, imageName, tag)
if len(ret) == 0 {
panic("no return value specified for FindManifestByTagName")
}
var r0 *types.Manifest
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) (*types.Manifest, error)); ok {
return rf(ctx, repoID, imageName, tag)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) *types.Manifest); ok {
r0 = rf(ctx, repoID, imageName, tag)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Manifest)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string) error); ok {
r1 = rf(ctx, repoID, imageName, tag)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindManifestPayloadByTagName provides a mock function with given fields: ctx, parentID, repoKey, imageName, version
func (_m *ManifestRepository) FindManifestPayloadByTagName(ctx context.Context, parentID int64, repoKey string, imageName string, version string) (*types.Payload, error) {
ret := _m.Called(ctx, parentID, repoKey, imageName, version)
if len(ret) == 0 {
panic("no return value specified for FindManifestPayloadByTagName")
}
var r0 *types.Payload
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string) (*types.Payload, error)); ok {
return rf(ctx, parentID, repoKey, imageName, version)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, string) *types.Payload); ok {
r0 = rf(ctx, parentID, repoKey, imageName, version)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Payload)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string, string) error); ok {
r1 = rf(ctx, parentID, repoKey, imageName, version)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Get provides a mock function with given fields: ctx, manifestID
func (_m *ManifestRepository) Get(ctx context.Context, manifestID int64) (*types.Manifest, error) {
ret := _m.Called(ctx, manifestID)
if len(ret) == 0 {
panic("no return value specified for Get")
}
var r0 *types.Manifest
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*types.Manifest, error)); ok {
return rf(ctx, manifestID)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.Manifest); ok {
r0 = rf(ctx, manifestID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Manifest)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, manifestID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetManifestPayload provides a mock function with given fields: ctx, parentID, repoKey, imageName, _a4
func (_m *ManifestRepository) GetManifestPayload(ctx context.Context, parentID int64, repoKey string, imageName string, _a4 types.Digest) (*types.Payload, error) {
ret := _m.Called(ctx, parentID, repoKey, imageName, _a4)
if len(ret) == 0 {
panic("no return value specified for GetManifestPayload")
}
var r0 *types.Payload
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, types.Digest) (*types.Payload, error)); ok {
return rf(ctx, parentID, repoKey, imageName, _a4)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string, types.Digest) *types.Payload); ok {
r0 = rf(ctx, parentID, repoKey, imageName, _a4)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Payload)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string, types.Digest) error); ok {
r1 = rf(ctx, parentID, repoKey, imageName, _a4)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// LayerBlobs provides a mock function with given fields: ctx, m
func (_m *ManifestRepository) LayerBlobs(ctx context.Context, m *types.Manifest) (types.Blobs, error) {
ret := _m.Called(ctx, m)
if len(ret) == 0 {
panic("no return value specified for LayerBlobs")
}
var r0 types.Blobs
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Manifest) (types.Blobs, error)); ok {
return rf(ctx, m)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.Manifest) types.Blobs); ok {
r0 = rf(ctx, m)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(types.Blobs)
}
}
if rf, ok := ret.Get(1).(func(context.Context, *types.Manifest) error); ok {
r1 = rf(ctx, m)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ListManifestsBySubject provides a mock function with given fields: ctx, repoID, id
func (_m *ManifestRepository) ListManifestsBySubject(ctx context.Context, repoID int64, id int64) (types.Manifests, error) {
ret := _m.Called(ctx, repoID, id)
if len(ret) == 0 {
panic("no return value specified for ListManifestsBySubject")
}
var r0 types.Manifests
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, int64) (types.Manifests, error)); ok {
return rf(ctx, repoID, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, int64) types.Manifests); ok {
r0 = rf(ctx, repoID, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(types.Manifests)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, int64) error); ok {
r1 = rf(ctx, repoID, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ListManifestsBySubjectDigest provides a mock function with given fields: ctx, repoID, _a2
func (_m *ManifestRepository) ListManifestsBySubjectDigest(ctx context.Context, repoID int64, _a2 types.Digest) (types.Manifests, error) {
ret := _m.Called(ctx, repoID, _a2)
if len(ret) == 0 {
panic("no return value specified for ListManifestsBySubjectDigest")
}
var r0 types.Manifests
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, types.Digest) (types.Manifests, error)); ok {
return rf(ctx, repoID, _a2)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, types.Digest) types.Manifests); ok {
r0 = rf(ctx, repoID, _a2)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(types.Manifests)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, types.Digest) error); ok {
r1 = rf(ctx, repoID, _a2)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// References provides a mock function with given fields: ctx, m
func (_m *ManifestRepository) References(ctx context.Context, m *types.Manifest) (types.Manifests, error) {
ret := _m.Called(ctx, m)
if len(ret) == 0 {
panic("no return value specified for References")
}
var r0 types.Manifests
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Manifest) (types.Manifests, error)); ok {
return rf(ctx, m)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.Manifest) types.Manifests); ok {
r0 = rf(ctx, m)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(types.Manifests)
}
}
if rf, ok := ret.Get(1).(func(context.Context, *types.Manifest) error); ok {
r1 = rf(ctx, m)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// NewManifestRepository creates a new instance of ManifestRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewManifestRepository(t interface {
mock.TestingT
Cleanup(func())
}) *ManifestRepository {
mock := &ManifestRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/storage_driver.go | registry/app/api/controller/mocks/storage_driver.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
io "io"
driver "github.com/harness/gitness/registry/app/driver"
mock "github.com/stretchr/testify/mock"
)
// StorageDriver is an autogenerated mock type for the StorageDriver type
type StorageDriver struct {
mock.Mock
}
// Delete provides a mock function with given fields: ctx, path
func (_m *StorageDriver) Delete(ctx context.Context, path string) error {
ret := _m.Called(ctx, path)
if len(ret) == 0 {
panic("no return value specified for Delete")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, string) error); ok {
r0 = rf(ctx, path)
} else {
r0 = ret.Error(0)
}
return r0
}
// GetContent provides a mock function with given fields: ctx, path
func (_m *StorageDriver) GetContent(ctx context.Context, path string) ([]byte, error) {
ret := _m.Called(ctx, path)
if len(ret) == 0 {
panic("no return value specified for GetContent")
}
var r0 []byte
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) ([]byte, error)); ok {
return rf(ctx, path)
}
if rf, ok := ret.Get(0).(func(context.Context, string) []byte); ok {
r0 = rf(ctx, path)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]byte)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, path)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// List provides a mock function with given fields: ctx, path
func (_m *StorageDriver) List(ctx context.Context, path string) ([]string, error) {
ret := _m.Called(ctx, path)
if len(ret) == 0 {
panic("no return value specified for List")
}
var r0 []string
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) ([]string, error)); ok {
return rf(ctx, path)
}
if rf, ok := ret.Get(0).(func(context.Context, string) []string); ok {
r0 = rf(ctx, path)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]string)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, path)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Move provides a mock function with given fields: ctx, sourcePath, destPath
func (_m *StorageDriver) Move(ctx context.Context, sourcePath string, destPath string) error {
ret := _m.Called(ctx, sourcePath, destPath)
if len(ret) == 0 {
panic("no return value specified for Move")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, string, string) error); ok {
r0 = rf(ctx, sourcePath, destPath)
} else {
r0 = ret.Error(0)
}
return r0
}
// Name provides a mock function with no fields
func (_m *StorageDriver) Name() string {
ret := _m.Called()
if len(ret) == 0 {
panic("no return value specified for Name")
}
var r0 string
if rf, ok := ret.Get(0).(func() string); ok {
r0 = rf()
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// PutContent provides a mock function with given fields: ctx, path, content
func (_m *StorageDriver) PutContent(ctx context.Context, path string, content []byte) error {
ret := _m.Called(ctx, path, content)
if len(ret) == 0 {
panic("no return value specified for PutContent")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, string, []byte) error); ok {
r0 = rf(ctx, path, content)
} else {
r0 = ret.Error(0)
}
return r0
}
// Reader provides a mock function with given fields: ctx, path, offset
func (_m *StorageDriver) Reader(ctx context.Context, path string, offset int64) (io.ReadCloser, error) {
ret := _m.Called(ctx, path, offset)
if len(ret) == 0 {
panic("no return value specified for Reader")
}
var r0 io.ReadCloser
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, int64) (io.ReadCloser, error)); ok {
return rf(ctx, path, offset)
}
if rf, ok := ret.Get(0).(func(context.Context, string, int64) io.ReadCloser); ok {
r0 = rf(ctx, path, offset)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(io.ReadCloser)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string, int64) error); ok {
r1 = rf(ctx, path, offset)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RedirectURL provides a mock function with given fields: ctx, method, path
func (_m *StorageDriver) RedirectURL(ctx context.Context, method string, path string, filename string) (string, error) {
ret := _m.Called(ctx, method, path)
if len(ret) == 0 {
panic("no return value specified for RedirectURL")
}
var r0 string
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, string) (string, error)); ok {
return rf(ctx, method, path)
}
if rf, ok := ret.Get(0).(func(context.Context, string, string) string); ok {
r0 = rf(ctx, method, path)
} else {
r0 = ret.Get(0).(string)
}
if rf, ok := ret.Get(1).(func(context.Context, string, string) error); ok {
r1 = rf(ctx, method, path)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Stat provides a mock function with given fields: ctx, path
func (_m *StorageDriver) Stat(ctx context.Context, path string) (driver.FileInfo, error) {
ret := _m.Called(ctx, path)
if len(ret) == 0 {
panic("no return value specified for Stat")
}
var r0 driver.FileInfo
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) (driver.FileInfo, error)); ok {
return rf(ctx, path)
}
if rf, ok := ret.Get(0).(func(context.Context, string) driver.FileInfo); ok {
r0 = rf(ctx, path)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(driver.FileInfo)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, path)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Walk provides a mock function with given fields: ctx, path, f, options
func (_m *StorageDriver) Walk(ctx context.Context, path string, f driver.WalkFn, options ...func(*driver.WalkOptions)) error {
_va := make([]interface{}, len(options))
for _i := range options {
_va[_i] = options[_i]
}
var _ca []interface{}
_ca = append(_ca, ctx, path, f)
_ca = append(_ca, _va...)
ret := _m.Called(_ca...)
if len(ret) == 0 {
panic("no return value specified for Walk")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, string, driver.WalkFn, ...func(*driver.WalkOptions)) error); ok {
r0 = rf(ctx, path, f, options...)
} else {
r0 = ret.Error(0)
}
return r0
}
// Writer provides a mock function with given fields: ctx, path, a
func (_m *StorageDriver) Writer(ctx context.Context, path string, a bool) (driver.FileWriter, error) {
ret := _m.Called(ctx, path, a)
if len(ret) == 0 {
panic("no return value specified for Writer")
}
var r0 driver.FileWriter
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, bool) (driver.FileWriter, error)); ok {
return rf(ctx, path, a)
}
if rf, ok := ret.Get(0).(func(context.Context, string, bool) driver.FileWriter); ok {
r0 = rf(ctx, path, a)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(driver.FileWriter)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string, bool) error); ok {
r1 = rf(ctx, path, a)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// NewStorageDriver creates a new instance of StorageDriver. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewStorageDriver(t interface {
mock.TestingT
Cleanup(func())
}) *StorageDriver {
mock := &StorageDriver{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/stream_producer.go | registry/app/api/controller/mocks/stream_producer.go | // Code generated by mockery v2.20.0. DO NOT EDIT.
package mocks
import (
"context"
mock "github.com/stretchr/testify/mock"
)
// StreamProducer is an autogenerated mock type for the StreamProducer type
type StreamProducer struct {
mock.Mock
}
// Send provides a mock function with given fields: ctx, topic, payload
func (m *StreamProducer) Send(ctx context.Context, topic string, payload map[string]interface{}) (string, error) {
ret := m.Called(ctx, topic, payload)
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string, map[string]interface{}) string); ok {
r0 = rf(ctx, topic, payload)
} else {
r0 = ret.Get(0).(string)
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string, map[string]interface{}) error); ok {
r1 = rf(ctx, topic, payload)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Close provides a mock function with given fields:
func (m *StreamProducer) Close() error {
ret := m.Called()
var r0 error
if rf, ok := ret.Get(0).(func() error); ok {
r0 = rf()
} else {
r0 = ret.Error(0)
}
return r0
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/generic_blob_repository.go | registry/app/api/controller/mocks/generic_blob_repository.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
types "github.com/harness/gitness/registry/types"
mock "github.com/stretchr/testify/mock"
)
// GenericBlobRepository is an autogenerated mock type for the GenericBlobRepository type
type GenericBlobRepository struct {
mock.Mock
}
// Create provides a mock function with given fields: ctx, gb
func (_m *GenericBlobRepository) Create(ctx context.Context, gb *types.GenericBlob) (bool, error) {
ret := _m.Called(ctx, gb)
if len(ret) == 0 {
panic("no return value specified for Create")
}
var r0 bool
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.GenericBlob) (bool, error)); ok {
return rf(ctx, gb)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.GenericBlob) bool); ok {
r0 = rf(ctx, gb)
} else {
r0 = ret.Get(0).(bool)
}
if rf, ok := ret.Get(1).(func(context.Context, *types.GenericBlob) error); ok {
r1 = rf(ctx, gb)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// DeleteByID provides a mock function with given fields: ctx, id
func (_m *GenericBlobRepository) DeleteByID(ctx context.Context, id string) error {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for DeleteByID")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, string) error); ok {
r0 = rf(ctx, id)
} else {
r0 = ret.Error(0)
}
return r0
}
// FindByID provides a mock function with given fields: ctx, id
func (_m *GenericBlobRepository) FindByID(ctx context.Context, id string) (*types.GenericBlob, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for FindByID")
}
var r0 *types.GenericBlob
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) (*types.GenericBlob, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, string) *types.GenericBlob); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.GenericBlob)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindBySha256AndRootParentID provides a mock function with given fields: ctx, sha256, rootParentID
func (_m *GenericBlobRepository) FindBySha256AndRootParentID(ctx context.Context, sha256 string, rootParentID int64) (*types.GenericBlob, error) {
ret := _m.Called(ctx, sha256, rootParentID)
if len(ret) == 0 {
panic("no return value specified for FindBySha256AndRootParentID")
}
var r0 *types.GenericBlob
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, int64) (*types.GenericBlob, error)); ok {
return rf(ctx, sha256, rootParentID)
}
if rf, ok := ret.Get(0).(func(context.Context, string, int64) *types.GenericBlob); ok {
r0 = rf(ctx, sha256, rootParentID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.GenericBlob)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string, int64) error); ok {
r1 = rf(ctx, sha256, rootParentID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// TotalSizeByRootParentID provides a mock function with given fields: ctx, id
func (_m *GenericBlobRepository) TotalSizeByRootParentID(ctx context.Context, id int64) (int64, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for TotalSizeByRootParentID")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (int64, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) int64); ok {
r0 = rf(ctx, id)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// NewGenericBlobRepository creates a new instance of GenericBlobRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewGenericBlobRepository(t interface {
mock.TestingT
Cleanup(func())
}) *GenericBlobRepository {
mock := &GenericBlobRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/audit_service.go | registry/app/api/controller/mocks/audit_service.go | // Code generated by testify. DO NOT EDIT.
package mocks
import (
"context"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/types"
"github.com/stretchr/testify/mock"
)
// AuditService is a mock of audit.Service interface.
type AuditService struct {
mock.Mock
}
// Log provides a mock function
func (m *AuditService) Log(
ctx context.Context,
user types.Principal,
resource audit.Resource,
action audit.Action,
spacePath string,
options ...audit.Option,
) error {
args := []interface{}{ctx, user, resource, action, spacePath}
for _, opt := range options {
args = append(args, opt)
}
ret := m.Called(args...)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, types.Principal, audit.Resource, audit.Action, string, ...audit.Option) error); ok {
r0 = rf(ctx, user, resource, action, spacePath, options...)
} else {
r0 = ret.Error(0)
}
return r0
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/webhook_service.go | registry/app/api/controller/mocks/webhook_service.go | // Code generated by testify. DO NOT EDIT.
package mocks
import (
"context"
gitnesswebhook "github.com/harness/gitness/app/services/webhook"
"github.com/stretchr/testify/mock"
)
// WebhookService is a mock of WebhookService interface.
type WebhookService struct {
mock.Mock
}
// ReTriggerWebhookExecution provides a mock function
func (m *WebhookService) ReTriggerWebhookExecution(ctx context.Context, webhookExecutionID int64) (*gitnesswebhook.TriggerResult, error) {
ret := m.Called(ctx, webhookExecutionID)
var r0 *gitnesswebhook.TriggerResult
if rf, ok := ret.Get(0).(func(context.Context, int64) *gitnesswebhook.TriggerResult); ok {
r0 = rf(ctx, webhookExecutionID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*gitnesswebhook.TriggerResult)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, webhookExecutionID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/quarantine_artifact_repository.go | registry/app/api/controller/mocks/quarantine_artifact_repository.go | // Code generated by mockery; DO NOT EDIT.
// github.com/vektra/mockery
// template: testify
package mocks
import (
"context"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
mock "github.com/stretchr/testify/mock"
)
// NewMockQuarantineArtifactRepository creates a new instance of MockQuarantineArtifactRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewMockQuarantineArtifactRepository(t interface {
mock.TestingT
Cleanup(func())
}) *MockQuarantineArtifactRepository {
mock := &MockQuarantineArtifactRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
// MockQuarantineArtifactRepository is an autogenerated mock type for the QuarantineArtifactRepository type
type MockQuarantineArtifactRepository struct {
mock.Mock
}
type MockQuarantineArtifactRepository_Expecter struct {
mock *mock.Mock
}
func (_m *MockQuarantineArtifactRepository) EXPECT() *MockQuarantineArtifactRepository_Expecter {
return &MockQuarantineArtifactRepository_Expecter{mock: &_m.Mock}
}
// Create provides a mock function for the type MockQuarantineArtifactRepository
func (_mock *MockQuarantineArtifactRepository) Create(ctx context.Context, artifact *types.QuarantineArtifact) error {
ret := _mock.Called(ctx, artifact)
if len(ret) == 0 {
panic("no return value specified for Create")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, *types.QuarantineArtifact) error); ok {
r0 = returnFunc(ctx, artifact)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockQuarantineArtifactRepository_Create_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Create'
type MockQuarantineArtifactRepository_Create_Call struct {
*mock.Call
}
// Create is a helper method to define mock.On call
// - ctx context.Context
// - artifact *types.QuarantineArtifact
func (_e *MockQuarantineArtifactRepository_Expecter) Create(ctx interface{}, artifact interface{}) *MockQuarantineArtifactRepository_Create_Call {
return &MockQuarantineArtifactRepository_Create_Call{Call: _e.mock.On("Create", ctx, artifact)}
}
func (_c *MockQuarantineArtifactRepository_Create_Call) Run(run func(ctx context.Context, artifact *types.QuarantineArtifact)) *MockQuarantineArtifactRepository_Create_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 *types.QuarantineArtifact
if args[1] != nil {
arg1 = args[1].(*types.QuarantineArtifact)
}
run(
arg0,
arg1,
)
})
return _c
}
func (_c *MockQuarantineArtifactRepository_Create_Call) Return(err error) *MockQuarantineArtifactRepository_Create_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockQuarantineArtifactRepository_Create_Call) RunAndReturn(run func(ctx context.Context, artifact *types.QuarantineArtifact) error) *MockQuarantineArtifactRepository_Create_Call {
_c.Call.Return(run)
return _c
}
// DeleteByRegistryIDArtifactAndFilePath provides a mock function for the type MockQuarantineArtifactRepository
func (_mock *MockQuarantineArtifactRepository) DeleteByRegistryIDArtifactAndFilePath(ctx context.Context, registryID int64, artifactID *int64, imageID int64, nodeID *string) error {
ret := _mock.Called(ctx, registryID, artifactID, imageID, nodeID)
if len(ret) == 0 {
panic("no return value specified for DeleteByRegistryIDArtifactAndFilePath")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, *int64, int64, *string) error); ok {
r0 = returnFunc(ctx, registryID, artifactID, imageID, nodeID)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteByRegistryIDArtifactAndFilePath'
type MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call struct {
*mock.Call
}
// DeleteByRegistryIDArtifactAndFilePath is a helper method to define mock.On call
// - ctx context.Context
// - registryID int64
// - artifactID *int64
// - imageID int64
// - nodeID *string
func (_e *MockQuarantineArtifactRepository_Expecter) DeleteByRegistryIDArtifactAndFilePath(ctx interface{}, registryID interface{}, artifactID interface{}, imageID interface{}, nodeID interface{}) *MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call {
return &MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call{Call: _e.mock.On("DeleteByRegistryIDArtifactAndFilePath", ctx, registryID, artifactID, imageID, nodeID)}
}
func (_c *MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call) Run(run func(ctx context.Context, registryID int64, artifactID *int64, imageID int64, nodeID *string)) *MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 *int64
if args[2] != nil {
arg2 = args[2].(*int64)
}
var arg3 int64
if args[3] != nil {
arg3 = args[3].(int64)
}
var arg4 *string
if args[4] != nil {
arg4 = args[4].(*string)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
)
})
return _c
}
func (_c *MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call) Return(err error) *MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call) RunAndReturn(run func(ctx context.Context, registryID int64, artifactID *int64, imageID int64, nodeID *string) error) *MockQuarantineArtifactRepository_DeleteByRegistryIDArtifactAndFilePath_Call {
_c.Call.Return(run)
return _c
}
// GetByFilePath provides a mock function for the type MockQuarantineArtifactRepository
func (_mock *MockQuarantineArtifactRepository) GetByFilePath(ctx context.Context, filePath string, registryID int64, artifact string, version string, artifactType *artifact.ArtifactType) ([]*types.QuarantineArtifact, error) {
ret := _mock.Called(ctx, filePath, registryID, artifact, version)
if len(ret) == 0 {
panic("no return value specified for GetByFilePath")
}
var r0 []*types.QuarantineArtifact
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, string, int64, string, string) ([]*types.QuarantineArtifact, error)); ok {
return returnFunc(ctx, filePath, registryID, artifact, version)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, string, int64, string, string) []*types.QuarantineArtifact); ok {
r0 = returnFunc(ctx, filePath, registryID, artifact, version)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]*types.QuarantineArtifact)
}
}
if returnFunc, ok := ret.Get(1).(func(context.Context, string, int64, string, string) error); ok {
r1 = returnFunc(ctx, filePath, registryID, artifact, version)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockQuarantineArtifactRepository_GetByFilePath_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByFilePath'
type MockQuarantineArtifactRepository_GetByFilePath_Call struct {
*mock.Call
}
// GetByFilePath is a helper method to define mock.On call
// - ctx context.Context
// - filePath string
// - registryID int64
// - artifact string
// - version string
func (_e *MockQuarantineArtifactRepository_Expecter) GetByFilePath(ctx interface{}, filePath interface{}, registryID interface{}, artifact interface{}, version interface{}) *MockQuarantineArtifactRepository_GetByFilePath_Call {
return &MockQuarantineArtifactRepository_GetByFilePath_Call{Call: _e.mock.On("GetByFilePath", ctx, filePath, registryID, artifact, version)}
}
func (_c *MockQuarantineArtifactRepository_GetByFilePath_Call) Run(run func(ctx context.Context, filePath string, registryID int64, artifact string, version string)) *MockQuarantineArtifactRepository_GetByFilePath_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 string
if args[1] != nil {
arg1 = args[1].(string)
}
var arg2 int64
if args[2] != nil {
arg2 = args[2].(int64)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
var arg4 string
if args[4] != nil {
arg4 = args[4].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
)
})
return _c
}
func (_c *MockQuarantineArtifactRepository_GetByFilePath_Call) Return(quarantineArtifacts []*types.QuarantineArtifact, err error) *MockQuarantineArtifactRepository_GetByFilePath_Call {
_c.Call.Return(quarantineArtifacts, err)
return _c
}
func (_c *MockQuarantineArtifactRepository_GetByFilePath_Call) RunAndReturn(run func(ctx context.Context, filePath string, registryID int64, artifact string, version string) ([]*types.QuarantineArtifact, error)) *MockQuarantineArtifactRepository_GetByFilePath_Call {
_c.Call.Return(run)
return _c
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/transaction.go | registry/app/api/controller/mocks/transaction.go | // Code generated by mockery v2.14.0. DO NOT EDIT.
package mocks
import (
"context"
"github.com/stretchr/testify/mock"
)
// Transaction is an autogenerated mock type for the Transaction type
type Transaction struct {
mock.Mock
}
// WithTx provides a mock function with given fields: ctx, fn, options
func (m *Transaction) WithTx(ctx context.Context, fn func(context.Context) error, options ...interface{}) error {
var args []interface{}
args = append(args, ctx, fn)
for _, opt := range options {
args = append(args, opt)
}
ret := m.Called(args...)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, func(context.Context) error, ...interface{}) error); ok {
r0 = rf(ctx, fn, options...)
} else {
r0 = ret.Error(0)
}
return r0
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/upstream_proxy_config_repository.go | registry/app/api/controller/mocks/upstream_proxy_config_repository.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
types "github.com/harness/gitness/registry/types"
mock "github.com/stretchr/testify/mock"
)
// UpstreamProxyConfigRepository is an autogenerated mock type for the UpstreamProxyConfigRepository type
type UpstreamProxyConfigRepository struct {
mock.Mock
}
// CountAll provides a mock function with given fields: ctx, parentID, packageTypes, search
func (_m *UpstreamProxyConfigRepository) CountAll(ctx context.Context, parentID string, packageTypes []string, search string) (int64, error) {
ret := _m.Called(ctx, parentID, packageTypes, search)
if len(ret) == 0 {
panic("no return value specified for CountAll")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, []string, string) (int64, error)); ok {
return rf(ctx, parentID, packageTypes, search)
}
if rf, ok := ret.Get(0).(func(context.Context, string, []string, string) int64); ok {
r0 = rf(ctx, parentID, packageTypes, search)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, string, []string, string) error); ok {
r1 = rf(ctx, parentID, packageTypes, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Create provides a mock function with given fields: ctx, upstreamproxyRecord
func (_m *UpstreamProxyConfigRepository) Create(ctx context.Context, upstreamproxyRecord *types.UpstreamProxyConfig) (int64, error) {
ret := _m.Called(ctx, upstreamproxyRecord)
if len(ret) == 0 {
panic("no return value specified for Create")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.UpstreamProxyConfig) (int64, error)); ok {
return rf(ctx, upstreamproxyRecord)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.UpstreamProxyConfig) int64); ok {
r0 = rf(ctx, upstreamproxyRecord)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, *types.UpstreamProxyConfig) error); ok {
r1 = rf(ctx, upstreamproxyRecord)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Delete provides a mock function with given fields: ctx, parentID, repoKey
func (_m *UpstreamProxyConfigRepository) Delete(ctx context.Context, parentID int64, repoKey string) error {
ret := _m.Called(ctx, parentID, repoKey)
if len(ret) == 0 {
panic("no return value specified for Delete")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) error); ok {
r0 = rf(ctx, parentID, repoKey)
} else {
r0 = ret.Error(0)
}
return r0
}
// Get provides a mock function with given fields: ctx, id
func (_m *UpstreamProxyConfigRepository) Get(ctx context.Context, id int64) (*types.UpstreamProxy, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for Get")
}
var r0 *types.UpstreamProxy
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*types.UpstreamProxy, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.UpstreamProxy); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.UpstreamProxy)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetAll provides a mock function with given fields: ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search
func (_m *UpstreamProxyConfigRepository) GetAll(ctx context.Context, parentID int64, packageTypes []string, sortByField string, sortByOrder string, limit int, offset int, search string) (*[]types.UpstreamProxy, error) {
ret := _m.Called(ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search)
if len(ret) == 0 {
panic("no return value specified for GetAll")
}
var r0 *[]types.UpstreamProxy
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, []string, string, string, int, int, string) (*[]types.UpstreamProxy, error)); ok {
return rf(ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, []string, string, string, int, int, string) *[]types.UpstreamProxy); ok {
r0 = rf(ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.UpstreamProxy)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, []string, string, string, int, int, string) error); ok {
r1 = rf(ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByParentID provides a mock function with given fields: ctx, parentID
func (_m *UpstreamProxyConfigRepository) GetByParentID(ctx context.Context, parentID string) (*[]types.UpstreamProxy, error) {
ret := _m.Called(ctx, parentID)
if len(ret) == 0 {
panic("no return value specified for GetByParentID")
}
var r0 *[]types.UpstreamProxy
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) (*[]types.UpstreamProxy, error)); ok {
return rf(ctx, parentID)
}
if rf, ok := ret.Get(0).(func(context.Context, string) *[]types.UpstreamProxy); ok {
r0 = rf(ctx, parentID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.UpstreamProxy)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, parentID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByRegistryIdentifier provides a mock function with given fields: ctx, parentID, repoKey
func (_m *UpstreamProxyConfigRepository) GetByRegistryIdentifier(ctx context.Context, parentID int64, repoKey string) (*types.UpstreamProxy, error) {
ret := _m.Called(ctx, parentID, repoKey)
if len(ret) == 0 {
panic("no return value specified for GetByRegistryIdentifier")
}
var r0 *types.UpstreamProxy
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (*types.UpstreamProxy, error)); ok {
return rf(ctx, parentID, repoKey)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.UpstreamProxy); ok {
r0 = rf(ctx, parentID, repoKey)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.UpstreamProxy)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, parentID, repoKey)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Update provides a mock function with given fields: ctx, upstreamproxyRecord
func (_m *UpstreamProxyConfigRepository) Update(ctx context.Context, upstreamproxyRecord *types.UpstreamProxyConfig) error {
ret := _m.Called(ctx, upstreamproxyRecord)
if len(ret) == 0 {
panic("no return value specified for Update")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.UpstreamProxyConfig) error); ok {
r0 = rf(ctx, upstreamproxyRecord)
} else {
r0 = ret.Error(0)
}
return r0
}
// NewUpstreamProxyConfigRepository creates a new instance of UpstreamProxyConfigRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewUpstreamProxyConfigRepository(t interface {
mock.TestingT
Cleanup(func())
}) *UpstreamProxyConfigRepository {
mock := &UpstreamProxyConfigRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/registry_repository.go | registry/app/api/controller/mocks/registry_repository.go | // Code generated by mockery v2.53.4. DO NOT EDIT.
package mocks
import (
context "context"
store "github.com/harness/gitness/registry/app/store"
mock "github.com/stretchr/testify/mock"
types "github.com/harness/gitness/registry/types"
)
// RegistryRepository is an autogenerated mock type for the RegistryRepository type
type RegistryRepository struct {
mock.Mock
}
type RegistryRepository_Expecter struct {
mock *mock.Mock
}
func (_m *RegistryRepository) EXPECT() *RegistryRepository_Expecter {
return &RegistryRepository_Expecter{mock: &_m.Mock}
}
// Count provides a mock function with given fields: ctx
func (_m *RegistryRepository) Count(ctx context.Context) (int64, error) {
ret := _m.Called(ctx)
if len(ret) == 0 {
panic("no return value specified for Count")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context) (int64, error)); ok {
return rf(ctx)
}
if rf, ok := ret.Get(0).(func(context.Context) int64); ok {
r0 = rf(ctx)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context) error); ok {
r1 = rf(ctx)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_Count_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Count'
type RegistryRepository_Count_Call struct {
*mock.Call
}
// Count is a helper method to define mock.On call
// - ctx context.Context
func (_e *RegistryRepository_Expecter) Count(ctx interface{}) *RegistryRepository_Count_Call {
return &RegistryRepository_Count_Call{Call: _e.mock.On("Count", ctx)}
}
func (_c *RegistryRepository_Count_Call) Run(run func(ctx context.Context)) *RegistryRepository_Count_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context))
})
return _c
}
func (_c *RegistryRepository_Count_Call) Return(_a0 int64, _a1 error) *RegistryRepository_Count_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *RegistryRepository_Count_Call) RunAndReturn(run func(context.Context) (int64, error)) *RegistryRepository_Count_Call {
_c.Call.Return(run)
return _c
}
// CountAll provides a mock function with given fields: ctx, parentID, packageTypes, search, repoType
func (_m *RegistryRepository) CountAll(ctx context.Context, parentIDs []int64, packageTypes []string, search string, repoType string) (int64, error) {
ret := _m.Called(ctx, parentIDs, packageTypes, search, repoType)
if len(ret) == 0 {
panic("no return value specified for CountAll")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, []int64, []string, string, string) (int64, error)); ok {
return rf(ctx, parentIDs, packageTypes, search, repoType)
}
if rf, ok := ret.Get(0).(func(context.Context, []int64, []string, string, string) int64); ok {
r0 = rf(ctx, parentIDs, packageTypes, search, repoType)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, []int64, []string, string, string) error); ok {
r1 = rf(ctx, parentIDs, packageTypes, search, repoType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_CountAll_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CountAll'
type RegistryRepository_CountAll_Call struct {
*mock.Call
}
// CountAll is a helper method to define mock.On call
// - ctx context.Context
// - parentIDs []int64
// - packageTypes []string
// - search string
// - repoType string
func (_e *RegistryRepository_Expecter) CountAll(ctx interface{}, parentIDs interface{}, packageTypes interface{}, search interface{}, repoType interface{}) *RegistryRepository_CountAll_Call {
return &RegistryRepository_CountAll_Call{Call: _e.mock.On("CountAll", ctx, parentIDs, packageTypes, search, repoType)}
}
func (_c *RegistryRepository_CountAll_Call) Run(run func(ctx context.Context, parentIDs []int64, packageTypes []string, search string, repoType string)) *RegistryRepository_CountAll_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].([]int64), args[2].([]string), args[3].(string), args[4].(string))
})
return _c
}
func (_c *RegistryRepository_CountAll_Call) Return(count int64, err error) *RegistryRepository_CountAll_Call {
_c.Call.Return(count, err)
return _c
}
func (_c *RegistryRepository_CountAll_Call) RunAndReturn(run func(context.Context, []int64, []string, string, string) (int64, error)) *RegistryRepository_CountAll_Call {
_c.Call.Return(run)
return _c
}
// Create provides a mock function with given fields: ctx, repository
func (_m *RegistryRepository) Create(ctx context.Context, repository *types.Registry) (int64, error) {
ret := _m.Called(ctx, repository)
if len(ret) == 0 {
panic("no return value specified for Create")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Registry) (int64, error)); ok {
return rf(ctx, repository)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.Registry) int64); ok {
r0 = rf(ctx, repository)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, *types.Registry) error); ok {
r1 = rf(ctx, repository)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_Create_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Create'
type RegistryRepository_Create_Call struct {
*mock.Call
}
// Create is a helper method to define mock.On call
// - ctx context.Context
// - repository *types.Registry
func (_e *RegistryRepository_Expecter) Create(ctx interface{}, repository interface{}) *RegistryRepository_Create_Call {
return &RegistryRepository_Create_Call{Call: _e.mock.On("Create", ctx, repository)}
}
func (_c *RegistryRepository_Create_Call) Run(run func(ctx context.Context, repository *types.Registry)) *RegistryRepository_Create_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.Registry))
})
return _c
}
func (_c *RegistryRepository_Create_Call) Return(id int64, err error) *RegistryRepository_Create_Call {
_c.Call.Return(id, err)
return _c
}
func (_c *RegistryRepository_Create_Call) RunAndReturn(run func(context.Context, *types.Registry) (int64, error)) *RegistryRepository_Create_Call {
_c.Call.Return(run)
return _c
}
// Delete provides a mock function with given fields: ctx, parentID, name
func (_m *RegistryRepository) Delete(ctx context.Context, parentID int64, name string) error {
ret := _m.Called(ctx, parentID, name)
if len(ret) == 0 {
panic("no return value specified for Delete")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) error); ok {
r0 = rf(ctx, parentID, name)
} else {
r0 = ret.Error(0)
}
return r0
}
// RegistryRepository_Delete_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Delete'
type RegistryRepository_Delete_Call struct {
*mock.Call
}
// Delete is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - name string
func (_e *RegistryRepository_Expecter) Delete(ctx interface{}, parentID interface{}, name interface{}) *RegistryRepository_Delete_Call {
return &RegistryRepository_Delete_Call{Call: _e.mock.On("Delete", ctx, parentID, name)}
}
func (_c *RegistryRepository_Delete_Call) Run(run func(ctx context.Context, parentID int64, name string)) *RegistryRepository_Delete_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string))
})
return _c
}
func (_c *RegistryRepository_Delete_Call) Return(err error) *RegistryRepository_Delete_Call {
_c.Call.Return(err)
return _c
}
func (_c *RegistryRepository_Delete_Call) RunAndReturn(run func(context.Context, int64, string) error) *RegistryRepository_Delete_Call {
_c.Call.Return(run)
return _c
}
// FetchRegistriesIDByUpstreamProxyID provides a mock function with given fields: ctx, upstreamProxyID, rootParentID
func (_m *RegistryRepository) FetchRegistriesIDByUpstreamProxyID(ctx context.Context, upstreamProxyID string, rootParentID int64) ([]int64, error) {
ret := _m.Called(ctx, upstreamProxyID, rootParentID)
if len(ret) == 0 {
panic("no return value specified for FetchRegistriesIDByUpstreamProxyID")
}
var r0 []int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, int64) ([]int64, error)); ok {
return rf(ctx, upstreamProxyID, rootParentID)
}
if rf, ok := ret.Get(0).(func(context.Context, string, int64) []int64); ok {
r0 = rf(ctx, upstreamProxyID, rootParentID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]int64)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string, int64) error); ok {
r1 = rf(ctx, upstreamProxyID, rootParentID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'FetchRegistriesIDByUpstreamProxyID'
type RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call struct {
*mock.Call
}
// FetchRegistriesIDByUpstreamProxyID is a helper method to define mock.On call
// - ctx context.Context
// - upstreamProxyID string
// - rootParentID int64
func (_e *RegistryRepository_Expecter) FetchRegistriesIDByUpstreamProxyID(ctx interface{}, upstreamProxyID interface{}, rootParentID interface{}) *RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call {
return &RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call{Call: _e.mock.On("FetchRegistriesIDByUpstreamProxyID", ctx, upstreamProxyID, rootParentID)}
}
func (_c *RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call) Run(run func(ctx context.Context, upstreamProxyID string, rootParentID int64)) *RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(string), args[2].(int64))
})
return _c
}
func (_c *RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call) Return(ids []int64, err error) *RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call {
_c.Call.Return(ids, err)
return _c
}
func (_c *RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call) RunAndReturn(run func(context.Context, string, int64) ([]int64, error)) *RegistryRepository_FetchRegistriesIDByUpstreamProxyID_Call {
_c.Call.Return(run)
return _c
}
// FetchUpstreamProxyIDs provides a mock function with given fields: ctx, repokeys, parentID
func (_m *RegistryRepository) FetchUpstreamProxyIDs(ctx context.Context, repokeys []string, parentID int64) ([]int64, error) {
ret := _m.Called(ctx, repokeys, parentID)
if len(ret) == 0 {
panic("no return value specified for FetchUpstreamProxyIDs")
}
var r0 []int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, []string, int64) ([]int64, error)); ok {
return rf(ctx, repokeys, parentID)
}
if rf, ok := ret.Get(0).(func(context.Context, []string, int64) []int64); ok {
r0 = rf(ctx, repokeys, parentID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]int64)
}
}
if rf, ok := ret.Get(1).(func(context.Context, []string, int64) error); ok {
r1 = rf(ctx, repokeys, parentID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_FetchUpstreamProxyIDs_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'FetchUpstreamProxyIDs'
type RegistryRepository_FetchUpstreamProxyIDs_Call struct {
*mock.Call
}
// FetchUpstreamProxyIDs is a helper method to define mock.On call
// - ctx context.Context
// - repokeys []string
// - parentID int64
func (_e *RegistryRepository_Expecter) FetchUpstreamProxyIDs(ctx interface{}, repokeys interface{}, parentID interface{}) *RegistryRepository_FetchUpstreamProxyIDs_Call {
return &RegistryRepository_FetchUpstreamProxyIDs_Call{Call: _e.mock.On("FetchUpstreamProxyIDs", ctx, repokeys, parentID)}
}
func (_c *RegistryRepository_FetchUpstreamProxyIDs_Call) Run(run func(ctx context.Context, repokeys []string, parentID int64)) *RegistryRepository_FetchUpstreamProxyIDs_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].([]string), args[2].(int64))
})
return _c
}
func (_c *RegistryRepository_FetchUpstreamProxyIDs_Call) Return(ids []int64, err error) *RegistryRepository_FetchUpstreamProxyIDs_Call {
_c.Call.Return(ids, err)
return _c
}
func (_c *RegistryRepository_FetchUpstreamProxyIDs_Call) RunAndReturn(run func(context.Context, []string, int64) ([]int64, error)) *RegistryRepository_FetchUpstreamProxyIDs_Call {
_c.Call.Return(run)
return _c
}
// FetchUpstreamProxyKeys provides a mock function with given fields: ctx, ids
func (_m *RegistryRepository) FetchUpstreamProxyKeys(ctx context.Context, ids []int64) ([]string, error) {
ret := _m.Called(ctx, ids)
if len(ret) == 0 {
panic("no return value specified for FetchUpstreamProxyKeys")
}
var r0 []string
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, []int64) ([]string, error)); ok {
return rf(ctx, ids)
}
if rf, ok := ret.Get(0).(func(context.Context, []int64) []string); ok {
r0 = rf(ctx, ids)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]string)
}
}
if rf, ok := ret.Get(1).(func(context.Context, []int64) error); ok {
r1 = rf(ctx, ids)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_FetchUpstreamProxyKeys_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'FetchUpstreamProxyKeys'
type RegistryRepository_FetchUpstreamProxyKeys_Call struct {
*mock.Call
}
// FetchUpstreamProxyKeys is a helper method to define mock.On call
// - ctx context.Context
// - ids []int64
func (_e *RegistryRepository_Expecter) FetchUpstreamProxyKeys(ctx interface{}, ids interface{}) *RegistryRepository_FetchUpstreamProxyKeys_Call {
return &RegistryRepository_FetchUpstreamProxyKeys_Call{Call: _e.mock.On("FetchUpstreamProxyKeys", ctx, ids)}
}
func (_c *RegistryRepository_FetchUpstreamProxyKeys_Call) Run(run func(ctx context.Context, ids []int64)) *RegistryRepository_FetchUpstreamProxyKeys_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].([]int64))
})
return _c
}
func (_c *RegistryRepository_FetchUpstreamProxyKeys_Call) Return(repokeys []string, err error) *RegistryRepository_FetchUpstreamProxyKeys_Call {
_c.Call.Return(repokeys, err)
return _c
}
func (_c *RegistryRepository_FetchUpstreamProxyKeys_Call) RunAndReturn(run func(context.Context, []int64) ([]string, error)) *RegistryRepository_FetchUpstreamProxyKeys_Call {
_c.Call.Return(run)
return _c
}
// GetByUUID provides a mock function with given fields: ctx, uuid
func (_m *RegistryRepository) GetByUUID(ctx context.Context, uuid string) (*types.Registry, error) {
ret := _m.Called(ctx, uuid)
if len(ret) == 0 {
panic("no return value specified for GetByUUID")
}
var r0 *types.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) (*types.Registry, error)); ok {
return rf(ctx, uuid)
}
if rf, ok := ret.Get(0).(func(context.Context, string) *types.Registry); ok {
r0 = rf(ctx, uuid)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, uuid)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_GetByUUID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByUUID'
type RegistryRepository_GetByUUID_Call struct {
*mock.Call
}
// GetByUUID is a helper method to define mock.On call
// - ctx context.Context
// - uuid string
func (_e *RegistryRepository_Expecter) GetByUUID(ctx interface{}, uuid interface{}) *RegistryRepository_GetByUUID_Call {
return &RegistryRepository_GetByUUID_Call{Call: _e.mock.On("GetByUUID", ctx, uuid)}
}
func (_c *RegistryRepository_GetByUUID_Call) Run(run func(ctx context.Context, uuid string)) *RegistryRepository_GetByUUID_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(string))
})
return _c
}
func (_c *RegistryRepository_GetByUUID_Call) Return(registry *types.Registry, err error) *RegistryRepository_GetByUUID_Call {
_c.Call.Return(registry, err)
return _c
}
func (_c *RegistryRepository_GetByUUID_Call) RunAndReturn(run func(context.Context, string) (*types.Registry, error)) *RegistryRepository_GetByUUID_Call {
_c.Call.Return(run)
return _c
}
// Get provides a mock function with given fields: ctx, id
func (_m *RegistryRepository) Get(ctx context.Context, id int64) (*types.Registry, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for Get")
}
var r0 *types.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*types.Registry, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.Registry); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_Get_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Get'
type RegistryRepository_Get_Call struct {
*mock.Call
}
// Get is a helper method to define mock.On call
// - ctx context.Context
// - id int64
func (_e *RegistryRepository_Expecter) Get(ctx interface{}, id interface{}) *RegistryRepository_Get_Call {
return &RegistryRepository_Get_Call{Call: _e.mock.On("Get", ctx, id)}
}
func (_c *RegistryRepository_Get_Call) Run(run func(ctx context.Context, id int64)) *RegistryRepository_Get_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64))
})
return _c
}
func (_c *RegistryRepository_Get_Call) Return(repository *types.Registry, err error) *RegistryRepository_Get_Call {
_c.Call.Return(repository, err)
return _c
}
func (_c *RegistryRepository_Get_Call) RunAndReturn(run func(context.Context, int64) (*types.Registry, error)) *RegistryRepository_Get_Call {
_c.Call.Return(run)
return _c
}
// GetAll provides a mock function with given fields: ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search, repoType, recursive
func (_m *RegistryRepository) GetAll(ctx context.Context, parentIDs []int64, packageTypes []string, sortByField string, sortByOrder string, limit int, offset int, search string, repoType string) (*[]store.RegistryMetadata, error) {
ret := _m.Called(ctx, parentIDs, packageTypes, sortByField, sortByOrder, limit, offset, search, repoType)
if len(ret) == 0 {
panic("no return value specified for GetAll")
}
var r0 *[]store.RegistryMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, []int64, []string, string, string, int, int, string, string) (*[]store.RegistryMetadata, error)); ok {
return rf(ctx, parentIDs, packageTypes, sortByField, sortByOrder, limit, offset, search, repoType)
}
if rf, ok := ret.Get(0).(func(context.Context, []int64, []string, string, string, int, int, string, string) *[]store.RegistryMetadata); ok {
r0 = rf(ctx, parentIDs, packageTypes, sortByField, sortByOrder, limit, offset, search, repoType)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]store.RegistryMetadata)
}
}
if rf, ok := ret.Get(1).(func(context.Context, []int64, []string, string, string, int, int, string, string) error); ok {
r1 = rf(ctx, parentIDs, packageTypes, sortByField, sortByOrder, limit, offset, search, repoType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_GetAll_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetAll'
type RegistryRepository_GetAll_Call struct {
*mock.Call
}
// GetAll is a helper method to define mock.On call
// - ctx context.Context
// - parentIDs []int64
// - packageTypes []string
// - sortByField string
// - sortByOrder string
// - limit int
// - offset int
// - search string
// - repoType string
func (_e *RegistryRepository_Expecter) GetAll(ctx interface{}, parentIDs interface{}, packageTypes interface{}, sortByField interface{}, sortByOrder interface{}, limit interface{}, offset interface{}, search interface{}, repoType interface{}) *RegistryRepository_GetAll_Call {
return &RegistryRepository_GetAll_Call{Call: _e.mock.On("GetAll", ctx, parentIDs, packageTypes, sortByField, sortByOrder, limit, offset, search, repoType)}
}
func (_c *RegistryRepository_GetAll_Call) Run(run func(ctx context.Context, parentIDs []int64, packageTypes []string, sortByField string, sortByOrder string, limit int, offset int, search string, repoType string)) *RegistryRepository_GetAll_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].([]int64), args[2].([]string), args[3].(string), args[4].(string), args[5].(int), args[6].(int), args[7].(string), args[8].(string))
})
return _c
}
func (_c *RegistryRepository_GetAll_Call) Return(repos *[]store.RegistryMetadata, err error) *RegistryRepository_GetAll_Call {
_c.Call.Return(repos, err)
return _c
}
func (_c *RegistryRepository_GetAll_Call) RunAndReturn(run func(context.Context, int64, []string, string, string, int, int, string, string, bool) (*[]store.RegistryMetadata, error)) *RegistryRepository_GetAll_Call {
_c.Call.Return(run)
return _c
}
// GetByIDIn provides a mock function with given fields: ctx, ids
func (_m *RegistryRepository) GetByIDIn(ctx context.Context, ids []int64) (*[]types.Registry, error) {
ret := _m.Called(ctx, ids)
if len(ret) == 0 {
panic("no return value specified for GetByIDIn")
}
var r0 *[]types.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, []int64) (*[]types.Registry, error)); ok {
return rf(ctx, ids)
}
if rf, ok := ret.Get(0).(func(context.Context, []int64) *[]types.Registry); ok {
r0 = rf(ctx, ids)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, []int64) error); ok {
r1 = rf(ctx, ids)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_GetByIDIn_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByIDIn'
type RegistryRepository_GetByIDIn_Call struct {
*mock.Call
}
// GetByIDIn is a helper method to define mock.On call
// - ctx context.Context
// - ids []int64
func (_e *RegistryRepository_Expecter) GetByIDIn(ctx interface{}, ids interface{}) *RegistryRepository_GetByIDIn_Call {
return &RegistryRepository_GetByIDIn_Call{Call: _e.mock.On("GetByIDIn", ctx, ids)}
}
func (_c *RegistryRepository_GetByIDIn_Call) Run(run func(ctx context.Context, ids []int64)) *RegistryRepository_GetByIDIn_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].([]int64))
})
return _c
}
func (_c *RegistryRepository_GetByIDIn_Call) Return(registries *[]types.Registry, err error) *RegistryRepository_GetByIDIn_Call {
_c.Call.Return(registries, err)
return _c
}
func (_c *RegistryRepository_GetByIDIn_Call) RunAndReturn(run func(context.Context, []int64) (*[]types.Registry, error)) *RegistryRepository_GetByIDIn_Call {
_c.Call.Return(run)
return _c
}
// GetByParentIDAndName provides a mock function with given fields: ctx, parentID, name
func (_m *RegistryRepository) GetByParentIDAndName(ctx context.Context, parentID int64, name string) (*types.Registry, error) {
ret := _m.Called(ctx, parentID, name)
if len(ret) == 0 {
panic("no return value specified for GetByParentIDAndName")
}
var r0 *types.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (*types.Registry, error)); ok {
return rf(ctx, parentID, name)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.Registry); ok {
r0 = rf(ctx, parentID, name)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, parentID, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_GetByParentIDAndName_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByParentIDAndName'
type RegistryRepository_GetByParentIDAndName_Call struct {
*mock.Call
}
// GetByParentIDAndName is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - name string
func (_e *RegistryRepository_Expecter) GetByParentIDAndName(ctx interface{}, parentID interface{}, name interface{}) *RegistryRepository_GetByParentIDAndName_Call {
return &RegistryRepository_GetByParentIDAndName_Call{Call: _e.mock.On("GetByParentIDAndName", ctx, parentID, name)}
}
func (_c *RegistryRepository_GetByParentIDAndName_Call) Run(run func(ctx context.Context, parentID int64, name string)) *RegistryRepository_GetByParentIDAndName_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string))
})
return _c
}
func (_c *RegistryRepository_GetByParentIDAndName_Call) Return(registry *types.Registry, err error) *RegistryRepository_GetByParentIDAndName_Call {
_c.Call.Return(registry, err)
return _c
}
func (_c *RegistryRepository_GetByParentIDAndName_Call) RunAndReturn(run func(context.Context, int64, string) (*types.Registry, error)) *RegistryRepository_GetByParentIDAndName_Call {
_c.Call.Return(run)
return _c
}
// GetByRootParentIDAndName provides a mock function with given fields: ctx, parentID, name
func (_m *RegistryRepository) GetByRootParentIDAndName(ctx context.Context, parentID int64, name string) (*types.Registry, error) {
ret := _m.Called(ctx, parentID, name)
if len(ret) == 0 {
panic("no return value specified for GetByRootParentIDAndName")
}
var r0 *types.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (*types.Registry, error)); ok {
return rf(ctx, parentID, name)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.Registry); ok {
r0 = rf(ctx, parentID, name)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, parentID, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryRepository_GetByRootParentIDAndName_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByRootParentIDAndName'
type RegistryRepository_GetByRootParentIDAndName_Call struct {
*mock.Call
}
// GetByRootParentIDAndName is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - name string
func (_e *RegistryRepository_Expecter) GetByRootParentIDAndName(ctx interface{}, parentID interface{}, name interface{}) *RegistryRepository_GetByRootParentIDAndName_Call {
return &RegistryRepository_GetByRootParentIDAndName_Call{Call: _e.mock.On("GetByRootParentIDAndName", ctx, parentID, name)}
}
func (_c *RegistryRepository_GetByRootParentIDAndName_Call) Run(run func(ctx context.Context, parentID int64, name string)) *RegistryRepository_GetByRootParentIDAndName_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string))
})
return _c
}
func (_c *RegistryRepository_GetByRootParentIDAndName_Call) Return(registry *types.Registry, err error) *RegistryRepository_GetByRootParentIDAndName_Call {
_c.Call.Return(registry, err)
return _c
}
func (_c *RegistryRepository_GetByRootParentIDAndName_Call) RunAndReturn(run func(context.Context, int64, string) (*types.Registry, error)) *RegistryRepository_GetByRootParentIDAndName_Call {
_c.Call.Return(run)
return _c
}
// Update provides a mock function with given fields: ctx, repository
func (_m *RegistryRepository) Update(ctx context.Context, repository *types.Registry) error {
ret := _m.Called(ctx, repository)
if len(ret) == 0 {
panic("no return value specified for Update")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Registry) error); ok {
r0 = rf(ctx, repository)
} else {
r0 = ret.Error(0)
}
return r0
}
// RegistryRepository_Update_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Update'
type RegistryRepository_Update_Call struct {
*mock.Call
}
// Update is a helper method to define mock.On call
// - ctx context.Context
// - repository *types.Registry
func (_e *RegistryRepository_Expecter) Update(ctx interface{}, repository interface{}) *RegistryRepository_Update_Call {
return &RegistryRepository_Update_Call{Call: _e.mock.On("Update", ctx, repository)}
}
func (_c *RegistryRepository_Update_Call) Run(run func(ctx context.Context, repository *types.Registry)) *RegistryRepository_Update_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.Registry))
})
return _c
}
func (_c *RegistryRepository_Update_Call) Return(err error) *RegistryRepository_Update_Call {
_c.Call.Return(err)
return _c
}
func (_c *RegistryRepository_Update_Call) RunAndReturn(run func(context.Context, *types.Registry) error) *RegistryRepository_Update_Call {
_c.Call.Return(run)
return _c
}
// NewRegistryRepository creates a new instance of RegistryRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewRegistryRepository(t interface {
mock.TestingT
Cleanup(func())
}) *RegistryRepository {
mock := &RegistryRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/tag_repository.go | registry/app/api/controller/mocks/tag_repository.go | // Code generated by mockery; DO NOT EDIT.
// github.com/vektra/mockery
// template: testify
package mocks
import (
"context"
"github.com/harness/gitness/registry/types"
mock "github.com/stretchr/testify/mock"
)
// NewMockTagRepository creates a new instance of MockTagRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewMockTagRepository(t interface {
mock.TestingT
Cleanup(func())
}) *MockTagRepository {
mock := &MockTagRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
// MockTagRepository is an autogenerated mock type for the TagRepository type
type MockTagRepository struct {
mock.Mock
}
type MockTagRepository_Expecter struct {
mock *mock.Mock
}
func (_m *MockTagRepository) EXPECT() *MockTagRepository_Expecter {
return &MockTagRepository_Expecter{mock: &_m.Mock}
}
// CountAllArtifactsByParentID provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) CountAllArtifactsByParentID(ctx context.Context, parentID int64, registryIDs *[]string, search string, latestVersion bool, packageTypes []string, untaggedImagesEnabled bool) (int64, error) {
ret := _mock.Called(ctx, parentID, registryIDs, search, latestVersion, packageTypes, untaggedImagesEnabled)
if len(ret) == 0 {
panic("no return value specified for CountAllArtifactsByParentID")
}
var r0 int64
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, bool, []string, bool) (int64, error)); ok {
return returnFunc(ctx, parentID, registryIDs, search, latestVersion, packageTypes, untaggedImagesEnabled)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, bool, []string, bool) int64); ok {
r0 = returnFunc(ctx, parentID, registryIDs, search, latestVersion, packageTypes, untaggedImagesEnabled)
} else {
r0 = ret.Get(0).(int64)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, *[]string, string, bool, []string, bool) error); ok {
r1 = returnFunc(ctx, parentID, registryIDs, search, latestVersion, packageTypes, untaggedImagesEnabled)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_CountAllArtifactsByParentID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CountAllArtifactsByParentID'
type MockTagRepository_CountAllArtifactsByParentID_Call struct {
*mock.Call
}
// CountAllArtifactsByParentID is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - registryIDs *[]string
// - search string
// - latestVersion bool
// - packageTypes []string
// - untaggedImagesEnabled bool
func (_e *MockTagRepository_Expecter) CountAllArtifactsByParentID(ctx interface{}, parentID interface{}, registryIDs interface{}, search interface{}, latestVersion interface{}, packageTypes interface{}, untaggedImagesEnabled interface{}) *MockTagRepository_CountAllArtifactsByParentID_Call {
return &MockTagRepository_CountAllArtifactsByParentID_Call{Call: _e.mock.On("CountAllArtifactsByParentID", ctx, parentID, registryIDs, search, latestVersion, packageTypes, untaggedImagesEnabled)}
}
func (_c *MockTagRepository_CountAllArtifactsByParentID_Call) Run(run func(ctx context.Context, parentID int64, registryIDs *[]string, search string, latestVersion bool, packageTypes []string, untaggedImagesEnabled bool)) *MockTagRepository_CountAllArtifactsByParentID_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 *[]string
if args[2] != nil {
arg2 = args[2].(*[]string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
var arg4 bool
if args[4] != nil {
arg4 = args[4].(bool)
}
var arg5 []string
if args[5] != nil {
arg5 = args[5].([]string)
}
var arg6 bool
if args[6] != nil {
arg6 = args[6].(bool)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
arg5,
arg6,
)
})
return _c
}
func (_c *MockTagRepository_CountAllArtifactsByParentID_Call) Return(n int64, err error) *MockTagRepository_CountAllArtifactsByParentID_Call {
_c.Call.Return(n, err)
return _c
}
func (_c *MockTagRepository_CountAllArtifactsByParentID_Call) RunAndReturn(run func(ctx context.Context, parentID int64, registryIDs *[]string, search string, latestVersion bool, packageTypes []string, untaggedImagesEnabled bool) (int64, error)) *MockTagRepository_CountAllArtifactsByParentID_Call {
_c.Call.Return(run)
return _c
}
// CountAllArtifactsByRepo provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) CountAllArtifactsByRepo(ctx context.Context, parentID int64, repoKey string, search string, labels []string) (int64, error) {
ret := _mock.Called(ctx, parentID, repoKey, search, labels)
if len(ret) == 0 {
panic("no return value specified for CountAllArtifactsByRepo")
}
var r0 int64
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string, []string) (int64, error)); ok {
return returnFunc(ctx, parentID, repoKey, search, labels)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string, []string) int64); ok {
r0 = returnFunc(ctx, parentID, repoKey, search, labels)
} else {
r0 = ret.Get(0).(int64)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, string, string, []string) error); ok {
r1 = returnFunc(ctx, parentID, repoKey, search, labels)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_CountAllArtifactsByRepo_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CountAllArtifactsByRepo'
type MockTagRepository_CountAllArtifactsByRepo_Call struct {
*mock.Call
}
// CountAllArtifactsByRepo is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - repoKey string
// - search string
// - labels []string
func (_e *MockTagRepository_Expecter) CountAllArtifactsByRepo(ctx interface{}, parentID interface{}, repoKey interface{}, search interface{}, labels interface{}) *MockTagRepository_CountAllArtifactsByRepo_Call {
return &MockTagRepository_CountAllArtifactsByRepo_Call{Call: _e.mock.On("CountAllArtifactsByRepo", ctx, parentID, repoKey, search, labels)}
}
func (_c *MockTagRepository_CountAllArtifactsByRepo_Call) Run(run func(ctx context.Context, parentID int64, repoKey string, search string, labels []string)) *MockTagRepository_CountAllArtifactsByRepo_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
var arg4 []string
if args[4] != nil {
arg4 = args[4].([]string)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
)
})
return _c
}
func (_c *MockTagRepository_CountAllArtifactsByRepo_Call) Return(n int64, err error) *MockTagRepository_CountAllArtifactsByRepo_Call {
_c.Call.Return(n, err)
return _c
}
func (_c *MockTagRepository_CountAllArtifactsByRepo_Call) RunAndReturn(run func(ctx context.Context, parentID int64, repoKey string, search string, labels []string) (int64, error)) *MockTagRepository_CountAllArtifactsByRepo_Call {
_c.Call.Return(run)
return _c
}
// CountAllTagsByRepoAndImage provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) CountAllTagsByRepoAndImage(ctx context.Context, parentID int64, repoKey string, image string, search string) (int64, error) {
ret := _mock.Called(ctx, parentID, repoKey, image, search)
if len(ret) == 0 {
panic("no return value specified for CountAllTagsByRepoAndImage")
}
var r0 int64
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string, string) (int64, error)); ok {
return returnFunc(ctx, parentID, repoKey, image, search)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string, string) int64); ok {
r0 = returnFunc(ctx, parentID, repoKey, image, search)
} else {
r0 = ret.Get(0).(int64)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, string, string, string) error); ok {
r1 = returnFunc(ctx, parentID, repoKey, image, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_CountAllTagsByRepoAndImage_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CountAllTagsByRepoAndImage'
type MockTagRepository_CountAllTagsByRepoAndImage_Call struct {
*mock.Call
}
// CountAllTagsByRepoAndImage is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - repoKey string
// - image string
// - search string
func (_e *MockTagRepository_Expecter) CountAllTagsByRepoAndImage(ctx interface{}, parentID interface{}, repoKey interface{}, image interface{}, search interface{}) *MockTagRepository_CountAllTagsByRepoAndImage_Call {
return &MockTagRepository_CountAllTagsByRepoAndImage_Call{Call: _e.mock.On("CountAllTagsByRepoAndImage", ctx, parentID, repoKey, image, search)}
}
func (_c *MockTagRepository_CountAllTagsByRepoAndImage_Call) Run(run func(ctx context.Context, parentID int64, repoKey string, image string, search string)) *MockTagRepository_CountAllTagsByRepoAndImage_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
var arg4 string
if args[4] != nil {
arg4 = args[4].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
)
})
return _c
}
func (_c *MockTagRepository_CountAllTagsByRepoAndImage_Call) Return(n int64, err error) *MockTagRepository_CountAllTagsByRepoAndImage_Call {
_c.Call.Return(n, err)
return _c
}
func (_c *MockTagRepository_CountAllTagsByRepoAndImage_Call) RunAndReturn(run func(ctx context.Context, parentID int64, repoKey string, image string, search string) (int64, error)) *MockTagRepository_CountAllTagsByRepoAndImage_Call {
_c.Call.Return(run)
return _c
}
// CountOciVersionByRepoAndImage provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) CountOciVersionByRepoAndImage(ctx context.Context, parentID int64, repoKey string, image string, search string) (int64, error) {
ret := _mock.Called(ctx, parentID, repoKey, image, search)
if len(ret) == 0 {
panic("no return value specified for CountOciVersionByRepoAndImage")
}
var r0 int64
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string, string) (int64, error)); ok {
return returnFunc(ctx, parentID, repoKey, image, search)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string, string) int64); ok {
r0 = returnFunc(ctx, parentID, repoKey, image, search)
} else {
r0 = ret.Get(0).(int64)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, string, string, string) error); ok {
r1 = returnFunc(ctx, parentID, repoKey, image, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_CountOciVersionByRepoAndImage_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CountOciVersionByRepoAndImage'
type MockTagRepository_CountOciVersionByRepoAndImage_Call struct {
*mock.Call
}
// CountOciVersionByRepoAndImage is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - repoKey string
// - image string
// - search string
func (_e *MockTagRepository_Expecter) CountOciVersionByRepoAndImage(ctx interface{}, parentID interface{}, repoKey interface{}, image interface{}, search interface{}) *MockTagRepository_CountOciVersionByRepoAndImage_Call {
return &MockTagRepository_CountOciVersionByRepoAndImage_Call{Call: _e.mock.On("CountOciVersionByRepoAndImage", ctx, parentID, repoKey, image, search)}
}
func (_c *MockTagRepository_CountOciVersionByRepoAndImage_Call) Run(run func(ctx context.Context, parentID int64, repoKey string, image string, search string)) *MockTagRepository_CountOciVersionByRepoAndImage_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
var arg4 string
if args[4] != nil {
arg4 = args[4].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
)
})
return _c
}
func (_c *MockTagRepository_CountOciVersionByRepoAndImage_Call) Return(n int64, err error) *MockTagRepository_CountOciVersionByRepoAndImage_Call {
_c.Call.Return(n, err)
return _c
}
func (_c *MockTagRepository_CountOciVersionByRepoAndImage_Call) RunAndReturn(run func(ctx context.Context, parentID int64, repoKey string, image string, search string) (int64, error)) *MockTagRepository_CountOciVersionByRepoAndImage_Call {
_c.Call.Return(run)
return _c
}
// CreateOrUpdate provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) CreateOrUpdate(ctx context.Context, t *types.Tag) error {
ret := _mock.Called(ctx, t)
if len(ret) == 0 {
panic("no return value specified for CreateOrUpdate")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, *types.Tag) error); ok {
r0 = returnFunc(ctx, t)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockTagRepository_CreateOrUpdate_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CreateOrUpdate'
type MockTagRepository_CreateOrUpdate_Call struct {
*mock.Call
}
// CreateOrUpdate is a helper method to define mock.On call
// - ctx context.Context
// - t *types.Tag
func (_e *MockTagRepository_Expecter) CreateOrUpdate(ctx interface{}, t interface{}) *MockTagRepository_CreateOrUpdate_Call {
return &MockTagRepository_CreateOrUpdate_Call{Call: _e.mock.On("CreateOrUpdate", ctx, t)}
}
func (_c *MockTagRepository_CreateOrUpdate_Call) Run(run func(ctx context.Context, t *types.Tag)) *MockTagRepository_CreateOrUpdate_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 *types.Tag
if args[1] != nil {
arg1 = args[1].(*types.Tag)
}
run(
arg0,
arg1,
)
})
return _c
}
func (_c *MockTagRepository_CreateOrUpdate_Call) Return(err error) *MockTagRepository_CreateOrUpdate_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockTagRepository_CreateOrUpdate_Call) RunAndReturn(run func(ctx context.Context, t *types.Tag) error) *MockTagRepository_CreateOrUpdate_Call {
_c.Call.Return(run)
return _c
}
// DeleteTag provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) DeleteTag(ctx context.Context, registryID int64, imageName string, name string) error {
ret := _mock.Called(ctx, registryID, imageName, name)
if len(ret) == 0 {
panic("no return value specified for DeleteTag")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string) error); ok {
r0 = returnFunc(ctx, registryID, imageName, name)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockTagRepository_DeleteTag_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteTag'
type MockTagRepository_DeleteTag_Call struct {
*mock.Call
}
// DeleteTag is a helper method to define mock.On call
// - ctx context.Context
// - registryID int64
// - imageName string
// - name string
func (_e *MockTagRepository_Expecter) DeleteTag(ctx interface{}, registryID interface{}, imageName interface{}, name interface{}) *MockTagRepository_DeleteTag_Call {
return &MockTagRepository_DeleteTag_Call{Call: _e.mock.On("DeleteTag", ctx, registryID, imageName, name)}
}
func (_c *MockTagRepository_DeleteTag_Call) Run(run func(ctx context.Context, registryID int64, imageName string, name string)) *MockTagRepository_DeleteTag_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
)
})
return _c
}
func (_c *MockTagRepository_DeleteTag_Call) Return(err error) *MockTagRepository_DeleteTag_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockTagRepository_DeleteTag_Call) RunAndReturn(run func(ctx context.Context, registryID int64, imageName string, name string) error) *MockTagRepository_DeleteTag_Call {
_c.Call.Return(run)
return _c
}
// DeleteTagByManifestID provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) DeleteTagByManifestID(ctx context.Context, repoID int64, manifestID int64) (bool, error) {
ret := _mock.Called(ctx, repoID, manifestID)
if len(ret) == 0 {
panic("no return value specified for DeleteTagByManifestID")
}
var r0 bool
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, int64) (bool, error)); ok {
return returnFunc(ctx, repoID, manifestID)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, int64) bool); ok {
r0 = returnFunc(ctx, repoID, manifestID)
} else {
r0 = ret.Get(0).(bool)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, int64) error); ok {
r1 = returnFunc(ctx, repoID, manifestID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_DeleteTagByManifestID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteTagByManifestID'
type MockTagRepository_DeleteTagByManifestID_Call struct {
*mock.Call
}
// DeleteTagByManifestID is a helper method to define mock.On call
// - ctx context.Context
// - repoID int64
// - manifestID int64
func (_e *MockTagRepository_Expecter) DeleteTagByManifestID(ctx interface{}, repoID interface{}, manifestID interface{}) *MockTagRepository_DeleteTagByManifestID_Call {
return &MockTagRepository_DeleteTagByManifestID_Call{Call: _e.mock.On("DeleteTagByManifestID", ctx, repoID, manifestID)}
}
func (_c *MockTagRepository_DeleteTagByManifestID_Call) Run(run func(ctx context.Context, repoID int64, manifestID int64)) *MockTagRepository_DeleteTagByManifestID_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 int64
if args[2] != nil {
arg2 = args[2].(int64)
}
run(
arg0,
arg1,
arg2,
)
})
return _c
}
func (_c *MockTagRepository_DeleteTagByManifestID_Call) Return(b bool, err error) *MockTagRepository_DeleteTagByManifestID_Call {
_c.Call.Return(b, err)
return _c
}
func (_c *MockTagRepository_DeleteTagByManifestID_Call) RunAndReturn(run func(ctx context.Context, repoID int64, manifestID int64) (bool, error)) *MockTagRepository_DeleteTagByManifestID_Call {
_c.Call.Return(run)
return _c
}
// DeleteTagByName provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) DeleteTagByName(ctx context.Context, repoID int64, name string) (bool, error) {
ret := _mock.Called(ctx, repoID, name)
if len(ret) == 0 {
panic("no return value specified for DeleteTagByName")
}
var r0 bool
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string) (bool, error)); ok {
return returnFunc(ctx, repoID, name)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string) bool); ok {
r0 = returnFunc(ctx, repoID, name)
} else {
r0 = ret.Get(0).(bool)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = returnFunc(ctx, repoID, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_DeleteTagByName_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteTagByName'
type MockTagRepository_DeleteTagByName_Call struct {
*mock.Call
}
// DeleteTagByName is a helper method to define mock.On call
// - ctx context.Context
// - repoID int64
// - name string
func (_e *MockTagRepository_Expecter) DeleteTagByName(ctx interface{}, repoID interface{}, name interface{}) *MockTagRepository_DeleteTagByName_Call {
return &MockTagRepository_DeleteTagByName_Call{Call: _e.mock.On("DeleteTagByName", ctx, repoID, name)}
}
func (_c *MockTagRepository_DeleteTagByName_Call) Run(run func(ctx context.Context, repoID int64, name string)) *MockTagRepository_DeleteTagByName_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
run(
arg0,
arg1,
arg2,
)
})
return _c
}
func (_c *MockTagRepository_DeleteTagByName_Call) Return(b bool, err error) *MockTagRepository_DeleteTagByName_Call {
_c.Call.Return(b, err)
return _c
}
func (_c *MockTagRepository_DeleteTagByName_Call) RunAndReturn(run func(ctx context.Context, repoID int64, name string) (bool, error)) *MockTagRepository_DeleteTagByName_Call {
_c.Call.Return(run)
return _c
}
// DeleteTagsByImageName provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) DeleteTagsByImageName(ctx context.Context, registryID int64, imageName string) error {
ret := _mock.Called(ctx, registryID, imageName)
if len(ret) == 0 {
panic("no return value specified for DeleteTagsByImageName")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string) error); ok {
r0 = returnFunc(ctx, registryID, imageName)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockTagRepository_DeleteTagsByImageName_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteTagsByImageName'
type MockTagRepository_DeleteTagsByImageName_Call struct {
*mock.Call
}
// DeleteTagsByImageName is a helper method to define mock.On call
// - ctx context.Context
// - registryID int64
// - imageName string
func (_e *MockTagRepository_Expecter) DeleteTagsByImageName(ctx interface{}, registryID interface{}, imageName interface{}) *MockTagRepository_DeleteTagsByImageName_Call {
return &MockTagRepository_DeleteTagsByImageName_Call{Call: _e.mock.On("DeleteTagsByImageName", ctx, registryID, imageName)}
}
func (_c *MockTagRepository_DeleteTagsByImageName_Call) Run(run func(ctx context.Context, registryID int64, imageName string)) *MockTagRepository_DeleteTagsByImageName_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
run(
arg0,
arg1,
arg2,
)
})
return _c
}
func (_c *MockTagRepository_DeleteTagsByImageName_Call) Return(err error) *MockTagRepository_DeleteTagsByImageName_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockTagRepository_DeleteTagsByImageName_Call) RunAndReturn(run func(ctx context.Context, registryID int64, imageName string) error) *MockTagRepository_DeleteTagsByImageName_Call {
_c.Call.Return(run)
return _c
}
// FindTag provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) FindTag(ctx context.Context, repoID int64, imageName string, name string) (*types.Tag, error) {
ret := _mock.Called(ctx, repoID, imageName, name)
if len(ret) == 0 {
panic("no return value specified for FindTag")
}
var r0 *types.Tag
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string) (*types.Tag, error)); ok {
return returnFunc(ctx, repoID, imageName, name)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string) *types.Tag); ok {
r0 = returnFunc(ctx, repoID, imageName, name)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Tag)
}
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, string, string) error); ok {
r1 = returnFunc(ctx, repoID, imageName, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_FindTag_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'FindTag'
type MockTagRepository_FindTag_Call struct {
*mock.Call
}
// FindTag is a helper method to define mock.On call
// - ctx context.Context
// - repoID int64
// - imageName string
// - name string
func (_e *MockTagRepository_Expecter) FindTag(ctx interface{}, repoID interface{}, imageName interface{}, name interface{}) *MockTagRepository_FindTag_Call {
return &MockTagRepository_FindTag_Call{Call: _e.mock.On("FindTag", ctx, repoID, imageName, name)}
}
func (_c *MockTagRepository_FindTag_Call) Run(run func(ctx context.Context, repoID int64, imageName string, name string)) *MockTagRepository_FindTag_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
)
})
return _c
}
func (_c *MockTagRepository_FindTag_Call) Return(tag *types.Tag, err error) *MockTagRepository_FindTag_Call {
_c.Call.Return(tag, err)
return _c
}
func (_c *MockTagRepository_FindTag_Call) RunAndReturn(run func(ctx context.Context, repoID int64, imageName string, name string) (*types.Tag, error)) *MockTagRepository_FindTag_Call {
_c.Call.Return(run)
return _c
}
// GetAllArtifactsByParentID provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) GetAllArtifactsByParentID(ctx context.Context, parentID int64, registryIDs *[]string, sortByField string, sortByOrder string, limit int, offset int, search string, latestVersion bool, packageTypes []string) (*[]types.ArtifactMetadata, error) {
ret := _mock.Called(ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, latestVersion, packageTypes)
if len(ret) == 0 {
panic("no return value specified for GetAllArtifactsByParentID")
}
var r0 *[]types.ArtifactMetadata
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, string, int, int, string, bool, []string) (*[]types.ArtifactMetadata, error)); ok {
return returnFunc(ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, latestVersion, packageTypes)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, string, int, int, string, bool, []string) *[]types.ArtifactMetadata); ok {
r0 = returnFunc(ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, latestVersion, packageTypes)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.ArtifactMetadata)
}
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, *[]string, string, string, int, int, string, bool, []string) error); ok {
r1 = returnFunc(ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, latestVersion, packageTypes)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_GetAllArtifactsByParentID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetAllArtifactsByParentID'
type MockTagRepository_GetAllArtifactsByParentID_Call struct {
*mock.Call
}
// GetAllArtifactsByParentID is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - registryIDs *[]string
// - sortByField string
// - sortByOrder string
// - limit int
// - offset int
// - search string
// - latestVersion bool
// - packageTypes []string
func (_e *MockTagRepository_Expecter) GetAllArtifactsByParentID(ctx interface{}, parentID interface{}, registryIDs interface{}, sortByField interface{}, sortByOrder interface{}, limit interface{}, offset interface{}, search interface{}, latestVersion interface{}, packageTypes interface{}) *MockTagRepository_GetAllArtifactsByParentID_Call {
return &MockTagRepository_GetAllArtifactsByParentID_Call{Call: _e.mock.On("GetAllArtifactsByParentID", ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, latestVersion, packageTypes)}
}
func (_c *MockTagRepository_GetAllArtifactsByParentID_Call) Run(run func(ctx context.Context, parentID int64, registryIDs *[]string, sortByField string, sortByOrder string, limit int, offset int, search string, latestVersion bool, packageTypes []string)) *MockTagRepository_GetAllArtifactsByParentID_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 *[]string
if args[2] != nil {
arg2 = args[2].(*[]string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
var arg4 string
if args[4] != nil {
arg4 = args[4].(string)
}
var arg5 int
if args[5] != nil {
arg5 = args[5].(int)
}
var arg6 int
if args[6] != nil {
arg6 = args[6].(int)
}
var arg7 string
if args[7] != nil {
arg7 = args[7].(string)
}
var arg8 bool
if args[8] != nil {
arg8 = args[8].(bool)
}
var arg9 []string
if args[9] != nil {
arg9 = args[9].([]string)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
arg5,
arg6,
arg7,
arg8,
arg9,
)
})
return _c
}
func (_c *MockTagRepository_GetAllArtifactsByParentID_Call) Return(artifactMetadatas *[]types.ArtifactMetadata, err error) *MockTagRepository_GetAllArtifactsByParentID_Call {
_c.Call.Return(artifactMetadatas, err)
return _c
}
func (_c *MockTagRepository_GetAllArtifactsByParentID_Call) RunAndReturn(run func(ctx context.Context, parentID int64, registryIDs *[]string, sortByField string, sortByOrder string, limit int, offset int, search string, latestVersion bool, packageTypes []string) (*[]types.ArtifactMetadata, error)) *MockTagRepository_GetAllArtifactsByParentID_Call {
_c.Call.Return(run)
return _c
}
// GetAllArtifactsByParentIDUntagged provides a mock function for the type MockTagRepository
func (_mock *MockTagRepository) GetAllArtifactsByParentIDUntagged(ctx context.Context, parentID int64, registryIDs *[]string, sortByField string, sortByOrder string, limit int, offset int, search string, packageTypes []string) (*[]types.ArtifactMetadata, error) {
ret := _mock.Called(ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, packageTypes)
if len(ret) == 0 {
panic("no return value specified for GetAllArtifactsByParentIDUntagged")
}
var r0 *[]types.ArtifactMetadata
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, string, int, int, string, []string) (*[]types.ArtifactMetadata, error)); ok {
return returnFunc(ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, packageTypes)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, *[]string, string, string, int, int, string, []string) *[]types.ArtifactMetadata); ok {
r0 = returnFunc(ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, packageTypes)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.ArtifactMetadata)
}
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64, *[]string, string, string, int, int, string, []string) error); ok {
r1 = returnFunc(ctx, parentID, registryIDs, sortByField, sortByOrder, limit, offset, search, packageTypes)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockTagRepository_GetAllArtifactsByParentIDUntagged_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetAllArtifactsByParentIDUntagged'
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | true |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/Service.go | registry/app/api/controller/mocks/Service.go | // Code generated by mockery v2.53.5. DO NOT EDIT.
package mocks
import (
context "context"
enum "github.com/harness/gitness/types/enum"
mock "github.com/stretchr/testify/mock"
)
// Service is an autogenerated mock type for the Service type
type Service struct {
mock.Mock
}
type Service_Expecter struct {
mock *mock.Mock
}
func (_m *Service) EXPECT() *Service_Expecter {
return &Service_Expecter{mock: &_m.Mock}
}
// Delete provides a mock function with given fields: ctx, resourceType, resourcePath
func (_m *Service) Delete(ctx context.Context, resourceType enum.PublicResourceType, resourcePath string) error {
ret := _m.Called(ctx, resourceType, resourcePath)
if len(ret) == 0 {
panic("no return value specified for Delete")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, enum.PublicResourceType, string) error); ok {
r0 = rf(ctx, resourceType, resourcePath)
} else {
r0 = ret.Error(0)
}
return r0
}
// Service_Delete_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Delete'
type Service_Delete_Call struct {
*mock.Call
}
// Delete is a helper method to define mock.On call
// - ctx context.Context
// - resourceType enum.PublicResourceType
// - resourcePath string
func (_e *Service_Expecter) Delete(ctx interface{}, resourceType interface{}, resourcePath interface{}) *Service_Delete_Call {
return &Service_Delete_Call{Call: _e.mock.On("Delete", ctx, resourceType, resourcePath)}
}
func (_c *Service_Delete_Call) Run(run func(ctx context.Context, resourceType enum.PublicResourceType, resourcePath string)) *Service_Delete_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(enum.PublicResourceType), args[2].(string))
})
return _c
}
func (_c *Service_Delete_Call) Return(_a0 error) *Service_Delete_Call {
_c.Call.Return(_a0)
return _c
}
func (_c *Service_Delete_Call) RunAndReturn(run func(context.Context, enum.PublicResourceType, string) error) *Service_Delete_Call {
_c.Call.Return(run)
return _c
}
// Get provides a mock function with given fields: ctx, resourceType, resourcePath
func (_m *Service) Get(ctx context.Context, resourceType enum.PublicResourceType, resourcePath string) (bool, error) {
ret := _m.Called(ctx, resourceType, resourcePath)
if len(ret) == 0 {
panic("no return value specified for Get")
}
var r0 bool
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, enum.PublicResourceType, string) (bool, error)); ok {
return rf(ctx, resourceType, resourcePath)
}
if rf, ok := ret.Get(0).(func(context.Context, enum.PublicResourceType, string) bool); ok {
r0 = rf(ctx, resourceType, resourcePath)
} else {
r0 = ret.Get(0).(bool)
}
if rf, ok := ret.Get(1).(func(context.Context, enum.PublicResourceType, string) error); ok {
r1 = rf(ctx, resourceType, resourcePath)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Service_Get_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Get'
type Service_Get_Call struct {
*mock.Call
}
// Get is a helper method to define mock.On call
// - ctx context.Context
// - resourceType enum.PublicResourceType
// - resourcePath string
func (_e *Service_Expecter) Get(ctx interface{}, resourceType interface{}, resourcePath interface{}) *Service_Get_Call {
return &Service_Get_Call{Call: _e.mock.On("Get", ctx, resourceType, resourcePath)}
}
func (_c *Service_Get_Call) Run(run func(ctx context.Context, resourceType enum.PublicResourceType, resourcePath string)) *Service_Get_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(enum.PublicResourceType), args[2].(string))
})
return _c
}
func (_c *Service_Get_Call) Return(_a0 bool, _a1 error) *Service_Get_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *Service_Get_Call) RunAndReturn(run func(context.Context, enum.PublicResourceType, string) (bool, error)) *Service_Get_Call {
_c.Call.Return(run)
return _c
}
// IsPublicAccessSupported provides a mock function with given fields: ctx, resourceType, parentSpacePath
func (_m *Service) IsPublicAccessSupported(ctx context.Context, resourceType enum.PublicResourceType, parentSpacePath string) (bool, error) {
ret := _m.Called(ctx, resourceType, parentSpacePath)
if len(ret) == 0 {
panic("no return value specified for IsPublicAccessSupported")
}
var r0 bool
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, enum.PublicResourceType, string) (bool, error)); ok {
return rf(ctx, resourceType, parentSpacePath)
}
if rf, ok := ret.Get(0).(func(context.Context, enum.PublicResourceType, string) bool); ok {
r0 = rf(ctx, resourceType, parentSpacePath)
} else {
r0 = ret.Get(0).(bool)
}
if rf, ok := ret.Get(1).(func(context.Context, enum.PublicResourceType, string) error); ok {
r1 = rf(ctx, resourceType, parentSpacePath)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Service_IsPublicAccessSupported_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'IsPublicAccessSupported'
type Service_IsPublicAccessSupported_Call struct {
*mock.Call
}
// IsPublicAccessSupported is a helper method to define mock.On call
// - ctx context.Context
// - resourceType enum.PublicResourceType
// - parentSpacePath string
func (_e *Service_Expecter) IsPublicAccessSupported(ctx interface{}, resourceType interface{}, parentSpacePath interface{}) *Service_IsPublicAccessSupported_Call {
return &Service_IsPublicAccessSupported_Call{Call: _e.mock.On("IsPublicAccessSupported", ctx, resourceType, parentSpacePath)}
}
func (_c *Service_IsPublicAccessSupported_Call) Run(run func(ctx context.Context, resourceType enum.PublicResourceType, parentSpacePath string)) *Service_IsPublicAccessSupported_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(enum.PublicResourceType), args[2].(string))
})
return _c
}
func (_c *Service_IsPublicAccessSupported_Call) Return(_a0 bool, _a1 error) *Service_IsPublicAccessSupported_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *Service_IsPublicAccessSupported_Call) RunAndReturn(run func(context.Context, enum.PublicResourceType, string) (bool, error)) *Service_IsPublicAccessSupported_Call {
_c.Call.Return(run)
return _c
}
// Set provides a mock function with given fields: ctx, resourceType, resourcePath, enable
func (_m *Service) Set(ctx context.Context, resourceType enum.PublicResourceType, resourcePath string, enable bool) error {
ret := _m.Called(ctx, resourceType, resourcePath, enable)
if len(ret) == 0 {
panic("no return value specified for Set")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, enum.PublicResourceType, string, bool) error); ok {
r0 = rf(ctx, resourceType, resourcePath, enable)
} else {
r0 = ret.Error(0)
}
return r0
}
// Service_Set_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Set'
type Service_Set_Call struct {
*mock.Call
}
// Set is a helper method to define mock.On call
// - ctx context.Context
// - resourceType enum.PublicResourceType
// - resourcePath string
// - enable bool
func (_e *Service_Expecter) Set(ctx interface{}, resourceType interface{}, resourcePath interface{}, enable interface{}) *Service_Set_Call {
return &Service_Set_Call{Call: _e.mock.On("Set", ctx, resourceType, resourcePath, enable)}
}
func (_c *Service_Set_Call) Run(run func(ctx context.Context, resourceType enum.PublicResourceType, resourcePath string, enable bool)) *Service_Set_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(enum.PublicResourceType), args[2].(string), args[3].(bool))
})
return _c
}
func (_c *Service_Set_Call) Return(_a0 error) *Service_Set_Call {
_c.Call.Return(_a0)
return _c
}
func (_c *Service_Set_Call) RunAndReturn(run func(context.Context, enum.PublicResourceType, string, bool) error) *Service_Set_Call {
_c.Call.Return(run)
return _c
}
// NewService creates a new instance of Service. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewService(t interface {
mock.TestingT
Cleanup(func())
}) *Service {
mock := &Service{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/authorizer.go | registry/app/api/controller/mocks/authorizer.go | // Code generated by testify. DO NOT EDIT.
package mocks
import (
"context"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/mock"
)
// Authorizer is an autogenerated mock type for the Authorizer type
type Authorizer struct {
mock.Mock
}
// Check provides a mock function with given fields: ctx, session, scope, resource, permission
func (m *Authorizer) Check(ctx context.Context, session *auth.Session, scope *types.Scope, resource *types.Resource, permission enum.Permission) (bool, error) {
ret := m.Called(ctx, session, scope, resource, permission)
var r0 bool
if rf, ok := ret.Get(0).(func(context.Context, *auth.Session, *types.Scope, *types.Resource, enum.Permission) bool); ok {
r0 = rf(ctx, session, scope, resource, permission)
} else {
r0 = ret.Get(0).(bool)
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, *auth.Session, *types.Scope, *types.Resource, enum.Permission) error); ok {
r1 = rf(ctx, session, scope, resource, permission)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CheckAll provides a mock function with given fields: ctx, session, permissionChecks
func (m *Authorizer) CheckAll(ctx context.Context, session *auth.Session, permissionChecks ...types.PermissionCheck) (bool, error) {
var args []interface{}
args = append(args, ctx, session)
for _, check := range permissionChecks {
args = append(args, check)
}
ret := m.Called(args...)
var r0 bool
if rf, ok := ret.Get(0).(func(context.Context, *auth.Session, ...types.PermissionCheck) bool); ok {
r0 = rf(ctx, session, permissionChecks...)
} else {
r0 = ret.Get(0).(bool)
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, *auth.Session, ...types.PermissionCheck) error); ok {
r1 = rf(ctx, session, permissionChecks...)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/package_wrapper.go | registry/app/api/controller/mocks/package_wrapper.go | // Code generated by mockery; DO NOT EDIT.
// github.com/vektra/mockery
// template: testify
package mocks
import (
"context"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
mock "github.com/stretchr/testify/mock"
)
// NewMockPackageWrapper creates a new instance of MockPackageWrapper. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewMockPackageWrapper(t interface {
mock.TestingT
Cleanup(func())
}) *MockPackageWrapper {
mock := &MockPackageWrapper{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
// MockPackageWrapper is an autogenerated mock type for the PackageWrapper type
type MockPackageWrapper struct {
mock.Mock
}
type MockPackageWrapper_Expecter struct {
mock *mock.Mock
}
func (_m *MockPackageWrapper) EXPECT() *MockPackageWrapper_Expecter {
return &MockPackageWrapper_Expecter{mock: &_m.Mock}
}
// DeleteArtifact provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) DeleteArtifact(ctx context.Context, regInfo *types.RegistryRequestBaseInfo, artifactName string) error {
ret := _mock.Called(ctx, regInfo, artifactName)
if len(ret) == 0 {
panic("no return value specified for DeleteArtifact")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, *types.RegistryRequestBaseInfo, string) error); ok {
r0 = returnFunc(ctx, regInfo, artifactName)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockPackageWrapper_DeleteArtifact_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteArtifact'
type MockPackageWrapper_DeleteArtifact_Call struct {
*mock.Call
}
// DeleteArtifact is a helper method to define mock.On call
// - ctx context.Context
// - regInfo *types.RegistryRequestBaseInfo
// - artifactName string
func (_e *MockPackageWrapper_Expecter) DeleteArtifact(ctx interface{}, regInfo interface{}, artifactName interface{}) *MockPackageWrapper_DeleteArtifact_Call {
return &MockPackageWrapper_DeleteArtifact_Call{Call: _e.mock.On("DeleteArtifact", ctx, regInfo, artifactName)}
}
func (_c *MockPackageWrapper_DeleteArtifact_Call) Run(run func(ctx context.Context, regInfo *types.RegistryRequestBaseInfo, artifactName string)) *MockPackageWrapper_DeleteArtifact_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 *types.RegistryRequestBaseInfo
if args[1] != nil {
arg1 = args[1].(*types.RegistryRequestBaseInfo)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
run(
arg0,
arg1,
arg2,
)
})
return _c
}
func (_c *MockPackageWrapper_DeleteArtifact_Call) Return(err error) *MockPackageWrapper_DeleteArtifact_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockPackageWrapper_DeleteArtifact_Call) RunAndReturn(run func(ctx context.Context, regInfo *types.RegistryRequestBaseInfo, artifactName string) error) *MockPackageWrapper_DeleteArtifact_Call {
_c.Call.Return(run)
return _c
}
// DeleteArtifactVersion provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) DeleteArtifactVersion(ctx context.Context, regInfo *types.RegistryRequestBaseInfo, imageInfo *types.Image, artifactName string, versionName string) error {
ret := _mock.Called(ctx, regInfo, imageInfo, artifactName, versionName)
if len(ret) == 0 {
panic("no return value specified for DeleteArtifactVersion")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, *types.RegistryRequestBaseInfo, *types.Image, string, string) error); ok {
r0 = returnFunc(ctx, regInfo, imageInfo, artifactName, versionName)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockPackageWrapper_DeleteArtifactVersion_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteArtifactVersion'
type MockPackageWrapper_DeleteArtifactVersion_Call struct {
*mock.Call
}
// DeleteArtifactVersion is a helper method to define mock.On call
// - ctx context.Context
// - regInfo *types.RegistryRequestBaseInfo
// - imageInfo *types.Image
// - artifactName string
// - versionName string
func (_e *MockPackageWrapper_Expecter) DeleteArtifactVersion(ctx interface{}, regInfo interface{}, imageInfo interface{}, artifactName interface{}, versionName interface{}) *MockPackageWrapper_DeleteArtifactVersion_Call {
return &MockPackageWrapper_DeleteArtifactVersion_Call{Call: _e.mock.On("DeleteArtifactVersion", ctx, regInfo, imageInfo, artifactName, versionName)}
}
func (_c *MockPackageWrapper_DeleteArtifactVersion_Call) Run(run func(ctx context.Context, regInfo *types.RegistryRequestBaseInfo, imageInfo *types.Image, artifactName string, versionName string)) *MockPackageWrapper_DeleteArtifactVersion_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 *types.RegistryRequestBaseInfo
if args[1] != nil {
arg1 = args[1].(*types.RegistryRequestBaseInfo)
}
var arg2 *types.Image
if args[2] != nil {
arg2 = args[2].(*types.Image)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
var arg4 string
if args[4] != nil {
arg4 = args[4].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
)
})
return _c
}
func (_c *MockPackageWrapper_DeleteArtifactVersion_Call) Return(err error) *MockPackageWrapper_DeleteArtifactVersion_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockPackageWrapper_DeleteArtifactVersion_Call) RunAndReturn(run func(ctx context.Context, regInfo *types.RegistryRequestBaseInfo, imageInfo *types.Image, artifactName string, versionName string) error) *MockPackageWrapper_DeleteArtifactVersion_Call {
_c.Call.Return(run)
return _c
}
// GetArtifactDetail provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) GetArtifactDetail(packageType string, img *types.Image, art *types.Artifact, downloadCount int64) (*artifact.ArtifactDetail, error) {
ret := _mock.Called(packageType, img, art, downloadCount)
if len(ret) == 0 {
panic("no return value specified for GetArtifactDetail")
}
var r0 *artifact.ArtifactDetail
var r1 error
if returnFunc, ok := ret.Get(0).(func(string, *types.Image, *types.Artifact, int64) (*artifact.ArtifactDetail, error)); ok {
return returnFunc(packageType, img, art, downloadCount)
}
if returnFunc, ok := ret.Get(0).(func(string, *types.Image, *types.Artifact, int64) *artifact.ArtifactDetail); ok {
r0 = returnFunc(packageType, img, art, downloadCount)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*artifact.ArtifactDetail)
}
}
if returnFunc, ok := ret.Get(1).(func(string, *types.Image, *types.Artifact, int64) error); ok {
r1 = returnFunc(packageType, img, art, downloadCount)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockPackageWrapper_GetArtifactDetail_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetArtifactDetail'
type MockPackageWrapper_GetArtifactDetail_Call struct {
*mock.Call
}
// GetArtifactDetail is a helper method to define mock.On call
// - packageType string
// - img *types.Image
// - art *types.Artifact
// - downloadCount int64
func (_e *MockPackageWrapper_Expecter) GetArtifactDetail(packageType interface{}, img interface{}, art interface{}, downloadCount interface{}) *MockPackageWrapper_GetArtifactDetail_Call {
return &MockPackageWrapper_GetArtifactDetail_Call{Call: _e.mock.On("GetArtifactDetail", packageType, img, art, downloadCount)}
}
func (_c *MockPackageWrapper_GetArtifactDetail_Call) Run(run func(packageType string, img *types.Image, art *types.Artifact, downloadCount int64)) *MockPackageWrapper_GetArtifactDetail_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 string
if args[0] != nil {
arg0 = args[0].(string)
}
var arg1 *types.Image
if args[1] != nil {
arg1 = args[1].(*types.Image)
}
var arg2 *types.Artifact
if args[2] != nil {
arg2 = args[2].(*types.Artifact)
}
var arg3 int64
if args[3] != nil {
arg3 = args[3].(int64)
}
run(
arg0,
arg1,
arg2,
arg3,
)
})
return _c
}
func (_c *MockPackageWrapper_GetArtifactDetail_Call) Return(artifactDetail *artifact.ArtifactDetail, err error) *MockPackageWrapper_GetArtifactDetail_Call {
_c.Call.Return(artifactDetail, err)
return _c
}
func (_c *MockPackageWrapper_GetArtifactDetail_Call) RunAndReturn(run func(packageType string, img *types.Image, art *types.Artifact, downloadCount int64) (*artifact.ArtifactDetail, error)) *MockPackageWrapper_GetArtifactDetail_Call {
_c.Call.Return(run)
return _c
}
// GetArtifactMetadata provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) GetArtifactMetadata(artifact1 types.ArtifactMetadata) *artifact.ArtifactMetadata {
ret := _mock.Called(artifact1)
if len(ret) == 0 {
panic("no return value specified for GetArtifactMetadata")
}
var r0 *artifact.ArtifactMetadata
if returnFunc, ok := ret.Get(0).(func(types.ArtifactMetadata) *artifact.ArtifactMetadata); ok {
r0 = returnFunc(artifact1)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*artifact.ArtifactMetadata)
}
}
return r0
}
// MockPackageWrapper_GetArtifactMetadata_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetArtifactMetadata'
type MockPackageWrapper_GetArtifactMetadata_Call struct {
*mock.Call
}
// GetArtifactMetadata is a helper method to define mock.On call
// - artifact1 types.ArtifactMetadata
func (_e *MockPackageWrapper_Expecter) GetArtifactMetadata(artifact1 interface{}) *MockPackageWrapper_GetArtifactMetadata_Call {
return &MockPackageWrapper_GetArtifactMetadata_Call{Call: _e.mock.On("GetArtifactMetadata", artifact1)}
}
func (_c *MockPackageWrapper_GetArtifactMetadata_Call) Run(run func(artifact1 types.ArtifactMetadata)) *MockPackageWrapper_GetArtifactMetadata_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 types.ArtifactMetadata
if args[0] != nil {
arg0 = args[0].(types.ArtifactMetadata)
}
run(
arg0,
)
})
return _c
}
func (_c *MockPackageWrapper_GetArtifactMetadata_Call) Return(artifactMetadata *artifact.ArtifactMetadata) *MockPackageWrapper_GetArtifactMetadata_Call {
_c.Call.Return(artifactMetadata)
return _c
}
func (_c *MockPackageWrapper_GetArtifactMetadata_Call) RunAndReturn(run func(artifact1 types.ArtifactMetadata) *artifact.ArtifactMetadata) *MockPackageWrapper_GetArtifactMetadata_Call {
_c.Call.Return(run)
return _c
}
// GetArtifactVersionMetadata provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) GetArtifactVersionMetadata(packageType string, image string, tag types.NonOCIArtifactMetadata) *artifact.ArtifactVersionMetadata {
ret := _mock.Called(packageType, image, tag)
if len(ret) == 0 {
panic("no return value specified for GetArtifactVersionMetadata")
}
var r0 *artifact.ArtifactVersionMetadata
if returnFunc, ok := ret.Get(0).(func(string, string, types.NonOCIArtifactMetadata) *artifact.ArtifactVersionMetadata); ok {
r0 = returnFunc(packageType, image, tag)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*artifact.ArtifactVersionMetadata)
}
}
return r0
}
// MockPackageWrapper_GetArtifactVersionMetadata_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetArtifactVersionMetadata'
type MockPackageWrapper_GetArtifactVersionMetadata_Call struct {
*mock.Call
}
// GetArtifactVersionMetadata is a helper method to define mock.On call
// - packageType string
// - image string
// - tag types.NonOCIArtifactMetadata
func (_e *MockPackageWrapper_Expecter) GetArtifactVersionMetadata(packageType interface{}, image interface{}, tag interface{}) *MockPackageWrapper_GetArtifactVersionMetadata_Call {
return &MockPackageWrapper_GetArtifactVersionMetadata_Call{Call: _e.mock.On("GetArtifactVersionMetadata", packageType, image, tag)}
}
func (_c *MockPackageWrapper_GetArtifactVersionMetadata_Call) Run(run func(packageType string, image string, tag types.NonOCIArtifactMetadata)) *MockPackageWrapper_GetArtifactVersionMetadata_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 string
if args[0] != nil {
arg0 = args[0].(string)
}
var arg1 string
if args[1] != nil {
arg1 = args[1].(string)
}
var arg2 types.NonOCIArtifactMetadata
if args[2] != nil {
arg2 = args[2].(types.NonOCIArtifactMetadata)
}
run(
arg0,
arg1,
arg2,
)
})
return _c
}
func (_c *MockPackageWrapper_GetArtifactVersionMetadata_Call) Return(artifactVersionMetadata *artifact.ArtifactVersionMetadata) *MockPackageWrapper_GetArtifactVersionMetadata_Call {
_c.Call.Return(artifactVersionMetadata)
return _c
}
func (_c *MockPackageWrapper_GetArtifactVersionMetadata_Call) RunAndReturn(run func(packageType string, image string, tag types.NonOCIArtifactMetadata) *artifact.ArtifactVersionMetadata) *MockPackageWrapper_GetArtifactVersionMetadata_Call {
_c.Call.Return(run)
return _c
}
// GetClientSetupDetails provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) GetClientSetupDetails(ctx context.Context, regRef string, image *artifact.ArtifactParam, tag *artifact.VersionParam, registryType artifact.RegistryType, packageType string) (*artifact.ClientSetupDetails, error) {
ret := _mock.Called(ctx, regRef, image, tag, registryType, packageType)
if len(ret) == 0 {
panic("no return value specified for GetClientSetupDetails")
}
var r0 *artifact.ClientSetupDetails
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, string, *artifact.ArtifactParam, *artifact.VersionParam, artifact.RegistryType, string) (*artifact.ClientSetupDetails, error)); ok {
return returnFunc(ctx, regRef, image, tag, registryType, packageType)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, string, *artifact.ArtifactParam, *artifact.VersionParam, artifact.RegistryType, string) *artifact.ClientSetupDetails); ok {
r0 = returnFunc(ctx, regRef, image, tag, registryType, packageType)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*artifact.ClientSetupDetails)
}
}
if returnFunc, ok := ret.Get(1).(func(context.Context, string, *artifact.ArtifactParam, *artifact.VersionParam, artifact.RegistryType, string) error); ok {
r1 = returnFunc(ctx, regRef, image, tag, registryType, packageType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockPackageWrapper_GetClientSetupDetails_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetClientSetupDetails'
type MockPackageWrapper_GetClientSetupDetails_Call struct {
*mock.Call
}
// GetClientSetupDetails is a helper method to define mock.On call
// - ctx context.Context
// - regRef string
// - image *artifact.ArtifactParam
// - tag *artifact.VersionParam
// - registryType artifact.RegistryType
// - packageType string
func (_e *MockPackageWrapper_Expecter) GetClientSetupDetails(ctx interface{}, regRef interface{}, image interface{}, tag interface{}, registryType interface{}, packageType interface{}) *MockPackageWrapper_GetClientSetupDetails_Call {
return &MockPackageWrapper_GetClientSetupDetails_Call{Call: _e.mock.On("GetClientSetupDetails", ctx, regRef, image, tag, registryType, packageType)}
}
func (_c *MockPackageWrapper_GetClientSetupDetails_Call) Run(run func(ctx context.Context, regRef string, image *artifact.ArtifactParam, tag *artifact.VersionParam, registryType artifact.RegistryType, packageType string)) *MockPackageWrapper_GetClientSetupDetails_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 string
if args[1] != nil {
arg1 = args[1].(string)
}
var arg2 *artifact.ArtifactParam
if args[2] != nil {
arg2 = args[2].(*artifact.ArtifactParam)
}
var arg3 *artifact.VersionParam
if args[3] != nil {
arg3 = args[3].(*artifact.VersionParam)
}
var arg4 artifact.RegistryType
if args[4] != nil {
arg4 = args[4].(artifact.RegistryType)
}
var arg5 string
if args[5] != nil {
arg5 = args[5].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
arg5,
)
})
return _c
}
func (_c *MockPackageWrapper_GetClientSetupDetails_Call) Return(clientSetupDetails *artifact.ClientSetupDetails, err error) *MockPackageWrapper_GetClientSetupDetails_Call {
_c.Call.Return(clientSetupDetails, err)
return _c
}
func (_c *MockPackageWrapper_GetClientSetupDetails_Call) RunAndReturn(run func(ctx context.Context, regRef string, image *artifact.ArtifactParam, tag *artifact.VersionParam, registryType artifact.RegistryType, packageType string) (*artifact.ClientSetupDetails, error)) *MockPackageWrapper_GetClientSetupDetails_Call {
_c.Call.Return(run)
return _c
}
// GetFileMetadata provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) GetFileMetadata(ctx context.Context, rootIdentifier string, registryIdentifier string, packageType string, artifactName string, version string, file types.FileNodeMetadata) *artifact.FileDetail {
ret := _mock.Called(ctx, rootIdentifier, registryIdentifier, packageType, artifactName, version, file)
if len(ret) == 0 {
panic("no return value specified for GetFileMetadata")
}
var r0 *artifact.FileDetail
if returnFunc, ok := ret.Get(0).(func(context.Context, string, string, string, string, string, types.FileNodeMetadata) *artifact.FileDetail); ok {
r0 = returnFunc(ctx, rootIdentifier, registryIdentifier, packageType, artifactName, version, file)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*artifact.FileDetail)
}
}
return r0
}
// MockPackageWrapper_GetFileMetadata_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetFileMetadata'
type MockPackageWrapper_GetFileMetadata_Call struct {
*mock.Call
}
// GetFileMetadata is a helper method to define mock.On call
// - ctx context.Context
// - rootIdentifier string
// - registryIdentifier string
// - packageType string
// - artifactName string
// - version string
// - file types.FileNodeMetadata
func (_e *MockPackageWrapper_Expecter) GetFileMetadata(ctx interface{}, rootIdentifier interface{}, registryIdentifier interface{}, packageType interface{}, artifactName interface{}, version interface{}, file interface{}) *MockPackageWrapper_GetFileMetadata_Call {
return &MockPackageWrapper_GetFileMetadata_Call{Call: _e.mock.On("GetFileMetadata", ctx, rootIdentifier, registryIdentifier, packageType, artifactName, version, file)}
}
func (_c *MockPackageWrapper_GetFileMetadata_Call) Run(run func(ctx context.Context, rootIdentifier string, registryIdentifier string, packageType string, artifactName string, version string, file types.FileNodeMetadata)) *MockPackageWrapper_GetFileMetadata_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 string
if args[1] != nil {
arg1 = args[1].(string)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
var arg4 string
if args[4] != nil {
arg4 = args[4].(string)
}
var arg5 string
if args[5] != nil {
arg5 = args[5].(string)
}
var arg6 types.FileNodeMetadata
if args[6] != nil {
arg6 = args[6].(types.FileNodeMetadata)
}
run(
arg0,
arg1,
arg2,
arg3,
arg4,
arg5,
arg6,
)
})
return _c
}
func (_c *MockPackageWrapper_GetFileMetadata_Call) Return(fileDetail *artifact.FileDetail) *MockPackageWrapper_GetFileMetadata_Call {
_c.Call.Return(fileDetail)
return _c
}
func (_c *MockPackageWrapper_GetFileMetadata_Call) RunAndReturn(run func(ctx context.Context, rootIdentifier string, registryIdentifier string, packageType string, artifactName string, version string, file types.FileNodeMetadata) *artifact.FileDetail) *MockPackageWrapper_GetFileMetadata_Call {
_c.Call.Return(run)
return _c
}
// GetFilePath provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) GetFilePath(packageType string, artifactName string, versionName string) (string, error) {
ret := _mock.Called(packageType, artifactName, versionName)
if len(ret) == 0 {
panic("no return value specified for GetFilePath")
}
var r0 string
var r1 error
if returnFunc, ok := ret.Get(0).(func(string, string, string) (string, error)); ok {
return returnFunc(packageType, artifactName, versionName)
}
if returnFunc, ok := ret.Get(0).(func(string, string, string) string); ok {
r0 = returnFunc(packageType, artifactName, versionName)
} else {
r0 = ret.Get(0).(string)
}
if returnFunc, ok := ret.Get(1).(func(string, string, string) error); ok {
r1 = returnFunc(packageType, artifactName, versionName)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockPackageWrapper_GetFilePath_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetFilePath'
type MockPackageWrapper_GetFilePath_Call struct {
*mock.Call
}
// GetFilePath is a helper method to define mock.On call
// - packageType string
// - artifactName string
// - versionName string
func (_e *MockPackageWrapper_Expecter) GetFilePath(packageType interface{}, artifactName interface{}, versionName interface{}) *MockPackageWrapper_GetFilePath_Call {
return &MockPackageWrapper_GetFilePath_Call{Call: _e.mock.On("GetFilePath", packageType, artifactName, versionName)}
}
func (_c *MockPackageWrapper_GetFilePath_Call) Run(run func(packageType string, artifactName string, versionName string)) *MockPackageWrapper_GetFilePath_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 string
if args[0] != nil {
arg0 = args[0].(string)
}
var arg1 string
if args[1] != nil {
arg1 = args[1].(string)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
run(
arg0,
arg1,
arg2,
)
})
return _c
}
func (_c *MockPackageWrapper_GetFilePath_Call) Return(s string, err error) *MockPackageWrapper_GetFilePath_Call {
_c.Call.Return(s, err)
return _c
}
func (_c *MockPackageWrapper_GetFilePath_Call) RunAndReturn(run func(packageType string, artifactName string, versionName string) (string, error)) *MockPackageWrapper_GetFilePath_Call {
_c.Call.Return(run)
return _c
}
// GetPackageURL provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) GetPackageURL(ctx context.Context, rootIdentifier string, registryIdentifier string, packageType string) (string, error) {
ret := _mock.Called(ctx, rootIdentifier, registryIdentifier, packageType)
if len(ret) == 0 {
panic("no return value specified for GetPackageURL")
}
var r0 string
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, string, string, string) (string, error)); ok {
return returnFunc(ctx, rootIdentifier, registryIdentifier, packageType)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, string, string, string) string); ok {
r0 = returnFunc(ctx, rootIdentifier, registryIdentifier, packageType)
} else {
r0 = ret.Get(0).(string)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, string, string, string) error); ok {
r1 = returnFunc(ctx, rootIdentifier, registryIdentifier, packageType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockPackageWrapper_GetPackageURL_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetPackageURL'
type MockPackageWrapper_GetPackageURL_Call struct {
*mock.Call
}
// GetPackageURL is a helper method to define mock.On call
// - ctx context.Context
// - rootIdentifier string
// - registryIdentifier string
// - packageType string
func (_e *MockPackageWrapper_Expecter) GetPackageURL(ctx interface{}, rootIdentifier interface{}, registryIdentifier interface{}, packageType interface{}) *MockPackageWrapper_GetPackageURL_Call {
return &MockPackageWrapper_GetPackageURL_Call{Call: _e.mock.On("GetPackageURL", ctx, rootIdentifier, registryIdentifier, packageType)}
}
func (_c *MockPackageWrapper_GetPackageURL_Call) Run(run func(ctx context.Context, rootIdentifier string, registryIdentifier string, packageType string)) *MockPackageWrapper_GetPackageURL_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 string
if args[1] != nil {
arg1 = args[1].(string)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
)
})
return _c
}
func (_c *MockPackageWrapper_GetPackageURL_Call) Return(s string, err error) *MockPackageWrapper_GetPackageURL_Call {
_c.Call.Return(s, err)
return _c
}
func (_c *MockPackageWrapper_GetPackageURL_Call) RunAndReturn(run func(ctx context.Context, rootIdentifier string, registryIdentifier string, packageType string) (string, error)) *MockPackageWrapper_GetPackageURL_Call {
_c.Call.Return(run)
return _c
}
// IsURLRequiredForUpstreamSource provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) IsURLRequiredForUpstreamSource(packageType string, upstreamSource string) bool {
ret := _mock.Called(packageType, upstreamSource)
if len(ret) == 0 {
panic("no return value specified for IsURLRequiredForUpstreamSource")
}
var r0 bool
if returnFunc, ok := ret.Get(0).(func(string, string) bool); ok {
r0 = returnFunc(packageType, upstreamSource)
} else {
r0 = ret.Get(0).(bool)
}
return r0
}
// MockPackageWrapper_IsURLRequiredForUpstreamSource_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'IsURLRequiredForUpstreamSource'
type MockPackageWrapper_IsURLRequiredForUpstreamSource_Call struct {
*mock.Call
}
// IsURLRequiredForUpstreamSource is a helper method to define mock.On call
// - packageType string
// - upstreamSource string
func (_e *MockPackageWrapper_Expecter) IsURLRequiredForUpstreamSource(packageType interface{}, upstreamSource interface{}) *MockPackageWrapper_IsURLRequiredForUpstreamSource_Call {
return &MockPackageWrapper_IsURLRequiredForUpstreamSource_Call{Call: _e.mock.On("IsURLRequiredForUpstreamSource", packageType, upstreamSource)}
}
func (_c *MockPackageWrapper_IsURLRequiredForUpstreamSource_Call) Run(run func(packageType string, upstreamSource string)) *MockPackageWrapper_IsURLRequiredForUpstreamSource_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 string
if args[0] != nil {
arg0 = args[0].(string)
}
var arg1 string
if args[1] != nil {
arg1 = args[1].(string)
}
run(
arg0,
arg1,
)
})
return _c
}
func (_c *MockPackageWrapper_IsURLRequiredForUpstreamSource_Call) Return(b bool) *MockPackageWrapper_IsURLRequiredForUpstreamSource_Call {
_c.Call.Return(b)
return _c
}
func (_c *MockPackageWrapper_IsURLRequiredForUpstreamSource_Call) RunAndReturn(run func(packageType string, upstreamSource string) bool) *MockPackageWrapper_IsURLRequiredForUpstreamSource_Call {
_c.Call.Return(run)
return _c
}
// IsValidPackageType provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) IsValidPackageType(packageType string) bool {
ret := _mock.Called(packageType)
if len(ret) == 0 {
panic("no return value specified for IsValidPackageType")
}
var r0 bool
if returnFunc, ok := ret.Get(0).(func(string) bool); ok {
r0 = returnFunc(packageType)
} else {
r0 = ret.Get(0).(bool)
}
return r0
}
// MockPackageWrapper_IsValidPackageType_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'IsValidPackageType'
type MockPackageWrapper_IsValidPackageType_Call struct {
*mock.Call
}
// IsValidPackageType is a helper method to define mock.On call
// - packageType string
func (_e *MockPackageWrapper_Expecter) IsValidPackageType(packageType interface{}) *MockPackageWrapper_IsValidPackageType_Call {
return &MockPackageWrapper_IsValidPackageType_Call{Call: _e.mock.On("IsValidPackageType", packageType)}
}
func (_c *MockPackageWrapper_IsValidPackageType_Call) Run(run func(packageType string)) *MockPackageWrapper_IsValidPackageType_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 string
if args[0] != nil {
arg0 = args[0].(string)
}
run(
arg0,
)
})
return _c
}
func (_c *MockPackageWrapper_IsValidPackageType_Call) Return(b bool) *MockPackageWrapper_IsValidPackageType_Call {
_c.Call.Return(b)
return _c
}
func (_c *MockPackageWrapper_IsValidPackageType_Call) RunAndReturn(run func(packageType string) bool) *MockPackageWrapper_IsValidPackageType_Call {
_c.Call.Return(run)
return _c
}
// IsValidPackageTypes provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) IsValidPackageTypes(packageTypes []string) bool {
ret := _mock.Called(packageTypes)
if len(ret) == 0 {
panic("no return value specified for IsValidPackageTypes")
}
var r0 bool
if returnFunc, ok := ret.Get(0).(func([]string) bool); ok {
r0 = returnFunc(packageTypes)
} else {
r0 = ret.Get(0).(bool)
}
return r0
}
// MockPackageWrapper_IsValidPackageTypes_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'IsValidPackageTypes'
type MockPackageWrapper_IsValidPackageTypes_Call struct {
*mock.Call
}
// IsValidPackageTypes is a helper method to define mock.On call
// - packageTypes []string
func (_e *MockPackageWrapper_Expecter) IsValidPackageTypes(packageTypes interface{}) *MockPackageWrapper_IsValidPackageTypes_Call {
return &MockPackageWrapper_IsValidPackageTypes_Call{Call: _e.mock.On("IsValidPackageTypes", packageTypes)}
}
func (_c *MockPackageWrapper_IsValidPackageTypes_Call) Run(run func(packageTypes []string)) *MockPackageWrapper_IsValidPackageTypes_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 []string
if args[0] != nil {
arg0 = args[0].([]string)
}
run(
arg0,
)
})
return _c
}
func (_c *MockPackageWrapper_IsValidPackageTypes_Call) Return(b bool) *MockPackageWrapper_IsValidPackageTypes_Call {
_c.Call.Return(b)
return _c
}
func (_c *MockPackageWrapper_IsValidPackageTypes_Call) RunAndReturn(run func(packageTypes []string) bool) *MockPackageWrapper_IsValidPackageTypes_Call {
_c.Call.Return(run)
return _c
}
// IsValidRepoType provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) IsValidRepoType(repoType string) bool {
ret := _mock.Called(repoType)
if len(ret) == 0 {
panic("no return value specified for IsValidRepoType")
}
var r0 bool
if returnFunc, ok := ret.Get(0).(func(string) bool); ok {
r0 = returnFunc(repoType)
} else {
r0 = ret.Get(0).(bool)
}
return r0
}
// MockPackageWrapper_IsValidRepoType_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'IsValidRepoType'
type MockPackageWrapper_IsValidRepoType_Call struct {
*mock.Call
}
// IsValidRepoType is a helper method to define mock.On call
// - repoType string
func (_e *MockPackageWrapper_Expecter) IsValidRepoType(repoType interface{}) *MockPackageWrapper_IsValidRepoType_Call {
return &MockPackageWrapper_IsValidRepoType_Call{Call: _e.mock.On("IsValidRepoType", repoType)}
}
func (_c *MockPackageWrapper_IsValidRepoType_Call) Run(run func(repoType string)) *MockPackageWrapper_IsValidRepoType_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 string
if args[0] != nil {
arg0 = args[0].(string)
}
run(
arg0,
)
})
return _c
}
func (_c *MockPackageWrapper_IsValidRepoType_Call) Return(b bool) *MockPackageWrapper_IsValidRepoType_Call {
_c.Call.Return(b)
return _c
}
func (_c *MockPackageWrapper_IsValidRepoType_Call) RunAndReturn(run func(repoType string) bool) *MockPackageWrapper_IsValidRepoType_Call {
_c.Call.Return(run)
return _c
}
// IsValidRepoTypes provides a mock function for the type MockPackageWrapper
func (_mock *MockPackageWrapper) IsValidRepoTypes(repoTypes []string) bool {
ret := _mock.Called(repoTypes)
if len(ret) == 0 {
panic("no return value specified for IsValidRepoTypes")
}
var r0 bool
if returnFunc, ok := ret.Get(0).(func([]string) bool); ok {
r0 = returnFunc(repoTypes)
} else {
r0 = ret.Get(0).(bool)
}
return r0
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | true |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/webhooks_repository.go | registry/app/api/controller/mocks/webhooks_repository.go | // Code generated by testify. DO NOT EDIT.
package mocks
import (
"context"
"github.com/harness/gitness/types"
"github.com/stretchr/testify/mock"
)
// WebhooksRepository is a mock of store.WebhooksRepository interface.
type WebhooksRepository struct {
mock.Mock
}
// Create provides a mock function
func (m *WebhooksRepository) Create(ctx context.Context, webhook *types.WebhookCore) error {
ret := m.Called(ctx, webhook)
return ret.Error(0)
}
// GetByRegistryAndIdentifier provides a mock function
func (m *WebhooksRepository) GetByRegistryAndIdentifier(ctx context.Context, registryID int64, webhookIdentifier string) (*types.WebhookCore, error) {
ret := m.Called(ctx, registryID, webhookIdentifier)
var r0 *types.WebhookCore
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.WebhookCore); ok {
r0 = rf(ctx, registryID, webhookIdentifier)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.WebhookCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, registryID, webhookIdentifier)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Find provides a mock function
func (m *WebhooksRepository) Find(ctx context.Context, webhookID int64) (*types.WebhookCore, error) {
ret := m.Called(ctx, webhookID)
var r0 *types.WebhookCore
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.WebhookCore); ok {
r0 = rf(ctx, webhookID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.WebhookCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, webhookID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ListByRegistry provides a mock function
func (m *WebhooksRepository) ListByRegistry(ctx context.Context, sortByField string, sortByOrder string, limit int, offset int, search string, registryID int64) ([]*types.WebhookCore, error) {
ret := m.Called(ctx, sortByField, sortByOrder, limit, offset, search, registryID)
var r0 []*types.WebhookCore
if rf, ok := ret.Get(0).(func(context.Context, string, string, int, int, string, int64) []*types.WebhookCore); ok {
r0 = rf(ctx, sortByField, sortByOrder, limit, offset, search, registryID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]*types.WebhookCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string, string, int, int, string, int64) error); ok {
r1 = rf(ctx, sortByField, sortByOrder, limit, offset, search, registryID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ListAllByRegistry provides a mock function
func (m *WebhooksRepository) ListAllByRegistry(ctx context.Context, parents []types.WebhookParentInfo) ([]*types.WebhookCore, error) {
ret := m.Called(ctx, parents)
var r0 []*types.WebhookCore
if rf, ok := ret.Get(0).(func(context.Context, []types.WebhookParentInfo) []*types.WebhookCore); ok {
r0 = rf(ctx, parents)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]*types.WebhookCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, []types.WebhookParentInfo) error); ok {
r1 = rf(ctx, parents)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountAllByRegistry provides a mock function
func (m *WebhooksRepository) CountAllByRegistry(ctx context.Context, registryID int64, search string) (int64, error) {
ret := m.Called(ctx, registryID, search)
var r0 int64
if rf, ok := ret.Get(0).(func(context.Context, int64, string) int64); ok {
r0 = rf(ctx, registryID, search)
} else {
r0 = ret.Get(0).(int64)
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, registryID, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Update provides a mock function
func (m *WebhooksRepository) Update(ctx context.Context, webhook *types.WebhookCore) error {
ret := m.Called(ctx, webhook)
return ret.Error(0)
}
// DeleteByRegistryAndIdentifier provides a mock function
func (m *WebhooksRepository) DeleteByRegistryAndIdentifier(ctx context.Context, registryID int64, webhookIdentifier string) error {
ret := m.Called(ctx, registryID, webhookIdentifier)
return ret.Error(0)
}
// UpdateOptLock provides a mock function
func (m *WebhooksRepository) UpdateOptLock(ctx context.Context, hook *types.WebhookCore, fn func(hook *types.WebhookCore) error) (*types.WebhookCore, error) {
ret := m.Called(ctx, hook, fn)
var r0 *types.WebhookCore
if rf, ok := ret.Get(0).(func(context.Context, *types.WebhookCore, func(*types.WebhookCore) error) *types.WebhookCore); ok {
r0 = rf(ctx, hook, fn)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.WebhookCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, *types.WebhookCore, func(*types.WebhookCore) error) error); ok {
r1 = rf(ctx, hook, fn)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/transactor.go | registry/app/api/controller/mocks/transactor.go | // Code generated by mockery. DO NOT EDIT.
package mocks
import (
"context"
"github.com/stretchr/testify/mock"
)
// Transactor is a mock of dbtx.Transactor interface.
type Transactor struct {
mock.Mock
}
// WithTx provides a mock function
func (m *Transactor) WithTx(ctx context.Context, fn func(context.Context) error, opts ...interface{}) error {
args := m.Called(ctx, fn, opts)
return args.Error(0)
}
// BeginTx provides a mock function
func (m *Transactor) BeginTx(ctx context.Context) (context.Context, error) {
args := m.Called(ctx)
return args.Get(0).(context.Context), args.Error(1)
}
// CommitTx provides a mock function
func (m *Transactor) CommitTx(ctx context.Context) error {
args := m.Called(ctx)
return args.Error(0)
}
// RollbackTx provides a mock function
func (m *Transactor) RollbackTx(ctx context.Context) error {
args := m.Called(ctx)
return args.Error(0)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/public_access_cache.go | registry/app/api/controller/mocks/public_access_cache.go | //go:generate mockery --name RegistryMetadataHelper --output . --filename public_access_cache.go --outpkg mocks --with-expecter
package mocks
import (
"context"
"github.com/harness/gitness/registry/app/services/publicaccess"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/mock"
)
// MockPublicAccess is a mock implementation of the publicaccess.Service interface.
type MockPublicAccess struct {
mock.Mock
}
// NewMockPublicAccess creates a new mock instance of PublicAccessService.
func NewMockPublicAccess() *MockPublicAccess {
return &MockPublicAccess{}
}
// Get mocks the Get method.
func (m *MockPublicAccess) Get(
ctx context.Context,
resourceType enum.PublicResourceType,
resourcePath string,
) (bool, error) {
args := m.Called(ctx, resourceType, resourcePath)
return args.Bool(0), args.Error(1)
}
// Set mocks the Set method.
func (m *MockPublicAccess) Set(
ctx context.Context,
resourceType enum.PublicResourceType,
resourcePath string,
enable bool,
) error {
args := m.Called(ctx, resourceType, resourcePath, enable)
return args.Error(0)
}
// Delete mocks the Delete method.
func (m *MockPublicAccess) Delete(
ctx context.Context,
resourceType enum.PublicResourceType,
resourcePath string,
) error {
args := m.Called(ctx, resourceType, resourcePath)
return args.Error(0)
}
// IsPublicAccessSupported mocks the IsPublicAccessSupported method.
func (m *MockPublicAccess) IsPublicAccessSupported(
ctx context.Context,
resourceType enum.PublicResourceType,
parentSpacePath string,
) (bool, error) {
args := m.Called(ctx, resourceType, parentSpacePath)
return args.Bool(0), args.Error(1)
}
// MarkChanged mocks the MarkChanged method.
func (m *MockPublicAccess) MarkChanged(
ctx context.Context,
publicAccessCacheKey *publicaccess.CacheKey,
) {
m.Called(ctx, publicAccessCacheKey)
}
// ExpectGet sets up an expectation for the Get method.
func (m *MockPublicAccess) ExpectGet(
ctx any,
resourceType enum.PublicResourceType,
resourcePath string,
isPublic bool,
err error,
) *mock.Call {
return m.On("Get", ctx, resourceType, resourcePath).Return(isPublic, err)
}
// ExpectSet sets up an expectation for the Set method.
func (m *MockPublicAccess) ExpectSet(
ctx any,
resourceType enum.PublicResourceType,
resourcePath string,
enable bool,
err error,
) *mock.Call {
return m.On("Set", ctx, resourceType, resourcePath, enable).Return(err)
}
// ExpectDelete sets up an expectation for the Delete method.
func (m *MockPublicAccess) ExpectDelete(
ctx any,
resourceType enum.PublicResourceType,
resourcePath string,
err error,
) *mock.Call {
return m.On("Delete", ctx, resourceType, resourcePath).Return(err)
}
// ExpectIsPublicAccessSupported sets up an expectation for the IsPublicAccessSupported method.
func (m *MockPublicAccess) ExpectIsPublicAccessSupported(
ctx any,
resourceType enum.PublicResourceType,
parentSpacePath string,
supported bool,
err error,
) *mock.Call {
return m.On("IsPublicAccessSupported", ctx, resourceType, parentSpacePath).Return(supported, err)
}
// ExpectMarkChanged sets up an expectation for the MarkChanged method.
func (m *MockPublicAccess) ExpectMarkChanged(
ctx any,
publicAccessCacheKey *publicaccess.CacheKey,
) *mock.Call {
return m.On("MarkChanged", ctx, publicAccessCacheKey)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/reporter.go | registry/app/api/controller/mocks/reporter.go | package mocks
import (
"context"
registryevents "github.com/harness/gitness/registry/app/events/artifact"
"github.com/stretchr/testify/mock"
)
// Reporter is a mock implementation of registryevents.Reporter
type Reporter struct {
mock.Mock
}
func NewReporter() *Reporter {
return &Reporter{}
}
// Report provides a mock function
func (m *Reporter) Report(ctx context.Context, event any) error {
args := m.Called(ctx, event)
return args.Error(0)
}
// ArtifactCreated provides a mock function
func (m *Reporter) ArtifactCreated(ctx context.Context, payload *registryevents.ArtifactCreatedPayload) {
m.Called(ctx, payload)
}
// ArtifactDeleted provides a mock function
func (m *Reporter) ArtifactDeleted(ctx context.Context, payload *registryevents.ArtifactDeletedPayload) {
m.Called(ctx, payload)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/image_repository.go | registry/app/api/controller/mocks/image_repository.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
artifact "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
mock "github.com/stretchr/testify/mock"
types "github.com/harness/gitness/registry/types"
)
// ImageRepository is an autogenerated mock type for the ImageRepository type
type ImageRepository struct {
mock.Mock
}
type ImageRepository_Expecter struct {
mock *mock.Mock
}
func (_m *ImageRepository) EXPECT() *ImageRepository_Expecter {
return &ImageRepository_Expecter{mock: &_m.Mock}
}
// CountLabelsByParentIDAndRepo provides a mock function with given fields: ctx, parentID, repo, search
func (_m *ImageRepository) CountLabelsByParentIDAndRepo(ctx context.Context, parentID int64, repo string, search string) (int64, error) {
ret := _m.Called(ctx, parentID, repo, search)
if len(ret) == 0 {
panic("no return value specified for CountLabelsByParentIDAndRepo")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) (int64, error)); ok {
return rf(ctx, parentID, repo, search)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) int64); ok {
r0 = rf(ctx, parentID, repo, search)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string) error); ok {
r1 = rf(ctx, parentID, repo, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ImageRepository_CountLabelsByParentIDAndRepo_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CountLabelsByParentIDAndRepo'
type ImageRepository_CountLabelsByParentIDAndRepo_Call struct {
*mock.Call
}
// CountLabelsByParentIDAndRepo is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - repo string
// - search string
func (_e *ImageRepository_Expecter) CountLabelsByParentIDAndRepo(ctx interface{}, parentID interface{}, repo interface{}, search interface{}) *ImageRepository_CountLabelsByParentIDAndRepo_Call {
return &ImageRepository_CountLabelsByParentIDAndRepo_Call{Call: _e.mock.On("CountLabelsByParentIDAndRepo", ctx, parentID, repo, search)}
}
func (_c *ImageRepository_CountLabelsByParentIDAndRepo_Call) Run(run func(ctx context.Context, parentID int64, repo string, search string)) *ImageRepository_CountLabelsByParentIDAndRepo_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string), args[3].(string))
})
return _c
}
func (_c *ImageRepository_CountLabelsByParentIDAndRepo_Call) Return(count int64, err error) *ImageRepository_CountLabelsByParentIDAndRepo_Call {
_c.Call.Return(count, err)
return _c
}
func (_c *ImageRepository_CountLabelsByParentIDAndRepo_Call) RunAndReturn(run func(context.Context, int64, string, string) (int64, error)) *ImageRepository_CountLabelsByParentIDAndRepo_Call {
_c.Call.Return(run)
return _c
}
// CreateOrUpdate provides a mock function with given fields: ctx, image
func (_m *ImageRepository) CreateOrUpdate(ctx context.Context, image *types.Image) error {
ret := _m.Called(ctx, image)
if len(ret) == 0 {
panic("no return value specified for CreateOrUpdate")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Image) error); ok {
r0 = rf(ctx, image)
} else {
r0 = ret.Error(0)
}
return r0
}
// ImageRepository_CreateOrUpdate_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CreateOrUpdate'
type ImageRepository_CreateOrUpdate_Call struct {
*mock.Call
}
// CreateOrUpdate is a helper method to define mock.On call
// - ctx context.Context
// - image *types.Image
func (_e *ImageRepository_Expecter) CreateOrUpdate(ctx interface{}, image interface{}) *ImageRepository_CreateOrUpdate_Call {
return &ImageRepository_CreateOrUpdate_Call{Call: _e.mock.On("CreateOrUpdate", ctx, image)}
}
func (_c *ImageRepository_CreateOrUpdate_Call) Run(run func(ctx context.Context, image *types.Image)) *ImageRepository_CreateOrUpdate_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.Image))
})
return _c
}
func (_c *ImageRepository_CreateOrUpdate_Call) Return(_a0 error) *ImageRepository_CreateOrUpdate_Call {
_c.Call.Return(_a0)
return _c
}
func (_c *ImageRepository_CreateOrUpdate_Call) RunAndReturn(run func(context.Context, *types.Image) error) *ImageRepository_CreateOrUpdate_Call {
_c.Call.Return(run)
return _c
}
// DeleteByImageNameAndRegID provides a mock function with given fields: ctx, regID, image
func (_m *ImageRepository) DeleteByImageNameAndRegID(ctx context.Context, regID int64, image string) error {
ret := _m.Called(ctx, regID, image)
if len(ret) == 0 {
panic("no return value specified for DeleteByImageNameAndRegID")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) error); ok {
r0 = rf(ctx, regID, image)
} else {
r0 = ret.Error(0)
}
return r0
}
// ImageRepository_DeleteByImageNameAndRegID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteByImageNameAndRegID'
type ImageRepository_DeleteByImageNameAndRegID_Call struct {
*mock.Call
}
// DeleteByImageNameAndRegID is a helper method to define mock.On call
// - ctx context.Context
// - regID int64
// - image string
func (_e *ImageRepository_Expecter) DeleteByImageNameAndRegID(ctx interface{}, regID interface{}, image interface{}) *ImageRepository_DeleteByImageNameAndRegID_Call {
return &ImageRepository_DeleteByImageNameAndRegID_Call{Call: _e.mock.On("DeleteByImageNameAndRegID", ctx, regID, image)}
}
func (_c *ImageRepository_DeleteByImageNameAndRegID_Call) Run(run func(ctx context.Context, regID int64, image string)) *ImageRepository_DeleteByImageNameAndRegID_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string))
})
return _c
}
func (_c *ImageRepository_DeleteByImageNameAndRegID_Call) Return(err error) *ImageRepository_DeleteByImageNameAndRegID_Call {
_c.Call.Return(err)
return _c
}
func (_c *ImageRepository_DeleteByImageNameAndRegID_Call) RunAndReturn(run func(context.Context, int64, string) error) *ImageRepository_DeleteByImageNameAndRegID_Call {
_c.Call.Return(run)
return _c
}
// DeleteByImageNameIfNoLinkedArtifacts provides a mock function with given fields: ctx, regID, image
func (_m *ImageRepository) DeleteByImageNameIfNoLinkedArtifacts(ctx context.Context, regID int64, image string) error {
ret := _m.Called(ctx, regID, image)
if len(ret) == 0 {
panic("no return value specified for DeleteByImageNameIfNoLinkedArtifacts")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) error); ok {
r0 = rf(ctx, regID, image)
} else {
r0 = ret.Error(0)
}
return r0
}
// ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DeleteByImageNameIfNoLinkedArtifacts'
type ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call struct {
*mock.Call
}
// DeleteByImageNameIfNoLinkedArtifacts is a helper method to define mock.On call
// - ctx context.Context
// - regID int64
// - image string
func (_e *ImageRepository_Expecter) DeleteByImageNameIfNoLinkedArtifacts(ctx interface{}, regID interface{}, image interface{}) *ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call {
return &ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call{Call: _e.mock.On("DeleteByImageNameIfNoLinkedArtifacts", ctx, regID, image)}
}
func (_c *ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call) Run(run func(ctx context.Context, regID int64, image string)) *ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string))
})
return _c
}
func (_c *ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call) Return(err error) *ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call {
_c.Call.Return(err)
return _c
}
func (_c *ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call) RunAndReturn(run func(context.Context, int64, string) error) *ImageRepository_DeleteByImageNameIfNoLinkedArtifacts_Call {
_c.Call.Return(run)
return _c
}
// DuplicateImage provides a mock function with given fields: ctx, sourceImage, targetRegistryID
func (_m *ImageRepository) DuplicateImage(ctx context.Context, sourceImage *types.Image, targetRegistryID int64) (*types.Image, error) {
ret := _m.Called(ctx, sourceImage, targetRegistryID)
if len(ret) == 0 {
panic("no return value specified for DuplicateImage")
}
var r0 *types.Image
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Image, int64) (*types.Image, error)); ok {
return rf(ctx, sourceImage, targetRegistryID)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.Image, int64) *types.Image); ok {
r0 = rf(ctx, sourceImage, targetRegistryID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
if rf, ok := ret.Get(1).(func(context.Context, *types.Image, int64) error); ok {
r1 = rf(ctx, sourceImage, targetRegistryID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ImageRepository_DuplicateImage_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'DuplicateImage'
type ImageRepository_DuplicateImage_Call struct {
*mock.Call
}
// DuplicateImage is a helper method to define mock.On call
// - ctx context.Context
// - sourceImage *types.Image
// - targetRegistryID int64
func (_e *ImageRepository_Expecter) DuplicateImage(ctx interface{}, sourceImage interface{}, targetRegistryID interface{}) *ImageRepository_DuplicateImage_Call {
return &ImageRepository_DuplicateImage_Call{Call: _e.mock.On("DuplicateImage", ctx, sourceImage, targetRegistryID)}
}
func (_c *ImageRepository_DuplicateImage_Call) Run(run func(ctx context.Context, sourceImage *types.Image, targetRegistryID int64)) *ImageRepository_DuplicateImage_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.Image), args[2].(int64))
})
return _c
}
func (_c *ImageRepository_DuplicateImage_Call) Return(_a0 *types.Image, _a1 error) *ImageRepository_DuplicateImage_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *ImageRepository_DuplicateImage_Call) RunAndReturn(run func(context.Context, *types.Image, int64) (*types.Image, error)) *ImageRepository_DuplicateImage_Call {
_c.Call.Return(run)
return _c
}
// GetByUUID provides a mock function with given fields: ctx, uuid
func (_m *ImageRepository) GetByUUID(ctx context.Context, uuid string) (*types.Image, error) {
ret := _m.Called(ctx, uuid)
if len(ret) == 0 {
panic("no return value specified for GetByUUID")
}
var r0 *types.Image
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) (*types.Image, error)); ok {
return rf(ctx, uuid)
}
if rf, ok := ret.Get(0).(func(context.Context, string) *types.Image); ok {
r0 = rf(ctx, uuid)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, uuid)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ImageRepository_GetByUUID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByUUID'
type ImageRepository_GetByUUID_Call struct {
*mock.Call
}
// GetByUUID is a helper method to define mock.On call
// - ctx context.Context
// - uuid string
func (_e *ImageRepository_Expecter) GetByUUID(ctx interface{}, uuid interface{}) *ImageRepository_GetByUUID_Call {
return &ImageRepository_GetByUUID_Call{Call: _e.mock.On("GetByUUID", ctx, uuid)}
}
func (_c *ImageRepository_GetByUUID_Call) Run(run func(ctx context.Context, uuid string)) *ImageRepository_GetByUUID_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(string))
})
return _c
}
func (_c *ImageRepository_GetByUUID_Call) Return(image *types.Image, err error) *ImageRepository_GetByUUID_Call {
_c.Call.Return(image, err)
return _c
}
func (_c *ImageRepository_GetByUUID_Call) RunAndReturn(run func(context.Context, string) (*types.Image, error)) *ImageRepository_GetByUUID_Call {
_c.Call.Return(run)
return _c
}
// Get provides a mock function with given fields: ctx, id
func (_m *ImageRepository) Get(ctx context.Context, id int64) (*types.Image, error) {
ret := _m.Called(ctx, id)
if len(ret) == 0 {
panic("no return value specified for Get")
}
var r0 *types.Image
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*types.Image, error)); ok {
return rf(ctx, id)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.Image); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ImageRepository_Get_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Get'
type ImageRepository_Get_Call struct {
*mock.Call
}
// Get is a helper method to define mock.On call
// - ctx context.Context
// - id int64
func (_e *ImageRepository_Expecter) Get(ctx interface{}, id interface{}) *ImageRepository_Get_Call {
return &ImageRepository_Get_Call{Call: _e.mock.On("Get", ctx, id)}
}
func (_c *ImageRepository_Get_Call) Run(run func(ctx context.Context, id int64)) *ImageRepository_Get_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64))
})
return _c
}
func (_c *ImageRepository_Get_Call) Return(_a0 *types.Image, _a1 error) *ImageRepository_Get_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *ImageRepository_Get_Call) RunAndReturn(run func(context.Context, int64) (*types.Image, error)) *ImageRepository_Get_Call {
_c.Call.Return(run)
return _c
}
// GetByName provides a mock function with given fields: ctx, registryID, name
func (_m *ImageRepository) GetByName(ctx context.Context, registryID int64, name string) (*types.Image, error) {
ret := _m.Called(ctx, registryID, name)
if len(ret) == 0 {
panic("no return value specified for GetByName")
}
var r0 *types.Image
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (*types.Image, error)); ok {
return rf(ctx, registryID, name)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.Image); ok {
r0 = rf(ctx, registryID, name)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, registryID, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ImageRepository_GetByName_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByName'
type ImageRepository_GetByName_Call struct {
*mock.Call
}
// GetByName is a helper method to define mock.On call
// - ctx context.Context
// - registryID int64
// - name string
func (_e *ImageRepository_Expecter) GetByName(ctx interface{}, registryID interface{}, name interface{}) *ImageRepository_GetByName_Call {
return &ImageRepository_GetByName_Call{Call: _e.mock.On("GetByName", ctx, registryID, name)}
}
func (_c *ImageRepository_GetByName_Call) Run(run func(ctx context.Context, registryID int64, name string)) *ImageRepository_GetByName_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string))
})
return _c
}
func (_c *ImageRepository_GetByName_Call) Return(_a0 *types.Image, _a1 error) *ImageRepository_GetByName_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *ImageRepository_GetByName_Call) RunAndReturn(run func(context.Context, int64, string) (*types.Image, error)) *ImageRepository_GetByName_Call {
_c.Call.Return(run)
return _c
}
// GetByNameAndType provides a mock function with given fields: ctx, registryID, name, artifactType
func (_m *ImageRepository) GetByNameAndType(ctx context.Context, registryID int64, name string, artifactType *artifact.ArtifactType) (*types.Image, error) {
ret := _m.Called(ctx, registryID, name, artifactType)
if len(ret) == 0 {
panic("no return value specified for GetByNameAndType")
}
var r0 *types.Image
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, *artifact.ArtifactType) (*types.Image, error)); ok {
return rf(ctx, registryID, name, artifactType)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, *artifact.ArtifactType) *types.Image); ok {
r0 = rf(ctx, registryID, name, artifactType)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, *artifact.ArtifactType) error); ok {
r1 = rf(ctx, registryID, name, artifactType)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ImageRepository_GetByNameAndType_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByNameAndType'
type ImageRepository_GetByNameAndType_Call struct {
*mock.Call
}
// GetByNameAndType is a helper method to define mock.On call
// - ctx context.Context
// - registryID int64
// - name string
// - artifactType *artifact.ArtifactType
func (_e *ImageRepository_Expecter) GetByNameAndType(ctx interface{}, registryID interface{}, name interface{}, artifactType interface{}) *ImageRepository_GetByNameAndType_Call {
return &ImageRepository_GetByNameAndType_Call{Call: _e.mock.On("GetByNameAndType", ctx, registryID, name, artifactType)}
}
func (_c *ImageRepository_GetByNameAndType_Call) Run(run func(ctx context.Context, registryID int64, name string, artifactType *artifact.ArtifactType)) *ImageRepository_GetByNameAndType_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string), args[3].(*artifact.ArtifactType))
})
return _c
}
func (_c *ImageRepository_GetByNameAndType_Call) Return(_a0 *types.Image, _a1 error) *ImageRepository_GetByNameAndType_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *ImageRepository_GetByNameAndType_Call) RunAndReturn(run func(context.Context, int64, string, *artifact.ArtifactType) (*types.Image, error)) *ImageRepository_GetByNameAndType_Call {
_c.Call.Return(run)
return _c
}
// GetByRepoAndName provides a mock function with given fields: ctx, parentID, repo, name
func (_m *ImageRepository) GetByRepoAndName(ctx context.Context, parentID int64, repo string, name string) (*types.Image, error) {
ret := _m.Called(ctx, parentID, repo, name)
if len(ret) == 0 {
panic("no return value specified for GetByRepoAndName")
}
var r0 *types.Image
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) (*types.Image, error)); ok {
return rf(ctx, parentID, repo, name)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) *types.Image); ok {
r0 = rf(ctx, parentID, repo, name)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string) error); ok {
r1 = rf(ctx, parentID, repo, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ImageRepository_GetByRepoAndName_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetByRepoAndName'
type ImageRepository_GetByRepoAndName_Call struct {
*mock.Call
}
// GetByRepoAndName is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - repo string
// - name string
func (_e *ImageRepository_Expecter) GetByRepoAndName(ctx interface{}, parentID interface{}, repo interface{}, name interface{}) *ImageRepository_GetByRepoAndName_Call {
return &ImageRepository_GetByRepoAndName_Call{Call: _e.mock.On("GetByRepoAndName", ctx, parentID, repo, name)}
}
func (_c *ImageRepository_GetByRepoAndName_Call) Run(run func(ctx context.Context, parentID int64, repo string, name string)) *ImageRepository_GetByRepoAndName_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string), args[3].(string))
})
return _c
}
func (_c *ImageRepository_GetByRepoAndName_Call) Return(_a0 *types.Image, _a1 error) *ImageRepository_GetByRepoAndName_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *ImageRepository_GetByRepoAndName_Call) RunAndReturn(run func(context.Context, int64, string, string) (*types.Image, error)) *ImageRepository_GetByRepoAndName_Call {
_c.Call.Return(run)
return _c
}
// GetLabelsByParentIDAndRepo provides a mock function with given fields: ctx, parentID, repo, limit, offset, search
func (_m *ImageRepository) GetLabelsByParentIDAndRepo(ctx context.Context, parentID int64, repo string, limit int, offset int, search string) ([]string, error) {
ret := _m.Called(ctx, parentID, repo, limit, offset, search)
if len(ret) == 0 {
panic("no return value specified for GetLabelsByParentIDAndRepo")
}
var r0 []string
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int, string) ([]string, error)); ok {
return rf(ctx, parentID, repo, limit, offset, search)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int, string) []string); ok {
r0 = rf(ctx, parentID, repo, limit, offset, search)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]string)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string, int, int, string) error); ok {
r1 = rf(ctx, parentID, repo, limit, offset, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ImageRepository_GetLabelsByParentIDAndRepo_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetLabelsByParentIDAndRepo'
type ImageRepository_GetLabelsByParentIDAndRepo_Call struct {
*mock.Call
}
// GetLabelsByParentIDAndRepo is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - repo string
// - limit int
// - offset int
// - search string
func (_e *ImageRepository_Expecter) GetLabelsByParentIDAndRepo(ctx interface{}, parentID interface{}, repo interface{}, limit interface{}, offset interface{}, search interface{}) *ImageRepository_GetLabelsByParentIDAndRepo_Call {
return &ImageRepository_GetLabelsByParentIDAndRepo_Call{Call: _e.mock.On("GetLabelsByParentIDAndRepo", ctx, parentID, repo, limit, offset, search)}
}
func (_c *ImageRepository_GetLabelsByParentIDAndRepo_Call) Run(run func(ctx context.Context, parentID int64, repo string, limit int, offset int, search string)) *ImageRepository_GetLabelsByParentIDAndRepo_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string), args[3].(int), args[4].(int), args[5].(string))
})
return _c
}
func (_c *ImageRepository_GetLabelsByParentIDAndRepo_Call) Return(labels []string, err error) *ImageRepository_GetLabelsByParentIDAndRepo_Call {
_c.Call.Return(labels, err)
return _c
}
func (_c *ImageRepository_GetLabelsByParentIDAndRepo_Call) RunAndReturn(run func(context.Context, int64, string, int, int, string) ([]string, error)) *ImageRepository_GetLabelsByParentIDAndRepo_Call {
_c.Call.Return(run)
return _c
}
// Update provides a mock function with given fields: ctx, _a1
func (_m *ImageRepository) Update(ctx context.Context, _a1 *types.Image) error {
ret := _m.Called(ctx, _a1)
if len(ret) == 0 {
panic("no return value specified for Update")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Image) error); ok {
r0 = rf(ctx, _a1)
} else {
r0 = ret.Error(0)
}
return r0
}
// ImageRepository_Update_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Update'
type ImageRepository_Update_Call struct {
*mock.Call
}
// Update is a helper method to define mock.On call
// - ctx context.Context
// - _a1 *types.Image
func (_e *ImageRepository_Expecter) Update(ctx interface{}, _a1 interface{}) *ImageRepository_Update_Call {
return &ImageRepository_Update_Call{Call: _e.mock.On("Update", ctx, _a1)}
}
func (_c *ImageRepository_Update_Call) Run(run func(ctx context.Context, _a1 *types.Image)) *ImageRepository_Update_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.Image))
})
return _c
}
func (_c *ImageRepository_Update_Call) Return(err error) *ImageRepository_Update_Call {
_c.Call.Return(err)
return _c
}
func (_c *ImageRepository_Update_Call) RunAndReturn(run func(context.Context, *types.Image) error) *ImageRepository_Update_Call {
_c.Call.Return(run)
return _c
}
// UpdateStatus provides a mock function with given fields: ctx, _a1
func (_m *ImageRepository) UpdateStatus(ctx context.Context, _a1 *types.Image) error {
ret := _m.Called(ctx, _a1)
if len(ret) == 0 {
panic("no return value specified for UpdateStatus")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Image) error); ok {
r0 = rf(ctx, _a1)
} else {
r0 = ret.Error(0)
}
return r0
}
// ImageRepository_UpdateStatus_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'UpdateStatus'
type ImageRepository_UpdateStatus_Call struct {
*mock.Call
}
// UpdateStatus is a helper method to define mock.On call
// - ctx context.Context
// - _a1 *types.Image
func (_e *ImageRepository_Expecter) UpdateStatus(ctx interface{}, _a1 interface{}) *ImageRepository_UpdateStatus_Call {
return &ImageRepository_UpdateStatus_Call{Call: _e.mock.On("UpdateStatus", ctx, _a1)}
}
func (_c *ImageRepository_UpdateStatus_Call) Run(run func(ctx context.Context, _a1 *types.Image)) *ImageRepository_UpdateStatus_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.Image))
})
return _c
}
func (_c *ImageRepository_UpdateStatus_Call) Return(err error) *ImageRepository_UpdateStatus_Call {
_c.Call.Return(err)
return _c
}
func (_c *ImageRepository_UpdateStatus_Call) RunAndReturn(run func(context.Context, *types.Image) error) *ImageRepository_UpdateStatus_Call {
_c.Call.Return(run)
return _c
}
// NewImageRepository creates a new instance of ImageRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewImageRepository(t interface {
mock.TestingT
Cleanup(func())
}) *ImageRepository {
mock := &ImageRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/registry_finder.go | registry/app/api/controller/mocks/registry_finder.go | // Code generated by mockery v2.53.4. DO NOT EDIT.
package mocks
import (
context "context"
mock "github.com/stretchr/testify/mock"
types "github.com/harness/gitness/registry/types"
)
// RegistryFinder is an autogenerated mock type for the RegistryFinder type
type RegistryFinder struct {
mock.Mock
}
type RegistryFinder_Expecter struct {
mock *mock.Mock
}
func (_m *RegistryFinder) EXPECT() *RegistryFinder_Expecter {
return &RegistryFinder_Expecter{mock: &_m.Mock}
}
// Delete provides a mock function with given fields: ctx, parentID, name
func (_m *RegistryFinder) Delete(ctx context.Context, parentID int64, name string) error {
ret := _m.Called(ctx, parentID, name)
if len(ret) == 0 {
panic("no return value specified for Delete")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) error); ok {
r0 = rf(ctx, parentID, name)
} else {
r0 = ret.Error(0)
}
return r0
}
// RegistryFinder_Delete_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Delete'
type RegistryFinder_Delete_Call struct {
*mock.Call
}
// Delete is a helper method to define mock.On call
// - ctx context.Context
// - parentID int64
// - name string
func (_e *RegistryFinder_Expecter) Delete(ctx interface{}, parentID interface{}, name interface{}) *RegistryFinder_Delete_Call {
return &RegistryFinder_Delete_Call{Call: _e.mock.On("Delete", ctx, parentID, name)}
}
func (_c *RegistryFinder_Delete_Call) Run(run func(ctx context.Context, parentID int64, name string)) *RegistryFinder_Delete_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string))
})
return _c
}
func (_c *RegistryFinder_Delete_Call) Return(err error) *RegistryFinder_Delete_Call {
_c.Call.Return(err)
return _c
}
func (_c *RegistryFinder_Delete_Call) RunAndReturn(run func(context.Context, int64, string) error) *RegistryFinder_Delete_Call {
_c.Call.Return(run)
return _c
}
// FindByID provides a mock function with given fields: ctx, repoID
func (_m *RegistryFinder) FindByID(ctx context.Context, repoID int64) (*types.Registry, error) {
ret := _m.Called(ctx, repoID)
if len(ret) == 0 {
panic("no return value specified for FindByID")
}
var r0 *types.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*types.Registry, error)); ok {
return rf(ctx, repoID)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.Registry); ok {
r0 = rf(ctx, repoID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, repoID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryFinder_FindByID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'FindByID'
type RegistryFinder_FindByID_Call struct {
*mock.Call
}
// FindByID is a helper method to define mock.On call
// - ctx context.Context
// - repoID int64
func (_e *RegistryFinder_Expecter) FindByID(ctx interface{}, repoID interface{}) *RegistryFinder_FindByID_Call {
return &RegistryFinder_FindByID_Call{Call: _e.mock.On("FindByID", ctx, repoID)}
}
func (_c *RegistryFinder_FindByID_Call) Run(run func(ctx context.Context, repoID int64)) *RegistryFinder_FindByID_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64))
})
return _c
}
func (_c *RegistryFinder_FindByID_Call) Return(_a0 *types.Registry, _a1 error) *RegistryFinder_FindByID_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *RegistryFinder_FindByID_Call) RunAndReturn(run func(context.Context, int64) (*types.Registry, error)) *RegistryFinder_FindByID_Call {
_c.Call.Return(run)
return _c
}
// FindByRootParentID provides a mock function with given fields: ctx, rootParentID, regIdentifier
func (_m *RegistryFinder) FindByRootParentID(ctx context.Context, rootParentID int64, regIdentifier string) (*types.Registry, error) {
ret := _m.Called(ctx, rootParentID, regIdentifier)
if len(ret) == 0 {
panic("no return value specified for FindByRootParentID")
}
var r0 *types.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (*types.Registry, error)); ok {
return rf(ctx, rootParentID, regIdentifier)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.Registry); ok {
r0 = rf(ctx, rootParentID, regIdentifier)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, rootParentID, regIdentifier)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryFinder_FindByRootParentID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'FindByRootParentID'
type RegistryFinder_FindByRootParentID_Call struct {
*mock.Call
}
// FindByRootParentID is a helper method to define mock.On call
// - ctx context.Context
// - rootParentID int64
// - regIdentifier string
func (_e *RegistryFinder_Expecter) FindByRootParentID(ctx interface{}, rootParentID interface{}, regIdentifier interface{}) *RegistryFinder_FindByRootParentID_Call {
return &RegistryFinder_FindByRootParentID_Call{Call: _e.mock.On("FindByRootParentID", ctx, rootParentID, regIdentifier)}
}
func (_c *RegistryFinder_FindByRootParentID_Call) Run(run func(ctx context.Context, rootParentID int64, regIdentifier string)) *RegistryFinder_FindByRootParentID_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(int64), args[2].(string))
})
return _c
}
func (_c *RegistryFinder_FindByRootParentID_Call) Return(_a0 *types.Registry, _a1 error) *RegistryFinder_FindByRootParentID_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *RegistryFinder_FindByRootParentID_Call) RunAndReturn(run func(context.Context, int64, string) (*types.Registry, error)) *RegistryFinder_FindByRootParentID_Call {
_c.Call.Return(run)
return _c
}
// FindByRootRef provides a mock function with given fields: ctx, rootParentRef, regIdentifier
func (_m *RegistryFinder) FindByRootRef(ctx context.Context, rootParentRef string, regIdentifier string) (*types.Registry, error) {
ret := _m.Called(ctx, rootParentRef, regIdentifier)
if len(ret) == 0 {
panic("no return value specified for FindByRootRef")
}
var r0 *types.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, string) (*types.Registry, error)); ok {
return rf(ctx, rootParentRef, regIdentifier)
}
if rf, ok := ret.Get(0).(func(context.Context, string, string) *types.Registry); ok {
r0 = rf(ctx, rootParentRef, regIdentifier)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string, string) error); ok {
r1 = rf(ctx, rootParentRef, regIdentifier)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// RegistryFinder_FindByRootRef_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'FindByRootRef'
type RegistryFinder_FindByRootRef_Call struct {
*mock.Call
}
// FindByRootRef is a helper method to define mock.On call
// - ctx context.Context
// - rootParentRef string
// - regIdentifier string
func (_e *RegistryFinder_Expecter) FindByRootRef(ctx interface{}, rootParentRef interface{}, regIdentifier interface{}) *RegistryFinder_FindByRootRef_Call {
return &RegistryFinder_FindByRootRef_Call{Call: _e.mock.On("FindByRootRef", ctx, rootParentRef, regIdentifier)}
}
func (_c *RegistryFinder_FindByRootRef_Call) Run(run func(ctx context.Context, rootParentRef string, regIdentifier string)) *RegistryFinder_FindByRootRef_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(string), args[2].(string))
})
return _c
}
func (_c *RegistryFinder_FindByRootRef_Call) Return(_a0 *types.Registry, _a1 error) *RegistryFinder_FindByRootRef_Call {
_c.Call.Return(_a0, _a1)
return _c
}
func (_c *RegistryFinder_FindByRootRef_Call) RunAndReturn(run func(context.Context, string, string) (*types.Registry, error)) *RegistryFinder_FindByRootRef_Call {
_c.Call.Return(run)
return _c
}
// MarkChanged provides a mock function with given fields: ctx, reg
func (_m *RegistryFinder) MarkChanged(ctx context.Context, reg *types.Registry) {
_m.Called(ctx, reg)
}
// RegistryFinder_MarkChanged_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'MarkChanged'
type RegistryFinder_MarkChanged_Call struct {
*mock.Call
}
// MarkChanged is a helper method to define mock.On call
// - ctx context.Context
// - reg *types.Registry
func (_e *RegistryFinder_Expecter) MarkChanged(ctx interface{}, reg interface{}) *RegistryFinder_MarkChanged_Call {
return &RegistryFinder_MarkChanged_Call{Call: _e.mock.On("MarkChanged", ctx, reg)}
}
func (_c *RegistryFinder_MarkChanged_Call) Run(run func(ctx context.Context, reg *types.Registry)) *RegistryFinder_MarkChanged_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.Registry))
})
return _c
}
func (_c *RegistryFinder_MarkChanged_Call) Return() *RegistryFinder_MarkChanged_Call {
_c.Call.Return()
return _c
}
func (_c *RegistryFinder_MarkChanged_Call) RunAndReturn(run func(context.Context, *types.Registry)) *RegistryFinder_MarkChanged_Call {
_c.Run(run)
return _c
}
// Update provides a mock function with given fields: ctx, registry
func (_m *RegistryFinder) Update(ctx context.Context, registry *types.Registry) error {
ret := _m.Called(ctx, registry)
if len(ret) == 0 {
panic("no return value specified for Update")
}
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Registry) error); ok {
r0 = rf(ctx, registry)
} else {
r0 = ret.Error(0)
}
return r0
}
// RegistryFinder_Update_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Update'
type RegistryFinder_Update_Call struct {
*mock.Call
}
// Update is a helper method to define mock.On call
// - ctx context.Context
// - registry *types.Registry
func (_e *RegistryFinder_Expecter) Update(ctx interface{}, registry interface{}) *RegistryFinder_Update_Call {
return &RegistryFinder_Update_Call{Call: _e.mock.On("Update", ctx, registry)}
}
func (_c *RegistryFinder_Update_Call) Run(run func(ctx context.Context, registry *types.Registry)) *RegistryFinder_Update_Call {
_c.Call.Run(func(args mock.Arguments) {
run(args[0].(context.Context), args[1].(*types.Registry))
})
return _c
}
func (_c *RegistryFinder_Update_Call) Return(err error) *RegistryFinder_Update_Call {
_c.Call.Return(err)
return _c
}
func (_c *RegistryFinder_Update_Call) RunAndReturn(run func(context.Context, *types.Registry) error) *RegistryFinder_Update_Call {
_c.Call.Return(run)
return _c
}
// NewRegistryFinder creates a new instance of RegistryFinder. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewRegistryFinder(t interface {
mock.TestingT
Cleanup(func())
}) *RegistryFinder {
mock := &RegistryFinder{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/registry_metadata_helper.go | registry/app/api/controller/mocks/registry_metadata_helper.go | //go:generate mockery --name RegistryMetadataHelper --output . --filename registry_metadata_helper.go --outpkg mocks --with-expecter
package mocks
import (
"context"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
registrytypes "github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/mock"
)
// RegistryMetadataHelper is an autogenerated mock type for the RegistryMetadataHelper type
type RegistryMetadataHelper struct {
mock.Mock
}
// GetPermissionChecks provides a mock function with given fields: space, registryIdentifier, permission
func (_m *RegistryMetadataHelper) GetPermissionChecks(space *types.SpaceCore, registryIdentifier string, permission enum.Permission) []types.PermissionCheck {
ret := _m.Called(space, registryIdentifier, permission)
if len(ret) == 0 {
panic("no return value specified for GetPermissionChecks")
}
var r0 []types.PermissionCheck
if rf, ok := ret.Get(0).(func(*types.SpaceCore, string, enum.Permission) []types.PermissionCheck); ok {
r0 = rf(space, registryIdentifier, permission)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]types.PermissionCheck)
}
}
return r0
}
// GetRegistryMetadata provides a mock function with given fields: ctx, registryID
func (_m *RegistryMetadataHelper) GetRegistryMetadata(ctx context.Context, registryID int64) (*registrytypes.Registry, error) {
ret := _m.Called(ctx, registryID)
if len(ret) == 0 {
panic("no return value specified for GetRegistryMetadata")
}
var r0 *registrytypes.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64) (*registrytypes.Registry, error)); ok {
return rf(ctx, registryID)
}
if rf, ok := ret.Get(0).(func(context.Context, int64) *registrytypes.Registry); ok {
r0 = rf(ctx, registryID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*registrytypes.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, registryID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetRegistryMetadataByIdentifier provides a mock function with given fields: ctx, identifier
func (_m *RegistryMetadataHelper) GetRegistryMetadataByIdentifier(ctx context.Context, identifier string) (*registrytypes.Registry, error) {
ret := _m.Called(ctx, identifier)
if len(ret) == 0 {
panic("no return value specified for GetRegistryMetadataByIdentifier")
}
var r0 *registrytypes.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) (*registrytypes.Registry, error)); ok {
return rf(ctx, identifier)
}
if rf, ok := ret.Get(0).(func(context.Context, string) *registrytypes.Registry); ok {
r0 = rf(ctx, identifier)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*registrytypes.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, identifier)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetRegistryMetadataByParentIDAndIdentifier provides a mock function with given fields: ctx, parentID, identifier
func (_m *RegistryMetadataHelper) GetRegistryMetadataByParentIDAndIdentifier(ctx context.Context, parentID int64, identifier string) (*registrytypes.Registry, error) {
ret := _m.Called(ctx, parentID, identifier)
if len(ret) == 0 {
panic("no return value specified for GetRegistryMetadataByParentIDAndIdentifier")
}
var r0 *registrytypes.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) (*registrytypes.Registry, error)); ok {
return rf(ctx, parentID, identifier)
}
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *registrytypes.Registry); ok {
r0 = rf(ctx, parentID, identifier)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*registrytypes.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, parentID, identifier)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetRegistryMetadataByParentPathAndIdentifier provides a mock function with given fields: ctx, parentPath, identifier
func (_m *RegistryMetadataHelper) GetRegistryMetadataByParentPathAndIdentifier(ctx context.Context, parentPath string, identifier string) (*registrytypes.Registry, error) {
ret := _m.Called(ctx, parentPath, identifier)
if len(ret) == 0 {
panic("no return value specified for GetRegistryMetadataByParentPathAndIdentifier")
}
var r0 *registrytypes.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, string) (*registrytypes.Registry, error)); ok {
return rf(ctx, parentPath, identifier)
}
if rf, ok := ret.Get(0).(func(context.Context, string, string) *registrytypes.Registry); ok {
r0 = rf(ctx, parentPath, identifier)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*registrytypes.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string, string) error); ok {
r1 = rf(ctx, parentPath, identifier)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetRegistryMetadataByPath provides a mock function with given fields: ctx, path
func (_m *RegistryMetadataHelper) GetRegistryMetadataByPath(ctx context.Context, path string) (*registrytypes.Registry, error) {
ret := _m.Called(ctx, path)
if len(ret) == 0 {
panic("no return value specified for GetRegistryMetadataByPath")
}
var r0 *registrytypes.Registry
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string) (*registrytypes.Registry, error)); ok {
return rf(ctx, path)
}
if rf, ok := ret.Get(0).(func(context.Context, string) *registrytypes.Registry); ok {
r0 = rf(ctx, path)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*registrytypes.Registry)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, path)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetRegistryRequestBaseInfo provides a mock function with given fields: ctx, parentPath, identifier
func (_m *RegistryMetadataHelper) GetRegistryRequestBaseInfo(ctx context.Context, parentPath string, identifier string) (*registrytypes.RegistryRequestBaseInfo, error) {
ret := _m.Called(ctx, parentPath, identifier)
if len(ret) == 0 {
panic("no return value specified for GetRegistryRequestBaseInfo")
}
var r0 *registrytypes.RegistryRequestBaseInfo
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, string, string) (*registrytypes.RegistryRequestBaseInfo, error)); ok {
return rf(ctx, parentPath, identifier)
}
if rf, ok := ret.Get(0).(func(context.Context, string, string) *registrytypes.RegistryRequestBaseInfo); ok {
r0 = rf(ctx, parentPath, identifier)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*registrytypes.RegistryRequestBaseInfo)
}
}
if rf, ok := ret.Get(1).(func(context.Context, string, string) error); ok {
r1 = rf(ctx, parentPath, identifier)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetSecretSpaceID provides a mock function with given fields: ctx, secretSpacePath
func (_m *RegistryMetadataHelper) GetSecretSpaceID(ctx context.Context, secretSpacePath *string) (int64, error) {
ret := _m.Called(ctx, secretSpacePath)
if len(ret) == 0 {
panic("no return value specified for GetSecretSpaceID")
}
var r0 int64
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *string) (int64, error)); ok {
return rf(ctx, secretSpacePath)
}
if rf, ok := ret.Get(0).(func(context.Context, *string) int64); ok {
r0 = rf(ctx, secretSpacePath)
} else {
r0 = ret.Get(0).(int64)
}
if rf, ok := ret.Get(1).(func(context.Context, *string) error); ok {
r1 = rf(ctx, secretSpacePath)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MapToAPIExtraHeaders provides a mock function with given fields: headers
func (_m *RegistryMetadataHelper) MapToAPIExtraHeaders(headers []types.ExtraHeader) []api.ExtraHeader {
ret := _m.Called(headers)
if len(ret) == 0 {
panic("no return value specified for MapToAPIExtraHeaders")
}
var r0 []api.ExtraHeader
if rf, ok := ret.Get(0).(func([]types.ExtraHeader) []api.ExtraHeader); ok {
r0 = rf(headers)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]api.ExtraHeader)
}
}
return r0
}
// MapToAPIWebhookTriggers provides a mock function with given fields: triggers
func (_m *RegistryMetadataHelper) MapToAPIWebhookTriggers(triggers []enum.WebhookTrigger) []api.Trigger {
ret := _m.Called(triggers)
if len(ret) == 0 {
panic("no return value specified for MapToAPIWebhookTriggers")
}
var r0 []api.Trigger
if rf, ok := ret.Get(0).(func([]enum.WebhookTrigger) []api.Trigger); ok {
r0 = rf(triggers)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]api.Trigger)
}
}
return r0
}
// MapToInternalWebhookTriggers provides a mock function with given fields: triggers
func (_m *RegistryMetadataHelper) MapToInternalWebhookTriggers(triggers []api.Trigger) ([]enum.WebhookTrigger, error) {
ret := _m.Called(triggers)
if len(ret) == 0 {
panic("no return value specified for MapToInternalWebhookTriggers")
}
var r0 []enum.WebhookTrigger
var r1 error
if rf, ok := ret.Get(0).(func([]api.Trigger) ([]enum.WebhookTrigger, error)); ok {
return rf(triggers)
}
if rf, ok := ret.Get(0).(func([]api.Trigger) []enum.WebhookTrigger); ok {
r0 = rf(triggers)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]enum.WebhookTrigger)
}
}
if rf, ok := ret.Get(1).(func([]api.Trigger) error); ok {
r1 = rf(triggers)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MapToWebhookCore provides a mock function with given fields: ctx, webhookRequest, regInfo
func (_m *RegistryMetadataHelper) MapToWebhookCore(ctx context.Context, webhookRequest api.WebhookRequest, regInfo *registrytypes.RegistryRequestBaseInfo) (*types.WebhookCore, error) {
ret := _m.Called(ctx, webhookRequest, regInfo)
if len(ret) == 0 {
panic("no return value specified for MapToWebhookCore")
}
var r0 *types.WebhookCore
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, api.WebhookRequest, *registrytypes.RegistryRequestBaseInfo) (*types.WebhookCore, error)); ok {
return rf(ctx, webhookRequest, regInfo)
}
if rf, ok := ret.Get(0).(func(context.Context, api.WebhookRequest, *registrytypes.RegistryRequestBaseInfo) *types.WebhookCore); ok {
r0 = rf(ctx, webhookRequest, regInfo)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.WebhookCore)
}
}
if rf, ok := ret.Get(1).(func(context.Context, api.WebhookRequest, *registrytypes.RegistryRequestBaseInfo) error); ok {
r1 = rf(ctx, webhookRequest, regInfo)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MapToWebhookResponseEntity provides a mock function with given fields: ctx, webhook
func (_m *RegistryMetadataHelper) MapToWebhookResponseEntity(ctx context.Context, webhook *types.WebhookCore) (*api.Webhook, error) {
ret := _m.Called(ctx, webhook)
if len(ret) == 0 {
panic("no return value specified for MapToWebhookResponseEntity")
}
var r0 *api.Webhook
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, *types.WebhookCore) (*api.Webhook, error)); ok {
return rf(ctx, webhook)
}
if rf, ok := ret.Get(0).(func(context.Context, *types.WebhookCore) *api.Webhook); ok {
r0 = rf(ctx, webhook)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*api.Webhook)
}
}
if rf, ok := ret.Get(1).(func(context.Context, *types.WebhookCore) error); ok {
r1 = rf(ctx, webhook)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// NewRegistryMetadataHelper creates a new instance of RegistryMetadataHelper. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewRegistryMetadataHelper(t interface {
mock.TestingT
Cleanup(func())
}) *RegistryMetadataHelper {
mock := &RegistryMetadataHelper{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/controller.go | registry/app/api/controller/mocks/controller.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
multipart "mime/multipart"
pkgpython "github.com/harness/gitness/registry/app/api/controller/pkg/python"
python "github.com/harness/gitness/registry/app/pkg/types/python"
mock "github.com/stretchr/testify/mock"
)
// Controller is an autogenerated mock type for the Controller type
type Controller struct {
mock.Mock
}
// DownloadPackageFile provides a mock function with given fields: ctx, info
func (_m *Controller) DownloadPackageFile(ctx context.Context, info python.ArtifactInfo) *pkgpython.GetArtifactResponse {
ret := _m.Called(ctx, info)
if len(ret) == 0 {
panic("no return value specified for DownloadPackageFile")
}
var r0 *pkgpython.GetArtifactResponse
if rf, ok := ret.Get(0).(func(context.Context, python.ArtifactInfo) *pkgpython.GetArtifactResponse); ok {
r0 = rf(ctx, info)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*pkgpython.GetArtifactResponse)
}
}
return r0
}
// GetPackageMetadata provides a mock function with given fields: ctx, info
func (_m *Controller) GetPackageMetadata(ctx context.Context, info python.ArtifactInfo) (python.PackageMetadata, error) {
ret := _m.Called(ctx, info)
if len(ret) == 0 {
panic("no return value specified for GetPackageMetadata")
}
var r0 python.PackageMetadata
var r1 error
if rf, ok := ret.Get(0).(func(context.Context, python.ArtifactInfo) (python.PackageMetadata, error)); ok {
return rf(ctx, info)
}
if rf, ok := ret.Get(0).(func(context.Context, python.ArtifactInfo) python.PackageMetadata); ok {
r0 = rf(ctx, info)
} else {
r0 = ret.Get(0).(python.PackageMetadata)
}
if rf, ok := ret.Get(1).(func(context.Context, python.ArtifactInfo) error); ok {
r1 = rf(ctx, info)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// UploadPackageFile provides a mock function with given fields: ctx, info, file, fileHeader
func (_m *Controller) UploadPackageFile(ctx context.Context, info python.ArtifactInfo, file multipart.File, fileHeader *multipart.FileHeader) *pkgpython.PutArtifactResponse {
ret := _m.Called(ctx, info, file, fileHeader)
if len(ret) == 0 {
panic("no return value specified for UploadPackageFile")
}
var r0 *pkgpython.PutArtifactResponse
if rf, ok := ret.Get(0).(func(context.Context, python.ArtifactInfo, multipart.File, *multipart.FileHeader) *pkgpython.PutArtifactResponse); ok {
r0 = rf(ctx, info, file, fileHeader)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*pkgpython.PutArtifactResponse)
}
}
return r0
}
// NewController creates a new instance of Controller. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewController(t interface {
mock.TestingT
Cleanup(func())
}) *Controller {
mock := &Controller{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/download_stat_repository.go | registry/app/api/controller/mocks/download_stat_repository.go | // Code generated by mockery; DO NOT EDIT.
// github.com/vektra/mockery
// template: testify
package mocks
import (
"context"
"github.com/harness/gitness/registry/types"
mock "github.com/stretchr/testify/mock"
)
// NewMockDownloadStatRepository creates a new instance of MockDownloadStatRepository. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewMockDownloadStatRepository(t interface {
mock.TestingT
Cleanup(func())
}) *MockDownloadStatRepository {
mock := &MockDownloadStatRepository{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
// MockDownloadStatRepository is an autogenerated mock type for the DownloadStatRepository type
type MockDownloadStatRepository struct {
mock.Mock
}
type MockDownloadStatRepository_Expecter struct {
mock *mock.Mock
}
func (_m *MockDownloadStatRepository) EXPECT() *MockDownloadStatRepository_Expecter {
return &MockDownloadStatRepository_Expecter{mock: &_m.Mock}
}
// Create provides a mock function for the type MockDownloadStatRepository
func (_mock *MockDownloadStatRepository) Create(ctx context.Context, downloadStat *types.DownloadStat) error {
ret := _mock.Called(ctx, downloadStat)
if len(ret) == 0 {
panic("no return value specified for Create")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, *types.DownloadStat) error); ok {
r0 = returnFunc(ctx, downloadStat)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockDownloadStatRepository_Create_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Create'
type MockDownloadStatRepository_Create_Call struct {
*mock.Call
}
// Create is a helper method to define mock.On call
// - ctx context.Context
// - downloadStat *types.DownloadStat
func (_e *MockDownloadStatRepository_Expecter) Create(ctx interface{}, downloadStat interface{}) *MockDownloadStatRepository_Create_Call {
return &MockDownloadStatRepository_Create_Call{Call: _e.mock.On("Create", ctx, downloadStat)}
}
func (_c *MockDownloadStatRepository_Create_Call) Run(run func(ctx context.Context, downloadStat *types.DownloadStat)) *MockDownloadStatRepository_Create_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 *types.DownloadStat
if args[1] != nil {
arg1 = args[1].(*types.DownloadStat)
}
run(
arg0,
arg1,
)
})
return _c
}
func (_c *MockDownloadStatRepository_Create_Call) Return(err error) *MockDownloadStatRepository_Create_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockDownloadStatRepository_Create_Call) RunAndReturn(run func(ctx context.Context, downloadStat *types.DownloadStat) error) *MockDownloadStatRepository_Create_Call {
_c.Call.Return(run)
return _c
}
// CreateByRegistryIDImageAndArtifactName provides a mock function for the type MockDownloadStatRepository
func (_mock *MockDownloadStatRepository) CreateByRegistryIDImageAndArtifactName(ctx context.Context, regID int64, image string, artifactName string) error {
ret := _mock.Called(ctx, regID, image, artifactName)
if len(ret) == 0 {
panic("no return value specified for CreateByRegistryIDImageAndArtifactName")
}
var r0 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64, string, string) error); ok {
r0 = returnFunc(ctx, regID, image, artifactName)
} else {
r0 = ret.Error(0)
}
return r0
}
// MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'CreateByRegistryIDImageAndArtifactName'
type MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call struct {
*mock.Call
}
// CreateByRegistryIDImageAndArtifactName is a helper method to define mock.On call
// - ctx context.Context
// - regID int64
// - image string
// - artifactName string
func (_e *MockDownloadStatRepository_Expecter) CreateByRegistryIDImageAndArtifactName(ctx interface{}, regID interface{}, image interface{}, artifactName interface{}) *MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call {
return &MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call{Call: _e.mock.On("CreateByRegistryIDImageAndArtifactName", ctx, regID, image, artifactName)}
}
func (_c *MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call) Run(run func(ctx context.Context, regID int64, image string, artifactName string)) *MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
var arg2 string
if args[2] != nil {
arg2 = args[2].(string)
}
var arg3 string
if args[3] != nil {
arg3 = args[3].(string)
}
run(
arg0,
arg1,
arg2,
arg3,
)
})
return _c
}
func (_c *MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call) Return(err error) *MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call {
_c.Call.Return(err)
return _c
}
func (_c *MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call) RunAndReturn(run func(ctx context.Context, regID int64, image string, artifactName string) error) *MockDownloadStatRepository_CreateByRegistryIDImageAndArtifactName_Call {
_c.Call.Return(run)
return _c
}
// GetTotalDownloadsForArtifactID provides a mock function for the type MockDownloadStatRepository
func (_mock *MockDownloadStatRepository) GetTotalDownloadsForArtifactID(ctx context.Context, artifactID int64) (int64, error) {
ret := _mock.Called(ctx, artifactID)
if len(ret) == 0 {
panic("no return value specified for GetTotalDownloadsForArtifactID")
}
var r0 int64
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64) (int64, error)); ok {
return returnFunc(ctx, artifactID)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64) int64); ok {
r0 = returnFunc(ctx, artifactID)
} else {
r0 = ret.Get(0).(int64)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = returnFunc(ctx, artifactID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetTotalDownloadsForArtifactID'
type MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call struct {
*mock.Call
}
// GetTotalDownloadsForArtifactID is a helper method to define mock.On call
// - ctx context.Context
// - artifactID int64
func (_e *MockDownloadStatRepository_Expecter) GetTotalDownloadsForArtifactID(ctx interface{}, artifactID interface{}) *MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call {
return &MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call{Call: _e.mock.On("GetTotalDownloadsForArtifactID", ctx, artifactID)}
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call) Run(run func(ctx context.Context, artifactID int64)) *MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
run(
arg0,
arg1,
)
})
return _c
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call) Return(n int64, err error) *MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call {
_c.Call.Return(n, err)
return _c
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call) RunAndReturn(run func(ctx context.Context, artifactID int64) (int64, error)) *MockDownloadStatRepository_GetTotalDownloadsForArtifactID_Call {
_c.Call.Return(run)
return _c
}
// GetTotalDownloadsForImage provides a mock function for the type MockDownloadStatRepository
func (_mock *MockDownloadStatRepository) GetTotalDownloadsForImage(ctx context.Context, imageID int64) (int64, error) {
ret := _mock.Called(ctx, imageID)
if len(ret) == 0 {
panic("no return value specified for GetTotalDownloadsForImage")
}
var r0 int64
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, int64) (int64, error)); ok {
return returnFunc(ctx, imageID)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, int64) int64); ok {
r0 = returnFunc(ctx, imageID)
} else {
r0 = ret.Get(0).(int64)
}
if returnFunc, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = returnFunc(ctx, imageID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockDownloadStatRepository_GetTotalDownloadsForImage_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetTotalDownloadsForImage'
type MockDownloadStatRepository_GetTotalDownloadsForImage_Call struct {
*mock.Call
}
// GetTotalDownloadsForImage is a helper method to define mock.On call
// - ctx context.Context
// - imageID int64
func (_e *MockDownloadStatRepository_Expecter) GetTotalDownloadsForImage(ctx interface{}, imageID interface{}) *MockDownloadStatRepository_GetTotalDownloadsForImage_Call {
return &MockDownloadStatRepository_GetTotalDownloadsForImage_Call{Call: _e.mock.On("GetTotalDownloadsForImage", ctx, imageID)}
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForImage_Call) Run(run func(ctx context.Context, imageID int64)) *MockDownloadStatRepository_GetTotalDownloadsForImage_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 int64
if args[1] != nil {
arg1 = args[1].(int64)
}
run(
arg0,
arg1,
)
})
return _c
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForImage_Call) Return(n int64, err error) *MockDownloadStatRepository_GetTotalDownloadsForImage_Call {
_c.Call.Return(n, err)
return _c
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForImage_Call) RunAndReturn(run func(ctx context.Context, imageID int64) (int64, error)) *MockDownloadStatRepository_GetTotalDownloadsForImage_Call {
_c.Call.Return(run)
return _c
}
// GetTotalDownloadsForManifests provides a mock function for the type MockDownloadStatRepository
func (_mock *MockDownloadStatRepository) GetTotalDownloadsForManifests(ctx context.Context, artifactVersion []string, imageID int64) (map[string]int64, error) {
ret := _mock.Called(ctx, artifactVersion, imageID)
if len(ret) == 0 {
panic("no return value specified for GetTotalDownloadsForManifests")
}
var r0 map[string]int64
var r1 error
if returnFunc, ok := ret.Get(0).(func(context.Context, []string, int64) (map[string]int64, error)); ok {
return returnFunc(ctx, artifactVersion, imageID)
}
if returnFunc, ok := ret.Get(0).(func(context.Context, []string, int64) map[string]int64); ok {
r0 = returnFunc(ctx, artifactVersion, imageID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(map[string]int64)
}
}
if returnFunc, ok := ret.Get(1).(func(context.Context, []string, int64) error); ok {
r1 = returnFunc(ctx, artifactVersion, imageID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// MockDownloadStatRepository_GetTotalDownloadsForManifests_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'GetTotalDownloadsForManifests'
type MockDownloadStatRepository_GetTotalDownloadsForManifests_Call struct {
*mock.Call
}
// GetTotalDownloadsForManifests is a helper method to define mock.On call
// - ctx context.Context
// - artifactVersion []string
// - imageID int64
func (_e *MockDownloadStatRepository_Expecter) GetTotalDownloadsForManifests(ctx interface{}, artifactVersion interface{}, imageID interface{}) *MockDownloadStatRepository_GetTotalDownloadsForManifests_Call {
return &MockDownloadStatRepository_GetTotalDownloadsForManifests_Call{Call: _e.mock.On("GetTotalDownloadsForManifests", ctx, artifactVersion, imageID)}
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForManifests_Call) Run(run func(ctx context.Context, artifactVersion []string, imageID int64)) *MockDownloadStatRepository_GetTotalDownloadsForManifests_Call {
_c.Call.Run(func(args mock.Arguments) {
var arg0 context.Context
if args[0] != nil {
arg0 = args[0].(context.Context)
}
var arg1 []string
if args[1] != nil {
arg1 = args[1].([]string)
}
var arg2 int64
if args[2] != nil {
arg2 = args[2].(int64)
}
run(
arg0,
arg1,
arg2,
)
})
return _c
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForManifests_Call) Return(stringToInt64 map[string]int64, err error) *MockDownloadStatRepository_GetTotalDownloadsForManifests_Call {
_c.Call.Return(stringToInt64, err)
return _c
}
func (_c *MockDownloadStatRepository_GetTotalDownloadsForManifests_Call) RunAndReturn(run func(ctx context.Context, artifactVersion []string, imageID int64) (map[string]int64, error)) *MockDownloadStatRepository_GetTotalDownloadsForManifests_Call {
_c.Call.Return(run)
return _c
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/image_store.go | registry/app/api/controller/mocks/image_store.go | package mocks
import (
"context"
"github.com/harness/gitness/registry/types"
"github.com/stretchr/testify/mock"
)
// ImageStore is an autogenerated mock type for the ImageStore type
type ImageStore struct {
mock.Mock
}
// Get provides a mock function with given fields: ctx, id
func (m *ImageStore) Get(ctx context.Context, id int64) (*types.Image, error) {
ret := m.Called(ctx, id)
var r0 *types.Image
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.Image); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByName provides a mock function with given fields: ctx, registryID, name
func (m *ImageStore) GetByName(ctx context.Context, registryID int64, name string) (*types.Image, error) {
ret := m.Called(ctx, registryID, name)
var r0 *types.Image
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.Image); ok {
r0 = rf(ctx, registryID, name)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, registryID, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetLabelsByParentIDAndRepo provides a mock function with given fields: ctx, parentID, repo, limit, offset, search
func (m *ImageStore) GetLabelsByParentIDAndRepo(ctx context.Context, parentID int64, repo string, limit int, offset int, search string) ([]string, error) {
ret := m.Called(ctx, parentID, repo, limit, offset, search)
var r0 []string
if rf, ok := ret.Get(0).(func(context.Context, int64, string, int, int, string) []string); ok {
r0 = rf(ctx, parentID, repo, limit, offset, search)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]string)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, string, int, int, string) error); ok {
r1 = rf(ctx, parentID, repo, limit, offset, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountLabelsByParentIDAndRepo provides a mock function with given fields: ctx, parentID, repo, search
func (m *ImageStore) CountLabelsByParentIDAndRepo(ctx context.Context, parentID int64, repo string, search string) (int64, error) {
ret := m.Called(ctx, parentID, repo, search)
var r0 int64
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) int64); ok {
r0 = rf(ctx, parentID, repo, search)
} else {
r0 = ret.Get(0).(int64)
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string) error); ok {
r1 = rf(ctx, parentID, repo, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByRepoAndName provides a mock function with given fields: ctx, parentID, repo, name
func (m *ImageStore) GetByRepoAndName(ctx context.Context, parentID int64, repo string, name string) (*types.Image, error) {
ret := m.Called(ctx, parentID, repo, name)
var r0 *types.Image
if rf, ok := ret.Get(0).(func(context.Context, int64, string, string) *types.Image); ok {
r0 = rf(ctx, parentID, repo, name)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.Image)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, string, string) error); ok {
r1 = rf(ctx, parentID, repo, name)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CreateOrUpdate provides a mock function with given fields: ctx, image
func (m *ImageStore) CreateOrUpdate(ctx context.Context, image *types.Image) error {
ret := m.Called(ctx, image)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Image) error); ok {
r0 = rf(ctx, image)
} else {
r0 = ret.Error(0)
}
return r0
}
// Update provides a mock function with given fields: ctx, image
func (m *ImageStore) Update(ctx context.Context, image *types.Image) error {
ret := m.Called(ctx, image)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Image) error); ok {
r0 = rf(ctx, image)
} else {
r0 = ret.Error(0)
}
return r0
}
// UpdateStatus provides a mock function with given fields: ctx, image
func (m *ImageStore) UpdateStatus(ctx context.Context, image *types.Image) error {
ret := m.Called(ctx, image)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.Image) error); ok {
r0 = rf(ctx, image)
} else {
r0 = ret.Error(0)
}
return r0
}
// DeleteByRegistryID provides a mock function with given fields: ctx, registryID
func (m *ImageStore) DeleteByRegistryID(ctx context.Context, registryID int64) error {
ret := m.Called(ctx, registryID)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64) error); ok {
r0 = rf(ctx, registryID)
} else {
r0 = ret.Error(0)
}
return r0
}
// DeleteBandwidthStatByRegistryID provides a mock function with given fields: ctx, registryID
func (m *ImageStore) DeleteBandwidthStatByRegistryID(ctx context.Context, registryID int64) error {
ret := m.Called(ctx, registryID)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64) error); ok {
r0 = rf(ctx, registryID)
} else {
r0 = ret.Error(0)
}
return r0
}
// DeleteDownloadStatByRegistryID provides a mock function with given fields: ctx, registryID
func (m *ImageStore) DeleteDownloadStatByRegistryID(ctx context.Context, registryID int64) error {
ret := m.Called(ctx, registryID)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64) error); ok {
r0 = rf(ctx, registryID)
} else {
r0 = ret.Error(0)
}
return r0
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/space_path_store.go | registry/app/api/controller/mocks/space_path_store.go | package mocks
import (
"context"
"github.com/harness/gitness/types"
"github.com/stretchr/testify/mock"
)
// SpacePathStore is a mock of SpacePathStore interface.
type SpacePathStore struct {
mock.Mock
}
// FindByPath provides a mock function
func (m *SpacePathStore) FindByPath(ctx context.Context, path string) (*types.SpacePath, error) {
ret := m.Called(ctx, path)
var r0 *types.SpacePath
if rf, ok := ret.Get(0).(func(context.Context, string) *types.SpacePath); ok {
r0 = rf(ctx, path)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.SpacePath)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, path)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindPrimaryBySpaceID provides a mock function
func (m *SpacePathStore) FindPrimaryBySpaceID(ctx context.Context, spaceID int64) (*types.SpacePath, error) {
ret := m.Called(ctx, spaceID)
var r0 *types.SpacePath
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.SpacePath); ok {
r0 = rf(ctx, spaceID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.SpacePath)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, spaceID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// InsertSegment provides a mock function
func (m *SpacePathStore) InsertSegment(ctx context.Context, segment *types.SpacePathSegment) error {
ret := m.Called(ctx, segment)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.SpacePathSegment) error); ok {
r0 = rf(ctx, segment)
} else {
r0 = ret.Error(0)
}
return r0
}
// DeletePrimarySegment provides a mock function
func (m *SpacePathStore) DeletePrimarySegment(ctx context.Context, spaceID int64) error {
ret := m.Called(ctx, spaceID)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64) error); ok {
r0 = rf(ctx, spaceID)
} else {
r0 = ret.Error(0)
}
return r0
}
// DeletePathsAndDescendandPaths provides a mock function
func (m *SpacePathStore) DeletePathsAndDescendandPaths(ctx context.Context, spaceID int64) error {
ret := m.Called(ctx, spaceID)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64) error); ok {
r0 = rf(ctx, spaceID)
} else {
r0 = ret.Error(0)
}
return r0
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/file_manager.go | registry/app/api/controller/mocks/file_manager.go | // Code generated by mockery. DO NOT EDIT.
package mocks
import (
"context"
"io"
"mime/multipart"
"github.com/harness/gitness/registry/app/storage"
"github.com/harness/gitness/registry/types"
"github.com/stretchr/testify/mock"
)
// FileManager is a mock type for filemanager.FileManager
type FileManager struct {
mock.Mock
}
// UploadFile provides a mock function
func (m *FileManager) UploadFile(ctx context.Context, filePath string, regName string, regID int64, rootParentID int64, rootIdentifier string, file multipart.File, fileReader io.Reader, filename string) (types.FileInfo, error) {
args := m.Called(ctx, filePath, regName, regID, rootParentID, rootIdentifier, file, fileReader, filename)
return args.Get(0).(types.FileInfo), args.Error(1)
}
// DownloadFile provides a mock function
func (m *FileManager) DownloadFile(ctx context.Context, filePath string, regInfo types.Registry, rootIdentifier string) (*storage.FileReader, int64, string, error) {
args := m.Called(ctx, filePath, regInfo, rootIdentifier)
return args.Get(0).(*storage.FileReader), args.Get(1).(int64), args.Get(2).(string), args.Error(3)
}
// DeleteFile provides a mock function
func (m *FileManager) DeleteFile(ctx context.Context, filePath string, regID int) error {
args := m.Called(ctx, filePath, regID)
return args.Error(0)
}
// HeadFile provides a mock function
func (m *FileManager) HeadFile(ctx context.Context, filePath string, regID int64) (string, error) {
args := m.Called(ctx, filePath, regID)
return args.String(0), args.Error(1)
}
// GetFileMetadata provides a mock function
func (m *FileManager) GetFileMetadata(ctx context.Context, filePath string, regID int64) (types.FileInfo, error) {
args := m.Called(ctx, filePath, regID)
return args.Get(0).(types.FileInfo), args.Error(1)
}
// DeleteFileByRegistryID provides a mock function
func (m *FileManager) DeleteFileByRegistryID(ctx context.Context, regID int64, regName string) error {
args := m.Called(ctx, regID, regName)
return args.Error(0)
}
// GetFilesMetadata provides a mock function
func (m *FileManager) GetFilesMetadata(ctx context.Context, filePath string, regID int64, sortByField string, sortByOrder string, limit int, offset int, search string) (*[]types.FileNodeMetadata, error) {
args := m.Called(ctx, filePath, regID, sortByField, sortByOrder, limit, offset, search)
return args.Get(0).(*[]types.FileNodeMetadata), args.Error(1)
}
// CountFilesByPath provides a mock function
func (m *FileManager) CountFilesByPath(ctx context.Context, filePath string, regID int64) (int64, error) {
args := m.Called(ctx, filePath, regID)
return args.Get(0).(int64), args.Error(1)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/webhooks_execution_repository.go | registry/app/api/controller/mocks/webhooks_execution_repository.go | // Code generated by testify. DO NOT EDIT.
package mocks
import (
"context"
"github.com/harness/gitness/types"
"github.com/stretchr/testify/mock"
)
// WebhooksExecutionRepository is a mock of store.WebhooksExecutionRepository interface.
type WebhooksExecutionRepository struct {
mock.Mock
}
// Find provides a mock function
func (m *WebhooksExecutionRepository) Find(ctx context.Context, id int64) (*types.WebhookExecutionCore, error) {
ret := m.Called(ctx, id)
var r0 *types.WebhookExecutionCore
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.WebhookExecutionCore); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.WebhookExecutionCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Create provides a mock function
func (m *WebhooksExecutionRepository) Create(ctx context.Context, hook *types.WebhookExecutionCore) error {
ret := m.Called(ctx, hook)
return ret.Error(0)
}
// ListForWebhook provides a mock function
func (m *WebhooksExecutionRepository) ListForWebhook(ctx context.Context, webhookID int64, limit int, page int, size int) ([]*types.WebhookExecutionCore, error) {
ret := m.Called(ctx, webhookID, limit, page, size)
var r0 []*types.WebhookExecutionCore
if rf, ok := ret.Get(0).(func(context.Context, int64, int, int, int) []*types.WebhookExecutionCore); ok {
r0 = rf(ctx, webhookID, limit, page, size)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]*types.WebhookExecutionCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, int, int, int) error); ok {
r1 = rf(ctx, webhookID, limit, page, size)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountForWebhook provides a mock function
func (m *WebhooksExecutionRepository) CountForWebhook(ctx context.Context, webhookID int64) (int64, error) {
ret := m.Called(ctx, webhookID)
var r0 int64
if rf, ok := ret.Get(0).(func(context.Context, int64) int64); ok {
r0 = rf(ctx, webhookID)
} else {
r0 = ret.Get(0).(int64)
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, webhookID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// ListForTrigger provides a mock function
func (m *WebhooksExecutionRepository) ListForTrigger(ctx context.Context, triggerID string) ([]*types.WebhookExecutionCore, error) {
ret := m.Called(ctx, triggerID)
var r0 []*types.WebhookExecutionCore
if rf, ok := ret.Get(0).(func(context.Context, string) []*types.WebhookExecutionCore); ok {
r0 = rf(ctx, triggerID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).([]*types.WebhookExecutionCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, triggerID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/url_provider.go | registry/app/api/controller/mocks/url_provider.go | // Code generated by mockery v2.53.3. DO NOT EDIT.
package mocks
import (
context "context"
mock "github.com/stretchr/testify/mock"
)
// Provider is an autogenerated mock type for the Provider type
type Provider struct {
mock.Mock
}
// GenerateContainerGITCloneURL provides a mock function with given fields: ctx, repoPath
func (_m *Provider) GenerateContainerGITCloneURL(ctx context.Context, repoPath string) string {
ret := _m.Called(ctx, repoPath)
if len(ret) == 0 {
panic("no return value specified for GenerateContainerGITCloneURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string) string); ok {
r0 = rf(ctx, repoPath)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GenerateGITCloneSSHURL provides a mock function with given fields: ctx, repoPath
func (_m *Provider) GenerateGITCloneSSHURL(ctx context.Context, repoPath string) string {
ret := _m.Called(ctx, repoPath)
if len(ret) == 0 {
panic("no return value specified for GenerateGITCloneSSHURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string) string); ok {
r0 = rf(ctx, repoPath)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GenerateGITCloneURL provides a mock function with given fields: ctx, repoPath
func (_m *Provider) GenerateGITCloneURL(ctx context.Context, repoPath string) string {
ret := _m.Called(ctx, repoPath)
if len(ret) == 0 {
panic("no return value specified for GenerateGITCloneURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string) string); ok {
r0 = rf(ctx, repoPath)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GenerateUIBuildURL provides a mock function with given fields: ctx, repoPath, pipelineIdentifier, seqNumber
func (_m *Provider) GenerateUIBuildURL(ctx context.Context, repoPath string, pipelineIdentifier string, seqNumber int64) string {
ret := _m.Called(ctx, repoPath, pipelineIdentifier, seqNumber)
if len(ret) == 0 {
panic("no return value specified for GenerateUIBuildURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string, string, int64) string); ok {
r0 = rf(ctx, repoPath, pipelineIdentifier, seqNumber)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GenerateUICompareURL provides a mock function with given fields: ctx, repoPath, ref1, ref2
func (_m *Provider) GenerateUICompareURL(ctx context.Context, repoPath string, ref1 string, ref2 string) string {
ret := _m.Called(ctx, repoPath, ref1, ref2)
if len(ret) == 0 {
panic("no return value specified for GenerateUICompareURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string, string, string) string); ok {
r0 = rf(ctx, repoPath, ref1, ref2)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GenerateUIPRURL provides a mock function with given fields: ctx, repoPath, prID
func (_m *Provider) GenerateUIPRURL(ctx context.Context, repoPath string, prID int64) string {
ret := _m.Called(ctx, repoPath, prID)
if len(ret) == 0 {
panic("no return value specified for GenerateUIPRURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string, int64) string); ok {
r0 = rf(ctx, repoPath, prID)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GenerateUIRefURL provides a mock function with given fields: ctx, repoPath, ref
func (_m *Provider) GenerateUIRefURL(ctx context.Context, repoPath string, ref string) string {
ret := _m.Called(ctx, repoPath, ref)
if len(ret) == 0 {
panic("no return value specified for GenerateUIRefURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string, string) string); ok {
r0 = rf(ctx, repoPath, ref)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GenerateUIRegistryURL provides a mock function with given fields: ctx, parentSpacePath, registryName
func (_m *Provider) GenerateUIRegistryURL(ctx context.Context, parentSpacePath string, registryName string) string {
ret := _m.Called(ctx, parentSpacePath, registryName)
if len(ret) == 0 {
panic("no return value specified for GenerateUIRegistryURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string, string) string); ok {
r0 = rf(ctx, parentSpacePath, registryName)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GenerateUIRepoURL provides a mock function with given fields: ctx, repoPath
func (_m *Provider) GenerateUIRepoURL(ctx context.Context, repoPath string) string {
ret := _m.Called(ctx, repoPath)
if len(ret) == 0 {
panic("no return value specified for GenerateUIRepoURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string) string); ok {
r0 = rf(ctx, repoPath)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GetAPIHostname provides a mock function with given fields: ctx
func (_m *Provider) GetAPIHostname(ctx context.Context) string {
ret := _m.Called(ctx)
if len(ret) == 0 {
panic("no return value specified for GetAPIHostname")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context) string); ok {
r0 = rf(ctx)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GetAPIProto provides a mock function with given fields: ctx
func (_m *Provider) GetAPIProto(ctx context.Context) string {
ret := _m.Called(ctx)
if len(ret) == 0 {
panic("no return value specified for GetAPIProto")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context) string); ok {
r0 = rf(ctx)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GetGITHostname provides a mock function with given fields: ctx
func (_m *Provider) GetGITHostname(ctx context.Context) string {
ret := _m.Called(ctx)
if len(ret) == 0 {
panic("no return value specified for GetGITHostname")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context) string); ok {
r0 = rf(ctx)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GetInternalAPIURL provides a mock function with given fields: ctx
func (_m *Provider) GetInternalAPIURL(ctx context.Context) string {
ret := _m.Called(ctx)
if len(ret) == 0 {
panic("no return value specified for GetInternalAPIURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context) string); ok {
r0 = rf(ctx)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// GetUIBaseURL provides a mock function with given fields: ctx, params
func (_m *Provider) GetUIBaseURL(ctx context.Context, params ...string) string {
_va := make([]interface{}, len(params))
for _i := range params {
_va[_i] = params[_i]
}
var _ca []interface{}
_ca = append(_ca, ctx)
_ca = append(_ca, _va...)
ret := _m.Called(_ca...)
if len(ret) == 0 {
panic("no return value specified for GetUIBaseURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, ...string) string); ok {
r0 = rf(ctx, params...)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// PackageURL provides a mock function with given fields: ctx, regRef, pkgType, params
func (_m *Provider) PackageURL(ctx context.Context, regRef string, pkgType string, params ...string) string {
_va := make([]interface{}, len(params))
for _i := range params {
_va[_i] = params[_i]
}
var _ca []interface{}
_ca = append(_ca, ctx, regRef, pkgType)
_ca = append(_ca, _va...)
ret := _m.Called(_ca...)
if len(ret) == 0 {
panic("no return value specified for PackageURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, string, string, ...string) string); ok {
r0 = rf(ctx, regRef, pkgType, params...)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// RegistryURL provides a mock function with given fields: ctx, params
func (_m *Provider) RegistryURL(ctx context.Context, params ...string) string {
_va := make([]interface{}, len(params))
for _i := range params {
_va[_i] = params[_i]
}
var _ca []interface{}
_ca = append(_ca, ctx)
_ca = append(_ca, _va...)
ret := _m.Called(_ca...)
if len(ret) == 0 {
panic("no return value specified for RegistryURL")
}
var r0 string
if rf, ok := ret.Get(0).(func(context.Context, ...string) string); ok {
r0 = rf(ctx, params...)
} else {
r0 = ret.Get(0).(string)
}
return r0
}
// NewProvider creates a new instance of Provider. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations.
// The first argument is typically a *testing.T value.
func NewProvider(t interface {
mock.TestingT
Cleanup(func())
}) *Provider {
mock := &Provider{}
mock.Mock.Test(t)
t.Cleanup(func() { mock.AssertExpectations(t) })
return mock
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/upstream_proxy_store.go | registry/app/api/controller/mocks/upstream_proxy_store.go | package mocks
import (
"context"
"github.com/harness/gitness/registry/types"
"github.com/stretchr/testify/mock"
)
// UpstreamProxyStore is an autogenerated mock type for the UpstreamProxyConfigRepository type
type UpstreamProxyStore struct {
mock.Mock
}
// Get provides a mock function with given fields: ctx, id
func (m *UpstreamProxyStore) Get(ctx context.Context, id int64) (*types.UpstreamProxy, error) {
ret := m.Called(ctx, id)
var r0 *types.UpstreamProxy
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.UpstreamProxy); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.UpstreamProxy)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByRegistryIdentifier provides a mock function with given fields: ctx, parentID, repoKey
func (m *UpstreamProxyStore) GetByRegistryIdentifier(ctx context.Context, parentID int64, repoKey string) (*types.UpstreamProxy, error) {
ret := m.Called(ctx, parentID, repoKey)
var r0 *types.UpstreamProxy
if rf, ok := ret.Get(0).(func(context.Context, int64, string) *types.UpstreamProxy); ok {
r0 = rf(ctx, parentID, repoKey)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.UpstreamProxy)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, string) error); ok {
r1 = rf(ctx, parentID, repoKey)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// GetByParentID provides a mock function with given fields: ctx, parentID
func (m *UpstreamProxyStore) GetByParentID(ctx context.Context, parentID string) (*[]types.UpstreamProxy, error) {
ret := m.Called(ctx, parentID)
var r0 *[]types.UpstreamProxy
if rf, ok := ret.Get(0).(func(context.Context, string) *[]types.UpstreamProxy); ok {
r0 = rf(ctx, parentID)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.UpstreamProxy)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, parentID)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Create provides a mock function with given fields: ctx, upstreamproxyRecord
func (m *UpstreamProxyStore) Create(ctx context.Context, upstreamproxyRecord *types.UpstreamProxyConfig) (int64, error) {
ret := m.Called(ctx, upstreamproxyRecord)
var r0 int64
if rf, ok := ret.Get(0).(func(context.Context, *types.UpstreamProxyConfig) int64); ok {
r0 = rf(ctx, upstreamproxyRecord)
} else {
r0 = ret.Get(0).(int64)
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, *types.UpstreamProxyConfig) error); ok {
r1 = rf(ctx, upstreamproxyRecord)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// Delete provides a mock function with given fields: ctx, parentID, repoKey
func (m *UpstreamProxyStore) Delete(ctx context.Context, parentID int64, repoKey string) error {
ret := m.Called(ctx, parentID, repoKey)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, int64, string) error); ok {
r0 = rf(ctx, parentID, repoKey)
} else {
r0 = ret.Error(0)
}
return r0
}
// Update provides a mock function with given fields: ctx, upstreamproxyRecord
func (m *UpstreamProxyStore) Update(ctx context.Context, upstreamproxyRecord *types.UpstreamProxyConfig) error {
ret := m.Called(ctx, upstreamproxyRecord)
var r0 error
if rf, ok := ret.Get(0).(func(context.Context, *types.UpstreamProxyConfig) error); ok {
r0 = rf(ctx, upstreamproxyRecord)
} else {
r0 = ret.Error(0)
}
return r0
}
// GetAll provides a mock function with given fields: ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search
func (m *UpstreamProxyStore) GetAll(ctx context.Context, parentID int64, packageTypes []string, sortByField string, sortByOrder string, limit int, offset int, search string) (*[]types.UpstreamProxy, error) {
ret := m.Called(ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search)
var r0 *[]types.UpstreamProxy
if rf, ok := ret.Get(0).(func(context.Context, int64, []string, string, string, int, int, string) *[]types.UpstreamProxy); ok {
r0 = rf(ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*[]types.UpstreamProxy)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64, []string, string, string, int, int, string) error); ok {
r1 = rf(ctx, parentID, packageTypes, sortByField, sortByOrder, limit, offset, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// CountAll provides a mock function with given fields: ctx, parentID, packageTypes, search
func (m *UpstreamProxyStore) CountAll(ctx context.Context, parentID string, packageTypes []string, search string) (int64, error) {
ret := m.Called(ctx, parentID, packageTypes, search)
var r0 int64
if rf, ok := ret.Get(0).(func(context.Context, string, []string, string) int64); ok {
r0 = rf(ctx, parentID, packageTypes, search)
} else {
r0 = ret.Get(0).(int64)
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string, []string, string) error); ok {
r1 = rf(ctx, parentID, packageTypes, search)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/mocks/space_finder.go | registry/app/api/controller/mocks/space_finder.go | // Code generated by testify. DO NOT EDIT.
package mocks
import (
"context"
"github.com/harness/gitness/types"
"github.com/stretchr/testify/mock"
)
// SpaceFinder is a mock of SpaceFinder interface.
type SpaceFinder struct {
mock.Mock
}
// Find provides a mock function
func (m *SpaceFinder) Find(ctx context.Context, id int64) (*types.SpaceCore, error) {
ret := m.Called(ctx, id)
var r0 *types.SpaceCore
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.SpaceCore); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.SpaceCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindByRef provides a mock function
func (m *SpaceFinder) FindByID(ctx context.Context, id int64) (*types.SpaceCore, error) {
ret := m.Called(ctx, id)
var r0 *types.SpaceCore
if rf, ok := ret.Get(0).(func(context.Context, int64) *types.SpaceCore); ok {
r0 = rf(ctx, id)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.SpaceCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {
r1 = rf(ctx, id)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
func (m *SpaceFinder) FindByRef(ctx context.Context, ref string) (*types.SpaceCore, error) {
ret := m.Called(ctx, ref)
var r0 *types.SpaceCore
if rf, ok := ret.Get(0).(func(context.Context, string) *types.SpaceCore); ok {
r0 = rf(ctx, ref)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.SpaceCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, ref)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindByPath provides a mock function
func (m *SpaceFinder) FindByPath(ctx context.Context, path string) (*types.SpaceCore, error) {
ret := m.Called(ctx, path)
var r0 *types.SpaceCore
if rf, ok := ret.Get(0).(func(context.Context, string) *types.SpaceCore); ok {
r0 = rf(ctx, path)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.SpaceCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, path)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// FindByIdentifier provides a mock function
func (m *SpaceFinder) FindByIdentifier(ctx context.Context, identifier string) (*types.SpaceCore, error) {
ret := m.Called(ctx, identifier)
var r0 *types.SpaceCore
if rf, ok := ret.Get(0).(func(context.Context, string) *types.SpaceCore); ok {
r0 = rf(ctx, identifier)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*types.SpaceCore)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(context.Context, string) error); ok {
r1 = rf(ctx, identifier)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/cleanuppolicy_mapper.go | registry/app/api/controller/metadata/cleanuppolicy_mapper.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"time"
"github.com/harness/gitness/app/api/usererror"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
)
func CreateCleanupPolicyEntity(
config *artifact.ModifyRegistryJSONRequestBody,
repoID int64,
) (*[]types.CleanupPolicy, error) {
if config == nil || config.CleanupPolicy == nil {
emptySlice := make([]types.CleanupPolicy, 0)
return &emptySlice, nil
}
var cleanupPolicyEntities []types.CleanupPolicy
cleanupPolicyDto := *config.CleanupPolicy
for _, value := range cleanupPolicyDto {
cleanupPolicyEntity, err := getCleanupPolicyEntity(value, repoID)
if err != nil {
return nil, err
}
cleanupPolicyEntities = append(cleanupPolicyEntities, *cleanupPolicyEntity)
}
return &cleanupPolicyEntities, nil
}
func CreateCleanupPolicyResponse(
cleanupPolicyEntities *[]types.CleanupPolicy,
) *[]artifact.CleanupPolicy {
var cleanupPolicyDtos []artifact.CleanupPolicy
for _, value := range *cleanupPolicyEntities {
cleanupPolicy := getCleanupPolicyDto(value)
cleanupPolicyDtos = append(cleanupPolicyDtos, *cleanupPolicy)
}
return &cleanupPolicyDtos
}
func getCleanupPolicyEntity(
cleanupPolicy artifact.CleanupPolicy,
repoID int64,
) (*types.CleanupPolicy, error) {
// Validate required fields
if cleanupPolicy.ExpireDays == nil {
return nil, usererror.BadRequest("expireDays is required for cleanup policy")
}
if cleanupPolicy.Name == nil {
return nil, usererror.BadRequest("name is required for cleanup policy")
}
if cleanupPolicy.VersionPrefix == nil {
return nil, usererror.BadRequest("versionPrefix is required for cleanup policy")
}
if cleanupPolicy.PackagePrefix == nil {
return nil, usererror.BadRequest("packagePrefix is required for cleanup policy")
}
expireTime := time.Duration(*cleanupPolicy.ExpireDays) * 24 * time.Hour
return &types.CleanupPolicy{
Name: *cleanupPolicy.Name,
VersionPrefix: *cleanupPolicy.VersionPrefix,
PackagePrefix: *cleanupPolicy.PackagePrefix,
ExpiryTime: expireTime.Milliseconds(),
RegistryID: repoID,
}, nil
}
func getCleanupPolicyDto(
cleanupPolicy types.CleanupPolicy,
) *artifact.CleanupPolicy {
packagePrefix := cleanupPolicy.PackagePrefix
versionPrefix := cleanupPolicy.VersionPrefix
expiryDays := int(time.Duration(cleanupPolicy.ExpiryTime).Hours() / 24)
return &artifact.CleanupPolicy{
Name: &cleanupPolicy.Name,
VersionPrefix: &versionPrefix,
PackagePrefix: &packagePrefix,
ExpireDays: &expiryDays,
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_docker_layers.go | registry/app/api/controller/metadata/get_artifacts_docker_layers.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
m "github.com/harness/gitness/registry/app/manifest"
"github.com/harness/gitness/registry/app/manifest/ocischema"
"github.com/harness/gitness/registry/app/manifest/schema2"
"github.com/harness/gitness/registry/app/pkg/docker"
"github.com/harness/gitness/registry/types"
store2 "github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/distribution/distribution/v3/registry/api/errcode"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
const (
KB = 1024
MB = 1024 * KB
GB = 1024 * MB
DefaultSize = "0 B"
)
func (c *APIController) GetDockerArtifactLayers(
ctx context.Context,
r artifact.GetDockerArtifactLayersRequestObject,
) (artifact.GetDockerArtifactLayersResponseObject, error) {
regInfo, _ := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetDockerArtifactLayers400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetDockerArtifactLayers403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
manifestDigest := string(r.Params.Digest)
image := string(r.Artifact)
dgst, err := types.NewDigest(digest.Digest(manifestDigest))
if err != nil {
return getLayersErrorResponse(ctx, err)
}
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return getLayersErrorResponse(ctx, err)
}
if registry == nil {
return getLayersErrorResponse(ctx, fmt.Errorf("repository not found"))
}
m, err := c.ManifestStore.FindManifestByDigest(ctx, registry.ID, image, dgst)
if err != nil {
if errors.Is(err, store2.ErrResourceNotFound) {
return getLayersErrorResponse(ctx, fmt.Errorf("manifest not found"))
}
return getLayersErrorResponse(ctx, err)
}
mConfig, err := getManifestConfig(ctx, m.Configuration.Digest, regInfo.RootIdentifier, c.StorageDriver)
if err != nil {
return getLayersErrorResponse(ctx, err)
}
layersSummary := &artifact.DockerLayersSummary{
Digest: m.Digest.String(),
}
if mConfig != nil {
osArch := fmt.Sprintf("%s/%s", mConfig.Os, mConfig.Arch)
layersSummary.OsArch = &osArch
var historyLayers []artifact.DockerLayerEntry
manifest, err := docker.DBManifestToManifest(m)
if err != nil {
return getLayersErrorResponse(ctx, fmt.Errorf("failed to convert DB manifest to manifest: %w", err))
}
layers, err := getManifestLayers(manifest)
if err != nil {
return getLayersErrorResponse(ctx, err)
}
layerIndex := 0
for _, history := range mConfig.History {
var layerEntry = &artifact.DockerLayerEntry{
Command: history.CreatedBy,
}
sizeString := DefaultSize
if !history.EmptyLayer && len(layers) > layerIndex {
sizeString = GetSizeString(layers[layerIndex].Size)
layerIndex++
}
layerEntry.Size = &sizeString
historyLayers = append(
historyLayers, *layerEntry,
)
}
layersSummary.Layers = &historyLayers
} else {
return getLayersErrorResponse(ctx, fmt.Errorf("manifest config not found"))
}
return artifact.GetDockerArtifactLayers200JSONResponse{
DockerLayersResponseJSONResponse: artifact.DockerLayersResponseJSONResponse{
Data: *layersSummary,
Status: artifact.StatusSUCCESS,
},
}, nil
}
func getLayersErrorResponse(ctx context.Context, err error) (artifact.GetDockerArtifactLayersResponseObject, error) {
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to get layers: %v", err)
}
return artifact.GetDockerArtifactLayers500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
func getManifestLayers(
manifest m.Manifest,
) ([]m.Descriptor, error) {
switch manifest.(type) {
case *schema2.DeserializedManifest:
deserializedManifest := &schema2.DeserializedManifest{}
mediaType, bytes, _ := manifest.Payload()
err := deserializedManifest.UnmarshalJSON(bytes)
if err != nil {
return nil, fmt.Errorf("failed to unmarshal %s manifest: %w", mediaType, err)
}
return deserializedManifest.Layers(), nil
case *ocischema.DeserializedManifest:
deserializedManifest := &ocischema.DeserializedManifest{}
mediaType, bytes, _ := manifest.Payload()
err := deserializedManifest.UnmarshalJSON(bytes)
if err != nil {
return nil, fmt.Errorf("failed to unmarshal %s manifest: %w", mediaType, err)
}
return deserializedManifest.Layers(), nil
default:
return nil, errcode.ErrorCodeManifestInvalid.WithDetail("manifest type unsupported")
}
}
func GetSizeString(size int64) string {
switch {
case size >= GB:
return fmt.Sprintf("%.2f GB", float64(size)/float64(GB))
case size >= MB:
return fmt.Sprintf("%.2f MB", float64(size)/float64(MB))
case size >= KB:
return fmt.Sprintf("%.2f KB", float64(size)/float64(KB))
default:
return fmt.Sprintf("%d B", size)
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/retrigger_webhook_execution_test.go | registry/app/api/controller/metadata/retrigger_webhook_execution_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//nolint:lll
package metadata_test
import (
"context"
"fmt"
"testing"
"time"
gitnesswebhook "github.com/harness/gitness/app/services/webhook"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
var (
webhookExecution = &coretypes.WebhookExecutionCore{
ID: 1,
Created: time.Now().Unix(),
WebhookID: 1,
Result: enum.WebhookExecutionResultSuccess,
Duration: 100,
Error: "",
Retriggerable: false,
Request: coretypes.WebhookExecutionRequest{
URL: "http://example.com",
Headers: "{}",
Body: "{}",
},
Response: coretypes.WebhookExecutionResponse{
StatusCode: 200,
Status: "OK",
Headers: "{}",
Body: "{}",
},
TriggerType: enum.WebhookTriggerArtifactCreated,
}
webhookExecutionEntity = &api.WebhookExecution{
Id: &webhookExecution.ID,
Created: &webhookExecution.Created,
Duration: &webhookExecution.Duration,
RetriggerOf: webhookExecution.RetriggerOf,
Retriggerable: &webhookExecution.Retriggerable,
Error: &webhookExecution.Error,
WebhookId: &webhookExecution.WebhookID,
Request: &api.WebhookExecRequest{
Body: &webhookExecution.Request.Body,
Headers: &webhookExecution.Request.Headers,
Url: &webhookExecution.Request.URL,
},
Response: &api.WebhookExecResponse{
Status: &webhookExecution.Response.Status,
StatusCode: &webhookExecution.Response.StatusCode,
Body: &webhookExecution.Response.Body,
Headers: &webhookExecution.Response.Headers,
},
Result: &[]api.WebhookExecResult{api.WebhookExecResultSUCCESS}[0],
TriggerType: &[]api.Trigger{api.TriggerARTIFACTCREATION}[0],
}
)
func TestReTriggerWebhookExecution(t *testing.T) {
// Create mocks that will be used across all tests
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
mockWebhooksRepository := new(mocks.WebhooksRepository)
mockWebhooksExecutionRepository := new(mocks.WebhooksExecutionRepository)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockWebhookService := new(mocks.WebhookService)
tests := []struct {
name string
setupMocks func(*metadata.APIController)
request api.ReTriggerWebhookExecutionRequestObject
expectedResp api.ReTriggerWebhookExecutionResponseObject
expectedError error
}{
{
name: "success_case",
setupMocks: func(_ *metadata.APIController) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &coretypes.SpaceCore{ID: 2}
var permissionChecks []coretypes.PermissionCheck
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, regInfo.RegistryIdentifier, enum.PermissionRegistryEdit).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
latestExecutionResult := enum.WebhookExecutionResultSuccess
mockWebhookService.On("ReTriggerWebhookExecution", mock.Anything, int64(1)).Return(&gitnesswebhook.TriggerResult{
Execution: webhookExecution,
Webhook: &coretypes.WebhookCore{
Identifier: "webhook",
DisplayName: "webhook",
URL: "http://example.com",
Enabled: true,
Insecure: false,
Triggers: []enum.WebhookTrigger{enum.WebhookTriggerArtifactCreated},
Created: webhookExecution.Created,
Updated: webhookExecution.Created,
Description: "Test webhook",
SecretSpaceID: 1,
ExtraHeaders: []coretypes.ExtraHeader{{Key: "key", Value: "value"}},
LatestExecutionResult: &latestExecutionResult,
},
TriggerType: enum.WebhookTriggerArtifactCreated,
}, nil)
},
request: api.ReTriggerWebhookExecutionRequestObject{
WebhookIdentifier: "webhook",
RegistryRef: "reg",
WebhookExecutionId: "1",
},
expectedResp: api.ReTriggerWebhookExecution200JSONResponse{
WebhookExecutionResponseJSONResponse: api.WebhookExecutionResponseJSONResponse{
Data: *webhookExecutionEntity,
Status: api.StatusSUCCESS,
},
},
},
{
name: "permission_check_fails",
setupMocks: func(_ *metadata.APIController) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &coretypes.SpaceCore{ID: 2}
var permissionChecks []coretypes.PermissionCheck
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, regInfo.RegistryIdentifier, enum.PermissionRegistryEdit).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(false, nil)
},
request: api.ReTriggerWebhookExecutionRequestObject{
WebhookIdentifier: "webhook",
RegistryRef: "reg",
WebhookExecutionId: "1",
},
expectedResp: api.ReTriggerWebhookExecution403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse{
Code: "403",
Message: "not authorized",
},
},
},
{
name: "invalid_execution_identifier",
setupMocks: func(_ *metadata.APIController) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &coretypes.SpaceCore{ID: 2}
var permissionChecks []coretypes.PermissionCheck
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, regInfo.RegistryIdentifier, enum.PermissionRegistryEdit).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
},
request: api.ReTriggerWebhookExecutionRequestObject{
WebhookIdentifier: "webhook",
RegistryRef: "reg",
WebhookExecutionId: "invalid",
},
expectedResp: api.ReTriggerWebhookExecution400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse{
Code: "400",
Message: "invalid webhook execution identifier: invalid, err: strconv.ParseInt: parsing \"invalid\": invalid syntax",
},
},
},
{
name: "retrigger_execution_error",
setupMocks: func(_ *metadata.APIController) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &coretypes.SpaceCore{ID: 2}
var permissionChecks []coretypes.PermissionCheck
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, regInfo.RegistryIdentifier, enum.PermissionRegistryEdit).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
mockWebhookService.On("ReTriggerWebhookExecution", mock.Anything, int64(1)).Return(nil, fmt.Errorf("error"))
},
request: api.ReTriggerWebhookExecutionRequestObject{
WebhookIdentifier: "webhook",
RegistryRef: "reg",
WebhookExecutionId: "1",
},
expectedResp: api.ReTriggerWebhookExecution500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse{
Code: "500",
Message: "failed to re-trigger execution: error",
},
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Clear mock expectations
mockSpaceFinder.ExpectedCalls = nil
mockRegistryRepository.ExpectedCalls = nil
mockWebhooksRepository.ExpectedCalls = nil
mockWebhooksExecutionRepository.ExpectedCalls = nil
mockAuthorizer.ExpectedCalls = nil
mockRegistryMetadataHelper.ExpectedCalls = nil
mockWebhookService.ExpectedCalls = nil
controller := &metadata.APIController{
SpaceFinder: mockSpaceFinder,
RegistryRepository: mockRegistryRepository,
WebhooksRepository: mockWebhooksRepository,
WebhooksExecutionRepository: mockWebhooksExecutionRepository,
Authorizer: mockAuthorizer,
RegistryMetadataHelper: mockRegistryMetadataHelper,
WebhookService: mockWebhookService,
}
// Setup mocks
tt.setupMocks(controller)
resp, err := controller.ReTriggerWebhookExecution(context.Background(), tt.request)
assert.Equal(t, tt.expectedError, err)
assert.NotNil(t, resp, "response should not be nil")
switch tt.name {
case "success_case":
successResp, ok := resp.(api.ReTriggerWebhookExecution200JSONResponse)
assert.True(t, ok, "expected 200 response")
assert.Equal(t, api.StatusSUCCESS, successResp.Status)
assert.NotNil(t, successResp.Data, "Data should not be nil")
assert.NotNil(t, successResp.Data.Id, "Id should not be nil")
assert.NotNil(t, successResp.Data.Error, "Error should not be nil")
assert.NotNil(t, successResp.Data.Request, "Request should not be nil")
assert.NotNil(t, successResp.Data.Response, "Response should not be nil")
assert.NotNil(t, successResp.Data.Result, "Result should not be nil")
assert.NotNil(t, successResp.Data.TriggerType, "TriggerType should not be nil")
if assert.NotNil(t, successResp.Data.Request) {
assert.Equal(t, "{}", *successResp.Data.Request.Body)
assert.Equal(t, "{}", *successResp.Data.Request.Headers)
assert.Equal(t, "http://example.com", *successResp.Data.Request.Url)
}
if assert.NotNil(t, successResp.Data.Response) {
assert.Equal(t, "{}", *successResp.Data.Response.Body)
assert.Equal(t, "{}", *successResp.Data.Response.Headers)
assert.Equal(t, "OK", *successResp.Data.Response.Status)
assert.Equal(t, 200, *successResp.Data.Response.StatusCode)
}
assert.Equal(t, int64(1), *successResp.Data.Id)
assert.Equal(t, "", *successResp.Data.Error)
assert.Equal(t, api.WebhookExecResultSUCCESS, *successResp.Data.Result)
assert.Equal(t, api.TriggerARTIFACTCREATION, *successResp.Data.TriggerType)
case "permission_check_fails":
assert.IsType(t, api.ReTriggerWebhookExecution403JSONResponse{}, resp, "expected 403 response")
errorResp, _ := resp.(api.ReTriggerWebhookExecution403JSONResponse) //nolint:errcheck
assert.Equal(t, "403", errorResp.Code)
assert.Equal(t, "forbidden", errorResp.Message)
case "invalid_execution_identifier":
assert.IsType(t, api.ReTriggerWebhookExecution400JSONResponse{}, resp, "expected 400 response")
errorResp, _ := resp.(api.ReTriggerWebhookExecution400JSONResponse) //nolint:errcheck
assert.Equal(t, "400", errorResp.Code)
assert.Equal(t, "invalid webhook execution identifier: invalid, err: strconv.ParseInt: parsing \"invalid\": invalid syntax", errorResp.Message)
case "retrigger_execution_error":
assert.IsType(t, api.ReTriggerWebhookExecution500JSONResponse{}, resp, "expected 500 response")
errorResp, _ := resp.(api.ReTriggerWebhookExecution500JSONResponse) //nolint:errcheck
assert.Equal(t, "500", errorResp.Code)
assert.Equal(t, "failed to re-trigger execution: error", errorResp.Message)
}
// Verify all mock expectations
mockSpaceFinder.AssertExpectations(t)
mockRegistryRepository.AssertExpectations(t)
mockWebhooksRepository.AssertExpectations(t)
mockWebhooksExecutionRepository.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
mockRegistryMetadataHelper.AssertExpectations(t)
mockWebhookService.AssertExpectations(t)
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/artifact_mapper.go | registry/app/api/controller/metadata/artifact_mapper.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"encoding/json"
"errors"
"fmt"
"path/filepath"
"strconv"
"strings"
"time"
"github.com/harness/gitness/app/paths"
"github.com/harness/gitness/app/url"
"github.com/harness/gitness/registry/app/api/interfaces"
artifactapi "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/api/utils"
"github.com/harness/gitness/registry/app/metadata"
npm2 "github.com/harness/gitness/registry/app/metadata/npm"
"github.com/harness/gitness/registry/types"
"github.com/rs/zerolog/log"
)
func GetArtifactMetadata(
ctx context.Context,
artifacts []types.ArtifactMetadata,
rootIdentifier string,
urlProvider url.Provider,
setupDetailsAuthHeaderPrefix string,
untaggedImagesEnabled bool,
packageWrapper interfaces.PackageWrapper,
) []artifactapi.ArtifactMetadata {
artifactMetadataList := make([]artifactapi.ArtifactMetadata, 0, len(artifacts))
for _, artifact := range artifacts {
metadata := packageWrapper.GetArtifactMetadata(artifact)
if metadata != nil {
artifactMetadataList = append(artifactMetadataList, *metadata)
continue
}
registryURL := urlProvider.RegistryURL(ctx, rootIdentifier, artifact.RepoName)
if artifact.PackageType == artifactapi.PackageTypeGENERIC {
registryURL = urlProvider.RegistryURL(ctx, rootIdentifier, "generic", artifact.RepoName)
}
artifactMetadata := mapToArtifactMetadata(ctx, artifact, registryURL,
setupDetailsAuthHeaderPrefix, untaggedImagesEnabled)
if len(artifact.Tags) > 0 {
artifactMetadata.Metadata = &artifactapi.ArtifactEntityMetadata{
"tags": artifact.Tags,
}
}
artifactMetadataList = append(artifactMetadataList, *artifactMetadata)
}
return artifactMetadataList
}
func GetRegistryArtifactMetadata(artifacts []types.ArtifactMetadata) []artifactapi.RegistryArtifactMetadata {
artifactMetadataList := make([]artifactapi.RegistryArtifactMetadata, 0, len(artifacts))
for _, artifact := range artifacts {
artifactMetadata := mapToRegistryArtifactMetadata(artifact)
artifactMetadataList = append(artifactMetadataList, *artifactMetadata)
}
return artifactMetadataList
}
func GetMavenArtifactDetail(
image *types.Image, artifact *types.Artifact,
mavenMetadata metadata.MavenMetadata,
) artifactapi.ArtifactDetail {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.UpdatedAt)
size := mavenMetadata.Size
if size == 0 && len(mavenMetadata.Files) > 0 {
for _, file := range mavenMetadata.Files {
size += file.Size
}
}
sizeVal := GetSize(size)
artifactDetail := &artifactapi.ArtifactDetail{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Name: &image.Name,
Version: artifact.Version,
Size: &sizeVal,
}
return *artifactDetail
}
func mapToArtifactMetadata(
ctx context.Context,
artifact types.ArtifactMetadata,
registryURL string,
setupDetailsAuthHeaderPrefix string,
untaggedImagesEnabled bool,
) *artifactapi.ArtifactMetadata {
lastModified := GetTimeInMs(artifact.ModifiedAt)
packageType := artifact.PackageType
pullCommand := GetPullCommand(ctx, artifact.Name, artifact.Version,
string(packageType), registryURL, setupDetailsAuthHeaderPrefix, artifact.ArtifactType, !untaggedImagesEnabled)
return &artifactapi.ArtifactMetadata{
RegistryUUID: artifact.RegistryUUID,
Uuid: artifact.UUID,
RegistryIdentifier: artifact.RepoName,
Name: artifact.Name,
Version: &artifact.Version,
Labels: &artifact.Labels,
LastModified: &lastModified,
PackageType: packageType,
DownloadsCount: &artifact.DownloadCount,
PullCommand: &pullCommand,
IsQuarantined: &artifact.IsQuarantined,
QuarantineReason: artifact.QuarantineReason,
ArtifactType: artifact.ArtifactType,
}
}
func mapToRegistryArtifactMetadata(artifact types.ArtifactMetadata) *artifactapi.RegistryArtifactMetadata {
lastModified := GetTimeInMs(artifact.ModifiedAt)
packageType := artifact.PackageType
return &artifactapi.RegistryArtifactMetadata{
RegistryIdentifier: artifact.RepoName,
RegistryUUID: artifact.RegistryUUID,
Uuid: artifact.UUID,
Name: artifact.Name,
LatestVersion: artifact.LatestVersion,
Labels: &artifact.Labels,
LastModified: &lastModified,
PackageType: packageType,
DownloadsCount: &artifact.DownloadCount,
IsQuarantined: &artifact.IsQuarantined,
ArtifactType: artifact.ArtifactType,
}
}
func toPackageType(packageTypeStr string) (artifactapi.PackageType, error) {
switch packageTypeStr {
case string(artifactapi.PackageTypeDOCKER):
return artifactapi.PackageTypeDOCKER, nil
case string(artifactapi.PackageTypeGENERIC):
return artifactapi.PackageTypeGENERIC, nil
case string(artifactapi.PackageTypeHELM):
return artifactapi.PackageTypeHELM, nil
case string(artifactapi.PackageTypeMAVEN):
return artifactapi.PackageTypeMAVEN, nil
case string(artifactapi.PackageTypePYTHON):
return artifactapi.PackageTypePYTHON, nil
case string(artifactapi.PackageTypeNPM):
return artifactapi.PackageTypeNPM, nil
case string(artifactapi.PackageTypeRPM):
return artifactapi.PackageTypeRPM, nil
case string(artifactapi.PackageTypeNUGET):
return artifactapi.PackageTypeNUGET, nil
case string(artifactapi.PackageTypeGO):
return artifactapi.PackageTypeGO, nil
case string(artifactapi.PackageTypeHUGGINGFACE):
return artifactapi.PackageTypeHUGGINGFACE, nil
default:
return "", errors.New("invalid package type")
}
}
func GetTagMetadata(
ctx context.Context,
ociVersions *[]types.OciVersionMetadata,
image string,
registryURL string,
setupDetailsAuthHeaderPrefix string,
untaggedImagesEnabled bool,
) []artifactapi.ArtifactVersionMetadata {
artifactVersionMetadataList := []artifactapi.ArtifactVersionMetadata{}
for _, tag := range *ociVersions {
modifiedAt := GetTimeInMs(tag.ModifiedAt)
size := GetImageSize(tag.Size)
digestCount := tag.DigestCount
command := GetPullCommand(ctx, image, tag.Name, string(tag.PackageType), registryURL,
setupDetailsAuthHeaderPrefix, nil, !untaggedImagesEnabled)
packageType, err := toPackageType(string(tag.PackageType))
downloadCount := tag.DownloadCount
if err != nil {
log.Ctx(ctx).Error().Err(err).Msgf("Error converting package type %s", tag.PackageType)
continue
}
artifactVersionMetadata := &artifactapi.ArtifactVersionMetadata{
PackageType: packageType,
Name: tag.Name,
Size: &size,
LastModified: &modifiedAt,
DigestCount: &digestCount,
PullCommand: &command,
DownloadsCount: &downloadCount,
Metadata: &artifactapi.ArtifactEntityMetadata{
"tags": tag.Tags,
},
IsQuarantined: &tag.IsQuarantined,
QuarantineReason: &tag.QuarantineReason,
}
artifactVersionMetadataList = append(artifactVersionMetadataList, *artifactVersionMetadata)
}
return artifactVersionMetadataList
}
func GetAllArtifactResponse(
ctx context.Context,
artifacts *[]types.ArtifactMetadata,
count int64,
pageNumber int64,
pageSize int,
rootIdentifier string,
urlProvider url.Provider,
setupDetailsAuthHeaderPrefix string,
untaggedImagesEnabled bool,
packageWrapper interfaces.PackageWrapper,
) *artifactapi.ListArtifactResponseJSONResponse {
var artifactMetadataList []artifactapi.ArtifactMetadata
if artifacts == nil {
artifactMetadataList = make([]artifactapi.ArtifactMetadata, 0)
} else {
artifactMetadataList = GetArtifactMetadata(ctx, *artifacts, rootIdentifier, urlProvider,
setupDetailsAuthHeaderPrefix, untaggedImagesEnabled, packageWrapper)
}
pageCount := GetPageCount(count, pageSize)
listArtifact := &artifactapi.ListArtifact{
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &pageNumber,
PageSize: &pageSize,
Artifacts: artifactMetadataList,
}
response := &artifactapi.ListArtifactResponseJSONResponse{
Data: *listArtifact,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetAllArtifactFilesResponse(
ctx context.Context,
files *[]types.FileNodeMetadata, count int64, pageNumber int64, pageSize int,
registryURL string, artifactName string, version string,
packageType artifactapi.PackageType, setupDetailsAuthHeaderPrefix string,
artifactType *artifactapi.ArtifactType, isAnonymous bool, rootIdentifier string,
registryIdentifier string, packageWrapper interfaces.PackageWrapper,
) *artifactapi.FileDetailResponseJSONResponse {
var fileMetadataList []artifactapi.FileDetail
if files == nil || len(*files) == 0 {
fileMetadataList = make([]artifactapi.FileDetail, 0)
} else {
fileMetadataList = GetArtifactFilesMetadata(ctx, files, registryURL, artifactName, version, packageType,
setupDetailsAuthHeaderPrefix, artifactType, isAnonymous, rootIdentifier, registryIdentifier, packageWrapper)
}
pageCount := GetPageCount(count, pageSize)
listFileDetail := &artifactapi.ListFileDetail{
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &pageNumber,
PageSize: &pageSize,
Files: fileMetadataList,
}
response := &artifactapi.FileDetailResponseJSONResponse{
Data: *listFileDetail,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetArtifactFileResponseJSONResponse(
registryURL string,
packageType artifactapi.PackageType,
artifactName string,
version string,
fileName string,
) *artifactapi.ArtifactFileResponseJSONResponse {
return &artifactapi.ArtifactFileResponseJSONResponse{
Status: artifactapi.StatusSUCCESS,
DownloadUrl: getDownloadURL(registryURL, packageType, artifactName, version, fileName),
}
}
func GetArtifactFilesMetadata(
ctx context.Context,
metadata *[]types.FileNodeMetadata, registryURL string, artifactName string,
version string, packageType artifactapi.PackageType, setupDetailsAuthHeaderPrefix string,
artifactType *artifactapi.ArtifactType, isAnonymous bool, rootIdentifier string,
registryIdentifier string, packageWrapper interfaces.PackageWrapper,
) []artifactapi.FileDetail {
var files []artifactapi.FileDetail
for _, file := range *metadata {
filePathPrefix := "/" + artifactName + "/" + version + "/"
filename := strings.Replace(file.Path, filePathPrefix, "", 1)
var downloadCommand string
//nolint:exhaustive
switch packageType {
case artifactapi.PackageTypeGENERIC:
downloadCommand = GetGenericArtifactFileDownloadCommand(registryURL, artifactName,
version, filename, setupDetailsAuthHeaderPrefix, isAnonymous)
case artifactapi.PackageTypePYTHON:
downloadCommand = GetGenericFileDownloadCommand(registryURL, artifactName,
version, filename, setupDetailsAuthHeaderPrefix, isAnonymous)
case artifactapi.PackageTypeNPM:
downloadCommand = GetNPMArtifactFileDownloadCommand(registryURL, artifactName,
version, filename, isAnonymous)
case artifactapi.PackageTypeMAVEN:
artifactName = strings.ReplaceAll(artifactName, ".", "/")
artifactName = strings.ReplaceAll(artifactName, ":", "/")
filePathPrefix = "/" + artifactName + "/" + version + "/"
filename = strings.Replace(file.Path, filePathPrefix, "", 1)
downloadCommand = GetMavenArtifactFileDownloadCommand(registryURL, artifactName,
version, filename, setupDetailsAuthHeaderPrefix, isAnonymous)
case artifactapi.PackageTypeRPM:
downloadCommand = GetRPMArtifactFileDownloadCommand(registryURL, artifactName, version, filename,
setupDetailsAuthHeaderPrefix, isAnonymous)
_, filename, _ = paths.DisectLeaf(filename)
case artifactapi.PackageTypeNUGET:
downloadCommand = GetNugetArtifactFileDownloadCommand(registryURL, artifactName,
version, filename, setupDetailsAuthHeaderPrefix, isAnonymous)
case artifactapi.PackageTypeGO:
goFilePath := utils.GetGoFilePath(artifactName, version)
filename = strings.Replace(file.Path, goFilePath+"/", "", 1)
downloadCommand = GetGoArtifactFileDownloadCommand(registryURL, artifactName,
filename, setupDetailsAuthHeaderPrefix, isAnonymous)
case artifactapi.PackageTypeHUGGINGFACE:
filename = strings.Replace(filename, "/"+string(*artifactType), "", 1)
downloadCommand = GetHuggingFaceArtifactFileDownloadCommand(registryURL, artifactName,
version, filename, setupDetailsAuthHeaderPrefix, artifactType, isAnonymous)
default:
metadata := packageWrapper.GetFileMetadata(
ctx, rootIdentifier, registryIdentifier, string(packageType), artifactName, version, file)
if metadata != nil {
files = append(files, *metadata)
continue
}
}
files = append(files, artifactapi.FileDetail{
Checksums: getCheckSums(file),
Size: GetSize(file.Size),
CreatedAt: fmt.Sprint(file.CreatedAt),
Name: filename,
DownloadCommand: downloadCommand,
Path: file.Path,
})
}
return files
}
func GetQuarantinePathJSONResponse(
id string,
registryID int64,
artifactID int64,
versionID int64,
reason string,
filePath string,
) *artifactapi.QuarantinePathResponseJSONResponse {
return &artifactapi.QuarantinePathResponseJSONResponse{
Status: artifactapi.StatusSUCCESS,
Data: artifactapi.QuarantinePath{
Id: id,
RegistryId: registryID,
ArtifactId: artifactID,
VersionId: &versionID,
FilePath: &filePath,
Reason: reason,
},
}
}
func getCheckSums(file types.FileNodeMetadata) []string {
return []string{
fmt.Sprintf("SHA-512: %s", file.Sha512),
fmt.Sprintf("SHA-256: %s", file.Sha256),
fmt.Sprintf("SHA-1: %s", file.Sha1),
fmt.Sprintf("MD5: %s", file.MD5),
}
}
func GetAllArtifactByRegistryResponse(
artifacts *[]types.ArtifactMetadata,
count int64,
pageNumber int64,
pageSize int,
) *artifactapi.ListRegistryArtifactResponseJSONResponse {
var artifactMetadataList []artifactapi.RegistryArtifactMetadata
if artifacts == nil {
artifactMetadataList = make([]artifactapi.RegistryArtifactMetadata, 0)
} else {
artifactMetadataList = GetRegistryArtifactMetadata(*artifacts)
}
pageCount := GetPageCount(count, pageSize)
listArtifact := &artifactapi.ListRegistryArtifact{
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &pageNumber,
PageSize: &pageSize,
Artifacts: artifactMetadataList,
}
response := &artifactapi.ListRegistryArtifactResponseJSONResponse{
Data: *listArtifact,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetAllArtifactLabelsResponse(
artifactLabels *[]string,
count int64,
pageNumber int64,
pageSize int,
) *artifactapi.ListArtifactLabelResponseJSONResponse {
pageCount := GetPageCount(count, pageSize)
listArtifactLabels := &artifactapi.ListArtifactLabel{
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &pageNumber,
PageSize: &pageSize,
Labels: *artifactLabels,
}
response := &artifactapi.ListArtifactLabelResponseJSONResponse{
Data: *listArtifactLabels,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetAllArtifactVersionResponse(
ctx context.Context,
ociVersions *[]types.OciVersionMetadata,
image string,
count int64,
pageNumber int64,
pageSize int,
registryURL string,
setupDetailsAuthHeaderPrefix string,
untaggedImagesEnabled bool,
) *artifactapi.ListArtifactVersionResponseJSONResponse {
artifactVersionMetadataList := GetTagMetadata(
ctx, ociVersions, image, registryURL, setupDetailsAuthHeaderPrefix, untaggedImagesEnabled,
)
pageCount := GetPageCount(count, pageSize)
listArtifactVersions := &artifactapi.ListArtifactVersion{
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &pageNumber,
PageSize: &pageSize,
ArtifactVersions: &artifactVersionMetadataList,
}
response := &artifactapi.ListArtifactVersionResponseJSONResponse{
Data: *listArtifactVersions,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetNonOCIAllArtifactVersionResponse(
ctx context.Context,
artifacts *[]types.NonOCIArtifactMetadata,
image string,
count int64,
pageNumber int64,
pageSize int,
registryURL string,
setupDetailsAuthHeaderPrefix string,
pkgType string,
packageWrapper interfaces.PackageWrapper,
registryUUID string,
) *artifactapi.ListArtifactVersionResponseJSONResponse {
artifactVersionMetadataList := GetNonOCIArtifactMetadata(
ctx, artifacts, image, registryURL, setupDetailsAuthHeaderPrefix, pkgType, packageWrapper, registryUUID)
pageCount := GetPageCount(count, pageSize)
listArtifactVersions := &artifactapi.ListArtifactVersion{
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &pageNumber,
PageSize: &pageSize,
ArtifactVersions: &artifactVersionMetadataList,
}
response := &artifactapi.ListArtifactVersionResponseJSONResponse{
Data: *listArtifactVersions,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetNonOCIArtifactMetadata(
ctx context.Context,
tags *[]types.NonOCIArtifactMetadata,
image string,
registryURL string,
setupDetailsAuthHeaderPrefix string,
pkgType string,
packageWrapper interfaces.PackageWrapper,
registryUUID string,
) []artifactapi.ArtifactVersionMetadata {
artifactVersionMetadataList := []artifactapi.ArtifactVersionMetadata{}
for _, tag := range *tags {
metadata := packageWrapper.GetArtifactVersionMetadata(pkgType, image, tag)
if metadata != nil {
metadata.RegistryUUID = registryUUID
artifactVersionMetadataList = append(artifactVersionMetadataList, *metadata)
continue
}
modifiedAt := GetTimeInMs(tag.ModifiedAt)
size := GetImageSize(tag.Size)
command := GetPullCommand(ctx, image, tag.Name, pkgType, registryURL, setupDetailsAuthHeaderPrefix,
tag.ArtifactType, true)
packageType, err := toPackageType(pkgType)
downloadCount := tag.DownloadCount
if err != nil {
log.Ctx(ctx).Error().Err(err).Msgf("Error converting package type %s", tag.PackageType)
continue
}
fileCount := tag.FileCount
artifactVersionMetadata := &artifactapi.ArtifactVersionMetadata{
PackageType: packageType,
FileCount: &fileCount,
Name: tag.Name,
RegistryUUID: registryUUID,
Uuid: tag.UUID,
Size: &size,
LastModified: &modifiedAt,
PullCommand: &command,
DownloadsCount: &downloadCount,
IsQuarantined: &tag.IsQuarantined,
QuarantineReason: tag.QuarantineReason,
ArtifactType: tag.ArtifactType,
}
artifactVersionMetadataList = append(artifactVersionMetadataList, *artifactVersionMetadata)
}
return artifactVersionMetadataList
}
func GetDockerArtifactDetails(
registry *types.Registry,
imageName string,
version string,
created time.Time,
modified time.Time,
digest string,
size int64,
registryURL string,
downloadCount int64,
isQuarantined bool,
quarantineReason *string,
) *artifactapi.DockerArtifactDetailResponseJSONResponse {
repoPath := getRepoPath(registry.Name, imageName, digest)
createdAt := GetTimeInMs(created)
modifiedAt := GetTimeInMs(modified)
s := GetSize(size)
artifactDetail := &artifactapi.DockerArtifactDetail{
ImageName: imageName,
Version: version,
PackageType: registry.PackageType,
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
RegistryPath: repoPath,
Url: GetTagURL(imageName, version, registryURL),
Size: &s,
DownloadsCount: &downloadCount,
IsQuarantined: &isQuarantined,
QuarantineReason: quarantineReason,
}
response := &artifactapi.DockerArtifactDetailResponseJSONResponse{
Data: *artifactDetail,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetHelmArtifactDetails(
registry *types.Registry,
imageName string,
version string,
created time.Time,
updated time.Time,
manifest *types.Manifest,
registryURL string,
) *artifactapi.HelmArtifactDetailResponseJSONResponse {
repoPath := getRepoPath(registry.Name, imageName, manifest.Digest.String())
createdAt := GetTimeInMs(created)
modifiedAt := GetTimeInMs(updated)
size := GetSize(manifest.TotalSize)
artifactDetail := &artifactapi.HelmArtifactDetail{
Artifact: &imageName,
Version: version,
PackageType: registry.PackageType,
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
RegistryPath: repoPath,
Url: GetTagURL(imageName, version, registryURL),
Size: &size,
}
response := &artifactapi.HelmArtifactDetailResponseJSONResponse{
Data: *artifactDetail,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetGenericArtifactDetail(
image *types.Image, artifact *types.Artifact,
metadata metadata.GenericMetadata,
) artifactapi.ArtifactDetail {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.UpdatedAt)
artifactDetail := &artifactapi.ArtifactDetail{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Name: &image.Name,
Version: artifact.Version,
}
err := artifactDetail.FromGenericArtifactDetailConfig(artifactapi.GenericArtifactDetailConfig{
Description: &metadata.Description,
})
if err != nil {
return artifactapi.ArtifactDetail{}
}
return *artifactDetail
}
func GetPythonArtifactDetail(
image *types.Image, artifact *types.Artifact,
metadata map[string]any,
) artifactapi.ArtifactDetail {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.UpdatedAt)
artifactDetail := &artifactapi.ArtifactDetail{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Name: &image.Name,
Version: artifact.Version,
}
err := artifactDetail.FromPythonArtifactDetailConfig(artifactapi.PythonArtifactDetailConfig{
Metadata: &metadata,
})
if err != nil {
return artifactapi.ArtifactDetail{}
}
return *artifactDetail
}
func GetNugetArtifactDetail(
image *types.Image, artifact *types.Artifact,
metadata map[string]any,
downloadCount int64,
) artifactapi.ArtifactDetail {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.UpdatedAt)
size, ok := metadata["size"].(float64)
if !ok {
log.Error().Msg("failed to get size from Nuget metadata")
}
totalSize := GetSize(int64(size))
artifactDetail := &artifactapi.ArtifactDetail{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Name: &image.Name,
Version: artifact.Version,
DownloadCount: &downloadCount,
Size: &totalSize,
}
err := artifactDetail.FromNugetArtifactDetailConfig(artifactapi.NugetArtifactDetailConfig{
Metadata: &metadata,
})
if err != nil {
log.Error().Err(err).Msgf("Error setting the artifact details for nuget package: [%s]", image.Name)
return artifactapi.ArtifactDetail{}
}
return *artifactDetail
}
func GetHFArtifactDetail(
image *types.Image, artifact *types.Artifact,
metadata map[string]any,
downloadCount int64,
) artifactapi.ArtifactDetail {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.UpdatedAt)
size, ok := metadata["size"].(float64)
if !ok {
log.Error().Msg("failed to get size from Hugging face metadata")
}
totalSize := GetSize(int64(size))
artifactDetail := &artifactapi.ArtifactDetail{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Name: &image.Name,
Version: artifact.Version,
DownloadCount: &downloadCount,
Size: &totalSize,
ArtifactType: image.ArtifactType,
}
err := artifactDetail.FromHuggingFaceArtifactDetailConfig(artifactapi.HuggingFaceArtifactDetailConfig{
Metadata: &metadata,
})
if err != nil {
log.Error().Err(err).Msgf("Error setting the artifact details for hugging face package: [%s]", image.Name)
return artifactapi.ArtifactDetail{}
}
return *artifactDetail
}
func GetGoArtifactDetail(
image *types.Image, artifact *types.Artifact,
metadata map[string]any,
downloadCount int64,
) artifactapi.ArtifactDetail {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.UpdatedAt)
size, ok := metadata["size"].(float64)
if !ok {
log.Error().Msg("failed to get size from Go metadata")
}
totalSize := GetSize(int64(size))
artifactDetail := &artifactapi.ArtifactDetail{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Name: &image.Name,
Version: artifact.Version,
DownloadCount: &downloadCount,
Size: &totalSize,
}
err := artifactDetail.FromGoArtifactDetailConfig(artifactapi.GoArtifactDetailConfig{
Metadata: &metadata,
})
if err != nil {
log.Error().Err(err).Msgf("Error setting the artifact details for go package: [%s]", image.Name)
return artifactapi.ArtifactDetail{}
}
return *artifactDetail
}
func GetNPMArtifactDetail(
image *types.Image, artifact *types.Artifact,
metadata map[string]any,
downloadCount int64,
) artifactapi.ArtifactDetail {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.UpdatedAt)
var npmMetadata npm2.NpmMetadata
err := json.Unmarshal(artifact.Metadata, &npmMetadata)
if err != nil {
log.Error().Err(err).Msgf("Error unmarshalling the artifact metadata "+
"for image: [%s], version: [%s]", image.Name, artifact.Version)
return artifactapi.ArtifactDetail{}
}
totalSize := strconv.FormatInt(npmMetadata.Size, 10)
artifactDetail := &artifactapi.ArtifactDetail{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Name: &image.Name,
Version: artifact.Version,
DownloadCount: &downloadCount,
Size: &totalSize,
}
err = artifactDetail.FromNpmArtifactDetailConfig(artifactapi.NpmArtifactDetailConfig{
Metadata: &metadata,
})
if err != nil {
log.Error().Err(err).Msgf("Error setting the artifact details for image: [%s]", image.Name)
return artifactapi.ArtifactDetail{}
}
return *artifactDetail
}
func GetRPMArtifactDetail(
image *types.Image, artifact *types.Artifact,
metadata map[string]any,
downloadCount int64,
) artifactapi.ArtifactDetail {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.UpdatedAt)
size, ok := metadata["size"].(float64)
if !ok {
log.Error().Msg("failed to get size from RPM metadata")
}
fileMetadata, ok := metadata["file_metadata"].(map[string]any)
if ok {
delete(fileMetadata, "files")
delete(fileMetadata, "changelogs")
}
totalSize := strconv.FormatInt(int64(size), 10)
artifactDetail := &artifactapi.ArtifactDetail{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Name: &image.Name,
Version: artifact.Version,
DownloadCount: &downloadCount,
Size: &totalSize,
}
err := artifactDetail.FromRpmArtifactDetailConfig(artifactapi.RpmArtifactDetailConfig{
Metadata: &metadata,
})
if err != nil {
log.Error().Err(err).Msgf("Error setting the artifact details for artifact: [%s/%s].", image.Name,
artifact.Version)
return artifactapi.ArtifactDetail{}
}
return *artifactDetail
}
func GetArtifactSummary(artifact types.ImageMetadata) *artifactapi.ArtifactSummaryResponseJSONResponse {
createdAt := GetTimeInMs(artifact.CreatedAt)
modifiedAt := GetTimeInMs(artifact.ModifiedAt)
artifactVersionSummary := &artifactapi.ArtifactSummary{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
DownloadsCount: &artifact.DownloadCount,
ImageName: artifact.Name,
PackageType: artifact.PackageType,
ArtifactType: artifact.ArtifactType,
RegistryUUID: artifact.RegistryUUID,
Uuid: artifact.UUID,
}
response := &artifactapi.ArtifactSummaryResponseJSONResponse{
Data: *artifactVersionSummary,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func GetArtifactVersionSummary(
artifactName string,
packageType artifactapi.PackageType,
version string,
isQuarantined bool,
quarantineReason string,
artifactType *artifactapi.ArtifactType,
artifactUUID string,
registryUUID string,
) *artifactapi.ArtifactVersionSummaryResponseJSONResponse {
artifactVersionSummary := &artifactapi.ArtifactVersionSummary{
ImageName: artifactName,
PackageType: packageType,
Version: version,
IsQuarantined: &isQuarantined,
QuarantineReason: &quarantineReason,
ArtifactType: artifactType,
Uuid: artifactUUID,
RegistryUUID: registryUUID,
}
response := &artifactapi.ArtifactVersionSummaryResponseJSONResponse{
Data: *artifactVersionSummary,
Status: artifactapi.StatusSUCCESS,
}
return response
}
func getRepoPath(registry string, image string, tag string) string {
return filepath.Join(registry, image, tag)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/delete_quarantine_file_path.go | registry/app/api/controller/metadata/delete_quarantine_file_path.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"net/http"
"path"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/api/utils"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
func (c *APIController) DeleteQuarantineFilePath(
ctx context.Context,
r artifact.DeleteQuarantineFilePathRequestObject,
) (artifact.DeleteQuarantineFilePathResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.DeleteQuarantineFilePath400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.DeleteQuarantineFilePath400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryEdit)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return artifact.DeleteQuarantineFilePath401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return artifact.DeleteQuarantineFilePath403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
artifactName := r.Params.Artifact
version := r.Params.Version
filePath := r.Params.FilePath
var artifactType *artifact.ArtifactType
if r.Params.ArtifactType != nil {
at := artifact.ArtifactType(*r.Params.ArtifactType)
artifactType = &at
}
img, err := c.ImageStore.GetByNameAndType(ctx, regInfo.RegistryID, string(*artifactName), artifactType)
if err != nil {
return artifact.DeleteQuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var versionID *int64
var rootPath string
var art *types.Artifact
if version != nil { //nolint:nestif
var parsedVersion = string(*version)
if regInfo.PackageType == artifact.PackageTypeDOCKER || regInfo.PackageType == artifact.PackageTypeHELM {
parsedDigest, err := digest.Parse(parsedVersion)
if err != nil {
log.Ctx(ctx).Err(err).Msg("failed to parse digest for create quarantine file path")
return artifact.DeleteQuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
typesDigest, err := types.NewDigest(parsedDigest)
if err != nil {
log.Ctx(ctx).Err(err).Msg("failed to create types digest for create quarantine file path")
return artifact.DeleteQuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
digestVal := typesDigest.String()
parsedVersion = digestVal
}
art, err = c.ArtifactStore.GetByName(ctx, img.ID, parsedVersion)
if err != nil {
return artifact.DeleteQuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
versionID = &art.ID
}
var nodeID *string
if filePath != nil {
rootPath, err = utils.GetFilePath(regInfo.PackageType, string(*artifactName), string(*version))
if err != nil {
return artifact.DeleteQuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
completePath := path.Join(rootPath, string(*filePath))
node, err := c.fileManager.GetNode(ctx, regInfo.RegistryID, completePath)
if err != nil {
return artifact.DeleteQuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
nodeID = &node.ID
}
err = c.QuarantineArtifactRepository.DeleteByRegistryIDArtifactAndFilePath(ctx,
regInfo.RegistryID, versionID, img.ID, nodeID)
if err != nil {
return artifact.DeleteQuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
// Evict cache after deleting quarantine entry
if version != nil {
c.QuarantineFinder.EvictCache(ctx, regInfo.RegistryID, string(*artifactName), art.Version, artifactType)
}
return artifact.DeleteQuarantineFilePath200JSONResponse{
SuccessJSONResponse: artifact.SuccessJSONResponse(*GetSuccessResponse()),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/list_webhook_execution.go | registry/app/api/controller/metadata/list_webhook_execution.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/store"
gitnesstypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
const listWebhooksErrMsg = "failed to list webhooks executions for registry: %s, webhook: %s with error: %v"
func (c *APIController) ListWebhookExecutions(
ctx context.Context,
r api.ListWebhookExecutionsRequestObject,
) (api.ListWebhookExecutionsResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return listWebhooksExecutionsInternalErrorResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return listWebhooksExecutionsInternalErrorResponse(err)
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
log.Ctx(ctx).Error().Msgf("permission check failed while listing webhooks for registry: %s, error: %v",
regInfo.RegistryIdentifier, err)
return api.ListWebhookExecutions403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
size := GetOffset(r.Params.Size, r.Params.Page)
limit := GetPageLimit(r.Params.Size)
pageNumber := GetPageNumber(r.Params.Page)
reg, err := c.RegistryRepository.GetByParentIDAndName(ctx, space.ID, regInfo.RegistryIdentifier)
if err != nil {
log.Ctx(ctx).Error().Msgf(listWebhooksErrMsg, regInfo.RegistryRef, r.WebhookIdentifier, err)
return listWebhooksExecutionsInternalErrorResponse(fmt.Errorf("failed to find registry: %w", err))
}
webhook, err := c.WebhooksRepository.GetByRegistryAndIdentifier(ctx, reg.ID, string(r.WebhookIdentifier))
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return api.ListWebhookExecutions404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, fmt.Sprintf("webhook '%s' not found", r.WebhookIdentifier)),
),
}, nil
}
log.Ctx(ctx).Error().Msgf(listWebhooksErrMsg, regInfo.RegistryRef, r.WebhookIdentifier, err)
return listWebhooksExecutionsInternalErrorResponse(
fmt.Errorf("failed to find webhook [%s] : %w", r.WebhookIdentifier, err),
)
}
we, err := c.WebhooksExecutionRepository.ListForWebhook(ctx, webhook.ID, limit, int(pageNumber), size)
if err != nil {
log.Ctx(ctx).Error().Msgf(listWebhooksErrMsg, regInfo.RegistryRef, r.WebhookIdentifier, err)
return listWebhooksExecutionsInternalErrorResponse(fmt.Errorf("failed to list webhook executions: %w", err))
}
webhookExecutions, err := mapToAPIListWebhooksExecutions(we)
if err != nil {
log.Ctx(ctx).Error().Msgf(listWebhooksErrMsg, regInfo.RegistryRef, r.WebhookIdentifier, err)
return listWebhooksExecutionsInternalErrorResponse(err)
}
count, err := c.WebhooksExecutionRepository.CountForWebhook(ctx, webhook.ID)
if err != nil {
log.Ctx(ctx).Error().Msgf(listWebhooksErrMsg, regInfo.RegistryRef, r.WebhookIdentifier, err)
return listWebhooksExecutionsInternalErrorResponse(fmt.Errorf("failed to get webhook executions count: %w", err))
}
pageCount := GetPageCount(count, limit)
currentPageSize := len(webhookExecutions)
return api.ListWebhookExecutions200JSONResponse{
ListWebhooksExecutionResponseJSONResponse: api.ListWebhooksExecutionResponseJSONResponse{
Data: api.ListWebhooksExecutions{
Executions: webhookExecutions,
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &pageNumber,
PageSize: ¤tPageSize,
},
Status: api.StatusSUCCESS,
},
}, nil
}
func listWebhooksExecutionsInternalErrorResponse(err error) (api.ListWebhookExecutionsResponseObject, error) {
return api.ListWebhookExecutions500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
func mapToAPIListWebhooksExecutions(executions []*gitnesstypes.WebhookExecutionCore) ([]api.WebhookExecution, error) {
webhooksExecutionEntities := make([]api.WebhookExecution, 0, len(executions))
for _, e := range executions {
webhookExecution, err := MapToWebhookExecutionResponseEntity(*e)
if err != nil {
return nil, err
}
webhooksExecutionEntities = append(webhooksExecutionEntities, *webhookExecution)
}
return webhooksExecutionEntities, nil
}
func MapToWebhookExecutionResponseEntity(
execution gitnesstypes.WebhookExecutionCore,
) (*api.WebhookExecution, error) {
webhookResponseEntity := api.WebhookExecution{
Created: &execution.Created,
Duration: &execution.Duration,
Id: &execution.ID,
Error: &execution.Error,
Request: &api.WebhookExecRequest{
Body: &execution.Request.Body,
Headers: &execution.Request.Headers,
Url: &execution.Request.URL,
},
Response: &api.WebhookExecResponse{
Body: &execution.Response.Body,
Headers: &execution.Response.Headers,
Status: &execution.Response.Status,
StatusCode: &execution.Response.StatusCode,
},
RetriggerOf: execution.RetriggerOf,
Retriggerable: &execution.Retriggerable,
WebhookId: &execution.WebhookID,
}
webhookExecResult := mapTpAPIExecutionResult(execution.Result)
if webhookExecResult != "" {
webhookResponseEntity.Result = &webhookExecResult
}
triggerType := mapTpAPITriggerType(execution.TriggerType)
if triggerType != "" {
webhookResponseEntity.TriggerType = &triggerType
}
return &webhookResponseEntity, nil
}
func mapTpAPIExecutionResult(result enum.WebhookExecutionResult) api.WebhookExecResult {
switch result {
case enum.WebhookExecutionResultSuccess:
return api.WebhookExecResultSUCCESS
case enum.WebhookExecutionResultFatalError:
return api.WebhookExecResultFATALERROR
case enum.WebhookExecutionResultRetriableError:
return api.WebhookExecResultRETRIABLEERROR
}
return ""
}
//nolint:exhaustive
func mapTpAPITriggerType(trigger enum.WebhookTrigger) api.Trigger {
//nolint:exhaustive
switch trigger {
case enum.WebhookTriggerArtifactCreated:
return api.TriggerARTIFACTCREATION
case enum.WebhookTriggerArtifactDeleted:
return api.TriggerARTIFACTDELETION
}
return ""
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/base.go | registry/app/api/controller/metadata/base.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"encoding/json"
"fmt"
"math"
"strconv"
"strings"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
storagedriver "github.com/harness/gitness/registry/app/driver"
"github.com/harness/gitness/registry/app/pkg/commons"
"github.com/harness/gitness/registry/app/storage"
"github.com/harness/gitness/registry/types"
gitnessenum "github.com/harness/gitness/types/enum"
digest "github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
var _ api.StrictServerInterface = (*APIController)(nil)
type RegistryRequestInfo struct {
*types.RegistryRequestBaseInfo
packageTypes []string
sortByField string
sortByOrder string
offset int
limit int
pageNumber int64
searchTerm string
labels []string
registryIDs []string
recursive bool
scope string
}
type RegistryRequestParams struct {
packageTypesParam *api.PackageTypeParam
page *api.PageNumber
size *api.PageSize
search *api.SearchTerm
Resource string
ParentRef string
RegRef string
labelsParam *api.LabelsParam
sortOrder *api.SortOrder
sortField *api.SortField
registryIDsParam *api.RegistryIdentifierParam
recursive *api.RecursiveParam
scope *api.GetAllRegistriesParamsScope
}
type ArtifactFilesRequestInfo struct {
*types.RegistryRequestBaseInfo
sortByField string
sortByOrder string
offset int
limit int
pageNumber int64
searchTerm string
}
func (c *APIController) GetRegistryRequestInfo(
ctx context.Context,
registryRequestParams RegistryRequestParams,
) (*RegistryRequestInfo, error) {
packageTypes := []string{}
if registryRequestParams.packageTypesParam != nil {
packageTypes = *registryRequestParams.packageTypesParam
}
registryIDs := []string{}
if registryRequestParams.registryIDsParam != nil {
registryIDs = *registryRequestParams.registryIDsParam
}
sortByField := ""
sortByOrder := ""
if registryRequestParams.sortOrder != nil {
sortByOrder = string(*registryRequestParams.sortOrder)
}
if registryRequestParams.sortField != nil {
sortByField = string(*registryRequestParams.sortField)
}
labels := []string{}
if registryRequestParams.labelsParam != nil {
labels = *registryRequestParams.labelsParam
}
sortByField = GetSortByField(sortByField, registryRequestParams.Resource)
sortByOrder = GetSortByOrder(sortByOrder)
offset := GetOffset(registryRequestParams.size, registryRequestParams.page)
limit := GetPageLimit(registryRequestParams.size)
pageNumber := GetPageNumber(registryRequestParams.page)
searchTerm := ""
if registryRequestParams.search != nil {
searchTerm = string(*registryRequestParams.search)
}
baseInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, registryRequestParams.ParentRef,
registryRequestParams.RegRef)
if err != nil {
return nil, err
}
scope := ""
if registryRequestParams.scope != nil {
scope = string(*registryRequestParams.scope)
}
recursive := false
if registryRequestParams.recursive != nil {
recursive = bool(*registryRequestParams.recursive)
}
return &RegistryRequestInfo{
RegistryRequestBaseInfo: baseInfo,
packageTypes: packageTypes,
sortByField: sortByField,
sortByOrder: sortByOrder,
offset: offset,
limit: limit,
pageNumber: pageNumber,
searchTerm: searchTerm,
labels: labels,
registryIDs: registryIDs,
recursive: recursive,
scope: scope,
}, nil
}
func getManifestConfig(
ctx context.Context,
digest digest.Digest,
rootRef string,
driver storagedriver.StorageDriver,
) (*manifestConfig, error) {
var config manifestConfig
path, err := storage.PathFn(strings.ToLower(rootRef), digest)
if err != nil {
return nil, fmt.Errorf("failed to get path: %w", err)
}
content, err := driver.GetContent(ctx, path)
if err != nil {
return nil, fmt.Errorf("failed to get content for image config: %w", err)
}
if err := json.Unmarshal(content, &config); err != nil {
return nil, fmt.Errorf("failed to unmarshal manifest config: %w", err)
}
return &config, nil
}
func (c *APIController) setUpstreamProxyIDs(
ctx context.Context,
registry *types.Registry,
dto api.RegistryRequest,
parentID int64,
) error {
if dto.Config.Type != api.RegistryTypeVIRTUAL {
return fmt.Errorf("invalid call to set upstream proxy ids for parentID: %d", parentID)
}
virtualConfig, err := dto.Config.AsVirtualConfig()
if err != nil {
return fmt.Errorf("failed to get virtualConfig: %w", err)
}
if nil == virtualConfig.UpstreamProxies || commons.IsEmpty(*(virtualConfig.UpstreamProxies)) {
log.Ctx(ctx).Debug().Msgf("Nothing to do for registryRequest: %s", dto.Identifier)
return nil
}
parentIDs, err := c.SpaceStore.GetAncestorIDs(ctx, parentID)
if err != nil {
return fmt.Errorf("failed to get ancestors upstream proxies: %w", err)
}
repos, err := c.RegistryRepository.GetAll(
ctx,
parentIDs,
[]string{string(registry.PackageType)},
"id",
"",
math.MaxInt,
0,
"",
"",
)
if repos == nil || err != nil {
err := fmt.Errorf("no repositories found for parentID: %d", parentID)
log.Ctx(ctx).Debug().Err(err).Msg("Failed to fetch repositories")
return err
}
var upstreamProxies []int64
for _, proxy := range *virtualConfig.UpstreamProxies {
for _, repo := range *repos {
if repo.RegIdentifier == proxy {
regID, err := strconv.ParseInt(repo.RegID, 10, 64)
if err != nil {
continue
}
// cycle detection: ensure adding regID as upstream to registry.ID doesn't create a cycle
if err := c.assertNoCycleOnAdd(ctx, registry.ID, regID, registry.Name); err != nil {
return err
}
upstreamProxies = append(upstreamProxies, regID)
}
}
}
registry.UpstreamProxies = upstreamProxies
return nil
}
func (c *APIController) assertNoCycleOnAdd(
ctx context.Context,
registryID int64, newUpstreamID int64, registryName string,
) error {
return c.assertNoCycleOnAddHelper(ctx, registryID, newUpstreamID, registryName)
}
func (c *APIController) assertNoCycleOnAddHelper(
ctx context.Context,
rootRegistryID int64, newUpstreamID int64, registryName string,
) error {
if newUpstreamID == rootRegistryID {
return fmt.Errorf("cycle detected while setting up the upstream proxy for registry: [%s]", registryName)
}
upstreamProxies, err := c.getUpstreamProxyIDs(ctx, newUpstreamID)
if err != nil {
return err
}
for _, upstreamProxyID := range upstreamProxies {
if err := c.assertNoCycleOnAddHelper(ctx, rootRegistryID, upstreamProxyID, registryName); err != nil {
return err
}
}
return nil
}
func (c *APIController) getUpstreamProxyIDs(ctx context.Context, registryID int64) ([]int64, error) {
registry, err := c.RegistryRepository.Get(ctx, registryID)
if err != nil {
return nil, err
}
return registry.UpstreamProxies, nil
}
func (c *APIController) getUpstreamProxyKeys(ctx context.Context, ids []int64) []string {
repoKeys, _ := c.RegistryRepository.FetchUpstreamProxyKeys(ctx, ids)
return repoKeys
}
type manifestConfig struct {
CreatedAt *string `json:"created,omitempty"`
Digest string `json:"digest,omitempty"`
History []historyEntry `json:"history"`
ModifiedAt *string `json:"modified,omitempty"`
Os string `json:"os"`
Arch string `json:"architecture,omitempty"`
RootFS rootFS `json:"rootfs"`
}
type historyEntry struct {
Created string `json:"created"`
CreatedBy string `json:"created_by"` //nolint:tagliatelle
EmptyLayer bool `json:"empty_layer"` //nolint:tagliatelle
Comment string `json:"comment,omitempty"`
}
type rootFS struct {
RootFsType string `json:"type"`
DiffIDs []string `json:"diff_ids"` //nolint:tagliatelle
}
func getRepoEntityFields(dto api.RegistryRequest) ([]string, []string, string, []string) {
allowedPattern := []string{}
if dto.AllowedPattern != nil {
allowedPattern = *dto.AllowedPattern
}
blockedPattern := []string{}
if dto.BlockedPattern != nil {
blockedPattern = *dto.BlockedPattern
}
description := ""
if dto.Description != nil {
description = *dto.Description
}
labels := []string{}
if dto.Labels != nil {
labels = *dto.Labels
}
return allowedPattern, blockedPattern, description, labels
}
func (c *APIController) CreateVirtualRepositoryResponse(
ctx context.Context,
registry *types.Registry,
upstreamProxyKeys []string,
cleanupPolicies *[]types.CleanupPolicy,
registryURL string,
registryRef string,
) (*api.RegistryResponseJSONResponse, error) {
isPublic, err := c.PublicAccess.Get(ctx, gitnessenum.PublicResourceTypeRegistry, registryRef)
if err != nil {
return nil, fmt.Errorf("error in fetching public access for registry %s: %w", registryRef, err)
}
createdAt := GetTimeInMs(registry.CreatedAt)
modifiedAt := GetTimeInMs(registry.UpdatedAt)
allowedPattern := registry.AllowedPattern
blockedPattern := registry.BlockedPattern
labels := registry.Labels
config := api.RegistryConfig{}
_ = config.FromVirtualConfig(api.VirtualConfig{UpstreamProxies: &upstreamProxyKeys})
response := &api.RegistryResponseJSONResponse{
Data: api.Registry{
Uuid: registry.UUID,
Identifier: registry.Name,
Description: ®istry.Description,
Url: registryURL,
PackageType: registry.PackageType,
AllowedPattern: &allowedPattern,
BlockedPattern: &blockedPattern,
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
CleanupPolicy: CreateCleanupPolicyResponse(cleanupPolicies),
Config: &config,
Labels: &labels,
IsPublic: isPublic,
},
Status: api.StatusSUCCESS,
}
return response, nil
}
func (c *APIController) CreateUpstreamProxyResponseJSONResponse(
ctx context.Context,
upstreamproxy *types.UpstreamProxy,
registryRef string,
) (*api.RegistryResponseJSONResponse, error) {
isPublic, err := c.PublicAccess.Get(ctx, gitnessenum.PublicResourceTypeRegistry, registryRef)
if err != nil {
return nil, fmt.Errorf("error in fetching public access for registry %s: %w", registryRef, err)
}
createdAt := GetTimeInMs(upstreamproxy.CreatedAt)
modifiedAt := GetTimeInMs(upstreamproxy.UpdatedAt)
allowedPattern := upstreamproxy.AllowedPattern
blockedPattern := upstreamproxy.BlockedPattern
configAuth := &api.UpstreamConfig_Auth{}
if api.AuthType(upstreamproxy.RepoAuthType) == api.AuthTypeUserPassword {
auth := api.UserPassword{}
auth.UserName = upstreamproxy.UserName
auth.SecretIdentifier = &upstreamproxy.SecretIdentifier
auth.SecretSpacePath = &upstreamproxy.SecretSpacePath
_ = configAuth.FromUserPassword(auth)
} else if api.AuthType(upstreamproxy.RepoAuthType) == api.AuthTypeAccessKeySecretKey {
auth := api.AccessKeySecretKey{}
auth.AccessKey = &upstreamproxy.UserName
auth.AccessKeySecretIdentifier = &upstreamproxy.UserNameSecretIdentifier
auth.AccessKeySecretSpacePath = &upstreamproxy.UserNameSecretSpacePath
auth.SecretKeyIdentifier = upstreamproxy.SecretIdentifier
auth.SecretKeySpacePath = &upstreamproxy.SecretSpacePath
err := configAuth.FromAccessKeySecretKey(auth)
if err != nil {
return nil, fmt.Errorf("error in converting auth config to access and secret key: %w", err)
}
}
source := api.UpstreamConfigSource(upstreamproxy.Source)
config := api.UpstreamConfig{
AuthType: api.AuthType(upstreamproxy.RepoAuthType),
Auth: configAuth,
Source: &source,
Url: &upstreamproxy.RepoURL,
}
if upstreamproxy.Config != nil && upstreamproxy.Config.RemoteUrlSuffix != "" {
config.RemoteUrlSuffix = &upstreamproxy.Config.RemoteUrlSuffix
}
registryConfig := &api.RegistryConfig{}
_ = registryConfig.FromUpstreamConfig(config)
response := &api.RegistryResponseJSONResponse{
Data: api.Registry{
Uuid: upstreamproxy.RegistryUUID,
Identifier: upstreamproxy.RepoKey,
PackageType: upstreamproxy.PackageType,
Url: upstreamproxy.RepoURL,
AllowedPattern: &allowedPattern,
BlockedPattern: &blockedPattern,
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
Config: registryConfig,
IsPublic: isPublic,
},
Status: api.StatusSUCCESS,
}
return response, nil
}
// deduplicateTriggers de-duplicates the triggers provided by the user.
func deduplicateTriggers(in []gitnessenum.WebhookTrigger) []gitnessenum.WebhookTrigger {
if len(in) == 0 {
return []gitnessenum.WebhookTrigger{}
}
triggerSet := make(map[gitnessenum.WebhookTrigger]bool, len(in))
out := make([]gitnessenum.WebhookTrigger, 0, len(in))
for _, trigger := range in {
if triggerSet[trigger] {
continue
}
triggerSet[trigger] = true
out = append(out, trigger)
}
return out
}
func (c *APIController) GetArtifactFilesRequestInfo(
ctx context.Context,
r api.GetArtifactFilesRequestObject,
) (*ArtifactFilesRequestInfo, error) {
sortByField := ""
sortByOrder := ""
if r.Params.SortOrder != nil {
sortByOrder = string(*r.Params.SortOrder)
}
if r.Params.SortField != nil {
sortByField = string(*r.Params.SortField)
}
sortByField = GetSortByField(sortByField, ArtifactFilesResource)
sortByOrder = GetSortByOrder(sortByOrder)
offset := GetOffset(r.Params.Size, r.Params.Page)
limit := GetPageLimit(r.Params.Size)
pageNumber := GetPageNumber(r.Params.Page)
searchTerm := ""
if r.Params.SearchTerm != nil {
searchTerm = string(*r.Params.SearchTerm)
}
baseInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return nil, err
}
return &ArtifactFilesRequestInfo{
RegistryRequestBaseInfo: baseInfo,
sortByField: sortByField,
sortByOrder: sortByOrder,
offset: offset,
limit: limit,
pageNumber: pageNumber,
searchTerm: searchTerm,
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_labels.go | registry/app/api/controller/metadata/get_artifacts_labels.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/types/enum"
)
func (c *APIController) ListArtifactLabels(
ctx context.Context,
r artifact.ListArtifactLabelsRequestObject,
) (artifact.ListArtifactLabelsResponseObject, error) {
registryRequestParams := &RegistryRequestParams{
packageTypesParam: nil,
page: r.Params.Page,
size: r.Params.Size,
search: r.Params.SearchTerm,
Resource: ArtifactResource,
ParentRef: "",
RegRef: string(r.RegistryRef),
labelsParam: nil,
sortOrder: nil,
sortField: nil,
registryIDsParam: nil,
}
regInfo, err := c.GetRegistryRequestInfo(
ctx, *registryRequestParams)
if err != nil {
return artifact.ListArtifactLabels400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.ListArtifactLabels400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.ListArtifactLabels403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
labels, err := c.ImageStore.GetLabelsByParentIDAndRepo(
ctx, regInfo.ParentID,
regInfo.RegistryIdentifier, regInfo.limit, regInfo.offset, regInfo.searchTerm,
)
count, _ := c.ImageStore.CountLabelsByParentIDAndRepo(
ctx, regInfo.ParentID,
regInfo.RegistryIdentifier, regInfo.searchTerm,
)
if err != nil {
return artifact.ListArtifactLabels500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.ListArtifactLabels200JSONResponse{
ListArtifactLabelResponseJSONResponse: *GetAllArtifactLabelsResponse(
&labels, count,
regInfo.pageNumber, regInfo.limit,
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_webhook_execution_test.go | registry/app/api/controller/metadata/get_webhook_execution_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//nolint:lll
package metadata
import (
"context"
"fmt"
"testing"
"time"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
func TestGetWebhookExecution(t *testing.T) {
now := time.Now().Unix()
tests := []struct {
name string
setupMocks func(
*APIController,
*mocks.SpaceFinder,
*mocks.Authorizer,
*mocks.RegistryMetadataHelper,
*mocks.WebhooksRepository,
*mocks.WebhooksExecutionRepository)
request api.GetWebhookExecutionRequestObject
validate func(*testing.T, api.GetWebhookExecutionResponseObject, error)
}{
{
name: "invalid_execution_identifier",
setupMocks: func(c *APIController, mockSpaceFinder *mocks.SpaceFinder, mockAuthorizer *mocks.Authorizer, mockRegistryMetadataHelper *mocks.RegistryMetadataHelper, mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository) {
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "reg", enum.PermissionRegistryView).Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, (*auth.Session)(nil), mock.Anything).Return(true, nil)
c.SpaceFinder = mockSpaceFinder
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.WebhooksRepository = mockWebhooksRepo
c.WebhooksExecutionRepository = mockWebhooksExecRepo
},
request: api.GetWebhookExecutionRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
WebhookExecutionId: "invalid",
},
validate: func(t *testing.T, response api.GetWebhookExecutionResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.GetWebhookExecution400JSONResponse)
assert.True(t, ok, "expected 400 response")
assert.Equal(t, "400", resp.Code)
assert.Equal(t, "invalid webhook execution identifier: invalid, err: strconv.ParseInt: parsing \"invalid\": invalid syntax", resp.Message)
},
},
{
name: "permission_check_fails",
setupMocks: func(c *APIController, mockSpaceFinder *mocks.SpaceFinder, mockAuthorizer *mocks.Authorizer, mockRegistryMetadataHelper *mocks.RegistryMetadataHelper, mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository) {
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "reg", enum.PermissionRegistryView).Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(false, nil)
c.SpaceFinder = mockSpaceFinder
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.WebhooksRepository = mockWebhooksRepo
c.WebhooksExecutionRepository = mockWebhooksExecRepo
},
request: api.GetWebhookExecutionRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
WebhookExecutionId: "1",
},
validate: func(t *testing.T, response api.GetWebhookExecutionResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.GetWebhookExecution403JSONResponse)
assert.True(t, ok, "expected 403 response")
assert.Equal(t, "403", resp.Code)
assert.Equal(t, "forbidden", resp.Message)
},
},
{
name: "success_case",
setupMocks: func(c *APIController, mockSpaceFinder *mocks.SpaceFinder, mockAuthorizer *mocks.Authorizer, mockRegistryMetadataHelper *mocks.RegistryMetadataHelper, mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository) {
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
}
execution := &coretypes.WebhookExecutionCore{
ID: 1,
Created: now,
WebhookID: 1,
Result: enum.WebhookExecutionResultSuccess,
Duration: 0,
Error: "",
Retriggerable: false,
Request: coretypes.WebhookExecutionRequest{
URL: "http://example.com",
Headers: "{}",
Body: "{}",
},
Response: coretypes.WebhookExecutionResponse{
StatusCode: 200,
Status: "OK",
Headers: "{}",
Body: "{}",
},
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "reg", enum.PermissionRegistryView).Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, (*auth.Session)(nil)).Return(true, nil)
mockWebhooksExecRepo.On("Find", mock.Anything, int64(1)).Return(execution, nil)
c.SpaceFinder = mockSpaceFinder
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.WebhooksRepository = mockWebhooksRepo
c.WebhooksExecutionRepository = mockWebhooksExecRepo
},
request: api.GetWebhookExecutionRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
WebhookExecutionId: "1",
},
validate: func(t *testing.T, response api.GetWebhookExecutionResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.GetWebhookExecution200JSONResponse)
assert.True(t, ok, "expected 200 response")
assert.Equal(t, api.StatusSUCCESS, resp.Status)
exec := resp.Data
assert.Equal(t, int64(1), *exec.Id)
assert.Equal(t, now, *exec.Created)
assert.Equal(t, int64(1), *exec.WebhookId)
assert.Equal(t, api.WebhookExecResultSUCCESS, *exec.Result)
assert.Equal(t, int64(0), *exec.Duration)
assert.Equal(t, "", *exec.Error)
assert.False(t, *exec.Retriggerable)
assert.Equal(t, "http://example.com", *exec.Request.Url)
assert.Equal(t, "{}", *exec.Request.Headers)
assert.Equal(t, "{}", *exec.Request.Body)
assert.Equal(t, 200, *exec.Response.StatusCode)
assert.Equal(t, "OK", *exec.Response.Status)
assert.Equal(t, "{}", *exec.Response.Headers)
assert.Equal(t, "{}", *exec.Response.Body)
},
},
{
name: "find_execution_error",
setupMocks: func(c *APIController, mockSpaceFinder *mocks.SpaceFinder, mockAuthorizer *mocks.Authorizer, mockRegistryMetadataHelper *mocks.RegistryMetadataHelper, mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository) {
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On(
"GetRegistryRequestBaseInfo",
mock.Anything,
"",
"reg",
).Return(regInfo, nil)
mockRegistryMetadataHelper.On(
"GetPermissionChecks",
space,
"reg",
enum.PermissionRegistryView,
).Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
mockWebhooksExecRepo.On(
"Find",
mock.Anything,
int64(1),
).Return(nil, fmt.Errorf("error finding execution"))
c.SpaceFinder = mockSpaceFinder
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.WebhooksRepository = mockWebhooksRepo
c.WebhooksExecutionRepository = mockWebhooksExecRepo
},
request: api.GetWebhookExecutionRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
WebhookExecutionId: "1",
},
validate: func(t *testing.T, response api.GetWebhookExecutionResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.GetWebhookExecution500JSONResponse)
assert.True(t, ok, "expected 500 response")
assert.Equal(t, "500", resp.Code)
assert.Equal(t, "failed to find webhook execution: error finding execution", resp.Message)
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Create mocks
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockWebhooksRepo := new(mocks.WebhooksRepository)
mockWebhooksExecRepo := new(mocks.WebhooksExecutionRepository)
// Create controller
controller := &APIController{}
// Setup mocks
tt.setupMocks(controller, mockSpaceFinder, mockAuthorizer, mockRegistryMetadataHelper, mockWebhooksRepo, mockWebhooksExecRepo)
// Call function
resp, err := controller.GetWebhookExecution(context.Background(), tt.request)
// Validate response
tt.validate(t, resp, err)
// Verify mock expectations
mockSpaceFinder.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
mockRegistryMetadataHelper.AssertExpectations(t)
mockWebhooksRepo.AssertExpectations(t)
mockWebhooksExecRepo.AssertExpectations(t)
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_registries_test.go | registry/app/api/controller/metadata/get_registries_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"testing"
"time"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/store"
coretypes "github.com/harness/gitness/types"
"github.com/lib/pq"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
func TestGetAllRegistryResponse(t *testing.T) {
controller := &APIController{}
registries := []store.RegistryMetadata{
{
RegID: "test-registry",
RegIdentifier: "test-registry",
Description: "Test registry",
PackageType: api.PackageTypeDOCKER,
Type: api.RegistryTypeVIRTUAL,
LastModified: time.Now(),
ArtifactCount: 10,
DownloadCount: 500,
Size: 10240,
Labels: pq.StringArray{"test"},
ParentID: 2,
},
}
mockURLProvider := new(mocks.Provider)
mockURLProvider.On("GenerateUIRegistryURL", mock.Anything, "root", "test-registry").Return("http://test.com/registry")
mockURLProvider.On("RegistryURL", mock.Anything, "root", "test-registry").
Return("http://registry.test.com/root/test-registry")
controller.URLProvider = mockURLProvider
mockSpaceFinder := new(mocks.SpaceFinder)
space := &coretypes.SpaceCore{ID: 2, Path: "root/parent"}
mockSpaceFinder.On("FindByID", mock.Anything, int64(2)).Return(space, nil)
controller.SpaceFinder = mockSpaceFinder
mockPublicAccess := new(mocks.MockPublicAccess)
mockPublicAccess.On("Get", mock.Anything, mock.Anything, mock.Anything).Return(false, nil)
controller.PublicAccess = mockPublicAccess
response, _ := controller.GetAllRegistryResponse(context.Background(), ®istries, 1, 1, 10, "root", mockURLProvider)
assert.NotNil(t, response)
assert.Equal(t, api.StatusSUCCESS, response.Status)
assert.Equal(t, int64(1), *response.Data.ItemCount)
assert.Equal(t, int64(1), *response.Data.PageCount)
assert.Equal(t, int64(1), *response.Data.PageIndex)
assert.Equal(t, 10, *response.Data.PageSize)
assert.Len(t, response.Data.Registries, 1)
assert.Equal(t, "test-registry", response.Data.Registries[0].Identifier)
}
func TestGetRegistryMetadata(t *testing.T) {
controller := &APIController{}
registries := []store.RegistryMetadata{
{
RegID: "test-registry",
RegIdentifier: "test-registry",
Description: "Test registry",
PackageType: api.PackageTypeDOCKER,
Type: api.RegistryTypeVIRTUAL,
LastModified: time.Now(),
ArtifactCount: 10,
DownloadCount: 500,
Size: 10240,
Labels: pq.StringArray{"test"},
ParentID: 2,
},
{
RegID: "generic-registry",
RegIdentifier: "generic-registry",
Description: "",
PackageType: api.PackageTypeGENERIC,
Type: api.RegistryTypeUPSTREAM,
LastModified: time.Now(),
ArtifactCount: 0,
DownloadCount: 0,
Size: 0,
Labels: pq.StringArray{},
ParentID: 2,
},
}
mockURLProvider := new(mocks.Provider)
mockURLProvider.On("GenerateUIRegistryURL", mock.Anything, "root", "test-registry").Return("http://test.com/registry")
mockURLProvider.On("RegistryURL", mock.Anything, "root", "test-registry").
Return("http://registry.test.com/root/test-registry")
mockURLProvider.On("GenerateUIRegistryURL", mock.Anything, "root", "generic-registry").
Return("http://test.com/generic/registry")
mockURLProvider.On("RegistryURL", mock.Anything, "root", "generic-registry").
Return("http://registry.test.com/root/generic/generic-registry")
mockURLProvider.On("RegistryURL", mock.Anything, "root", "generic", "generic-registry").
Return("http://registry.test.com/root/generic/generic-registry")
mockSpaceFinder := new(mocks.SpaceFinder)
space := &coretypes.SpaceCore{ID: 2, Path: "root/parent"}
mockSpaceFinder.On("FindByID", mock.Anything, int64(2)).Return(space, nil)
controller.SpaceFinder = mockSpaceFinder
mockPublicAccess := new(mocks.MockPublicAccess)
mockPublicAccess.On("Get", mock.Anything, mock.Anything, mock.Anything).Return(false, nil)
controller.PublicAccess = mockPublicAccess
metadata, _ := controller.GetRegistryMetadata(context.Background(), ®istries, "root", mockURLProvider)
assert.Len(t, metadata, 2)
// Test first registry (Docker)
assert.Equal(t, "test-registry", metadata[0].Identifier)
assert.Equal(t, "Test registry", *metadata[0].Description)
assert.Equal(t, api.PackageTypeDOCKER, metadata[0].PackageType)
assert.NotNil(t, metadata[0].ArtifactsCount)
assert.Equal(t, int64(10), *metadata[0].ArtifactsCount)
assert.NotNil(t, metadata[0].DownloadsCount)
assert.Equal(t, int64(500), *metadata[0].DownloadsCount)
assert.NotNil(t, metadata[0].Labels)
assert.Contains(t, *metadata[0].Labels, "test")
assert.Equal(t, "http://registry.test.com/root/test-registry", metadata[0].Url)
// Test second registry (Generic)
assert.Equal(t, "generic-registry", metadata[1].Identifier)
assert.Equal(t, "", *metadata[1].Description)
assert.Equal(t, api.PackageTypeGENERIC, metadata[1].PackageType)
assert.Nil(t, metadata[1].ArtifactsCount)
assert.Nil(t, metadata[1].DownloadsCount)
assert.Nil(t, metadata[1].Labels)
assert.Equal(t, "http://registry.test.com/root/generic/generic-registry", metadata[1].Url)
}
func TestGetRegistryPath(t *testing.T) {
controller := &APIController{}
mockSpaceFinder := new(mocks.SpaceFinder)
space := &coretypes.SpaceCore{ID: 2, Path: "root/parent"}
mockSpaceFinder.On("FindByID", mock.Anything, int64(2)).Return(space, nil)
mockSpaceFinder.On("FindByID", mock.Anything, int64(0)).Return(nil, fmt.Errorf("space not found"))
mockSpaceFinder.On("FindByID", mock.Anything, int64(999)).Return(nil, fmt.Errorf("space not found"))
controller.SpaceFinder = mockSpaceFinder
// Test with valid parent ID
path := controller.GetRegistryPath(context.Background(), 2, "test-registry")
assert.Equal(t, "root/parent/test-registry", path)
// Test with zero parent ID
path = controller.GetRegistryPath(context.Background(), 0, "test-registry")
assert.Equal(t, "", path)
// Test with error finding space
path = controller.GetRegistryPath(context.Background(), 999, "test-registry")
assert.Equal(t, "", path)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/create_registry_test.go | registry/app/api/controller/metadata/create_registry_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//nolint:lll,revive,errcheck // revive:disable:unused-parameter
package metadata_test
import (
"context"
"errors"
"fmt"
"testing"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/events"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
registryevents "github.com/harness/gitness/registry/app/events/artifact"
"github.com/harness/gitness/registry/app/factory"
"github.com/harness/gitness/registry/app/helpers"
"github.com/harness/gitness/registry/app/helpers/pkg"
"github.com/harness/gitness/registry/app/pkg/filemanager"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/registry/utils"
coretypes "github.com/harness/gitness/types"
gitnessenum "github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
const (
// TestRegistryName is the name used for test registries.
testRegistryName = "test-registry"
)
var (
// ErrTestConsumerNotNeeded is a sentinel error indicating consumer is not needed in tests.
ErrTestConsumerNotNeeded = errors.New("consumer not needed in tests")
)
func TestCreateRegistry(t *testing.T) {
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
// Create mock event system components.
producer := &mocks.StreamProducer{}
// Set up producer expectations.
producer.On("Send", mock.Anything, "registry", mock.MatchedBy(func(payload map[string]any) bool {
return payload["action"] == "registry.create" &&
payload["registry_id"] == int64(1) &&
payload["registry_name"] == testRegistryName
})).Return("", nil).Once()
// Create events system.
consumerFactory := func(_ string, _ string) (events.StreamConsumer, error) {
// Return a sentinel error to indicate consumer is not needed in tests.
return nil, ErrTestConsumerNotNeeded
}
eventsSystem, err := events.NewSystem(consumerFactory, producer)
if err != nil {
t.Fatalf("Failed to create events system: %v", err)
}
// Create event reporter.
reporter, err := registryevents.NewReporter(eventsSystem)
if err != nil {
t.Fatalf("Failed to create event reporter: %v", err)
}
eventReporter := *reporter // Use value instead of pointer.
// Helper mocks and setup complete.
tests := []struct {
name string
request api.CreateRegistryRequestObject
setupMocks func() *metadata.APIController
expectedResp any
}{
{
name: "create_virtual_registry_success",
request: api.CreateRegistryRequestObject{
Body: &api.CreateRegistryJSONRequestBody{
Identifier: testRegistryName,
ParentRef: "root",
Config: func() *api.RegistryConfig {
config := &api.RegistryConfig{Type: api.RegistryTypeVIRTUAL}
_ = config.FromVirtualConfig(api.VirtualConfig{UpstreamProxies: &[]string{}})
return config
}(),
PackageType: api.PackageTypeDOCKER,
CleanupPolicy: &[]api.CleanupPolicy{},
},
},
expectedResp: api.CreateRegistry201JSONResponse{
RegistryResponseJSONResponse: api.RegistryResponseJSONResponse{
Data: api.Registry{
Identifier: testRegistryName,
Config: &api.RegistryConfig{
Type: api.RegistryTypeVIRTUAL,
},
PackageType: api.PackageTypeDOCKER,
Url: "http://example.com/registry/test-registry",
Description: utils.StringPtr(""),
CreatedAt: utils.StringPtr("-62135596800000"),
ModifiedAt: utils.StringPtr("-62135596800000"),
},
Status: api.StatusSUCCESS,
},
},
setupMocks: func() *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockRegFinder := new(mocks.RegistryFinder)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
mockAuditService := new(mocks.AuditService)
mockCleanupPolicyRepo := new(mocks.CleanupPolicyRepository)
mockTransactor := new(mocks.Transactor)
mockGenericBlobRepo := new(mocks.GenericBlobRepository)
// Create a mock URL provider.
mockURLProvider := new(mocks.Provider)
mockPublicAccessService := new(mocks.Service)
// Set up common URL provider expectations
mockURLProvider.On("PackageURL", mock.Anything, mock.Anything, mock.Anything,
mock.Anything).Return("http://example.com/registry/test-registry/docker")
mockURLProvider.On("GenerateUIRegistryURL", mock.Anything, mock.Anything,
mock.Anything).Return("http://example.com/registry/test-registry")
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything,
mock.Anything).Return("http://example.com/registry/test-registry")
// Setup base info mock.
baseInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: testRegistryName,
ParentRef: "root",
ParentID: 2,
RootIdentifierID: 3,
RootIdentifier: "root",
RegistryType: api.RegistryTypeVIRTUAL,
PackageType: api.PackageTypeDOCKER,
}
// Create the registry entity that will be used in mocks.
registry := &types.Registry{
ID: baseInfo.RegistryID,
Name: testRegistryName,
ParentID: baseInfo.ParentID,
RootParentID: baseInfo.RootIdentifierID,
Type: api.RegistryTypeVIRTUAL,
PackageType: api.PackageTypeDOCKER,
}
// 1. Mock the initial registry metadata lookup.
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "root", "").Return(baseInfo,
nil).Once()
// 2. Mock the space lookup.
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil).Once()
// 3. Mock the authorization check.
mockAuthorizer.On("Check", mock.Anything, mock.Anything,
mock.MatchedBy(func(scope *coretypes.Scope) bool { return scope.SpacePath == "root" }),
mock.MatchedBy(func(r *coretypes.Resource) bool { return r.Type == gitnessenum.ResourceTypeRegistry }),
gitnessenum.PermissionRegistryEdit).Return(true, nil).Once()
// 4. Mock registry creation
mockRegistryRepo.On("Create", mock.Anything,
mock.MatchedBy(func(r *types.Registry) bool {
return r.Name == testRegistryName &&
r.ParentID == baseInfo.ParentID &&
r.Type == api.RegistryTypeVIRTUAL &&
r.PackageType == api.PackageTypeDOCKER
})).Return(baseInfo.RegistryID, nil).Once()
// 5. Mock registry retrieval.
mockRegistryRepo.On("Get", mock.Anything, baseInfo.RegistryID).Return(registry, nil).Once()
mockRegFinder.On("Get", mock.Anything, baseInfo.RegistryID).Return(registry, nil).Once()
mockSpaceFinder.On("FindByID", mock.Anything, mock.Anything).Return(space, nil).Once()
mockPublicAccessService.On("Set", mock.Anything, mock.Anything, mock.Anything, mock.Anything).Return(nil).Once()
mockPublicAccessService.On("Get", mock.Anything, mock.Anything, mock.Anything).Return(false, nil).Once()
// 6. Mock cleanup policy retrieval.
mockCleanupPolicyRepo.On("GetByRegistryID", mock.Anything,
baseInfo.RegistryID).Return(&[]types.CleanupPolicy{}, nil).Once()
// URL provider mock expectations set up above
// Mock setup already done above.
// Setup already covered above.
fileManager := filemanager.NewFileManager(
mockRegistryRepo,
mockGenericBlobRepo,
nil, // nodesRepo - not needed for this test.
mockTransactor,
nil, // reporter - not needed for this test.
nil, // config - not needed for this test.
nil, // storageService - not needed for this test.
nil, // bucketService - not needed for this test.
)
// Setup audit service mock.
mockAuditService.On("Log", mock.Anything,
mock.MatchedBy(func(p coretypes.Principal) bool { return p.ID == 1 && p.Type == "user" }),
mock.MatchedBy(func(r audit.Resource) bool {
return r.Type == audit.ResourceTypeRegistry && r.Identifier == testRegistryName
}),
audit.ActionCreated,
"root",
mock.Anything,
).Return(nil).Once()
// Setup registry repo mock.
mockRegistryRepo.On("FetchUpstreamProxyKeys", mock.Anything, mock.Anything).Return([]string{},
nil).Once()
mockCleanupPolicyRepo.On("GetByRegistryID", mock.Anything,
baseInfo.RegistryID).Return(&[]types.CleanupPolicy{}, nil).Once()
packageFactory := factory.NewPackageFactory()
packageFactory.Register(pkg.NewDockerPackageType(nil))
packageWrapper := helpers.NewPackageWrapper(packageFactory, mockRegFinder)
// Create controller with updated signature.
return metadata.NewAPIController(
mockRegistryRepo,
fileManager,
nil, // blobStore.
nil, // genericBlobStore.
nil, // upstreamProxyStore.
nil, // tagStore.
nil, // manifestStore.
mockCleanupPolicyRepo,
nil, // imageStore.
nil, // driver.
mockSpaceFinder,
mockTransactor,
mockURLProvider,
mockAuthorizer,
mockAuditService,
nil, // artifactStore.
nil, // webhooksRepository.
nil, // webhooksExecutionRepository.
mockRegistryMetadataHelper,
nil, // webhookService.
eventReporter,
nil, //
"", // downloadStatRepository.
nil,
mockRegFinder,
nil, // PostProcessingReporter - not needed for this test.
nil,
nil,
nil,
nil,
nil,
func(_ context.Context) bool {
return true
},
packageWrapper,
mockPublicAccessService,
)
},
},
{
name: "create_registry_invalid_parent",
request: api.CreateRegistryRequestObject{
Body: &api.CreateRegistryJSONRequestBody{
Identifier: testRegistryName,
ParentRef: "invalid",
Config: func() *api.RegistryConfig {
config := &api.RegistryConfig{Type: api.RegistryTypeVIRTUAL}
_ = config.FromVirtualConfig(api.VirtualConfig{UpstreamProxies: &[]string{}})
return config
}(),
PackageType: api.PackageTypeDOCKER,
CleanupPolicy: &[]api.CleanupPolicy{},
},
},
expectedResp: api.CreateRegistry400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse{
Code: "400",
Message: "space not found",
},
},
setupMocks: func() *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockRegFinder := new(mocks.RegistryFinder)
mockTransactor := new(mocks.Transactor)
mockGenericBlobRepo := new(mocks.GenericBlobRepository)
mockPublicAccessService := new(mocks.Service)
// Setup error case mock.
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "invalid", "").
Return(nil, fmt.Errorf("space not found")).Once()
mockPublicAccessService.On("Set", mock.Anything, mock.Anything, mock.Anything, mock.Anything).Return(nil).Once()
fileManager := filemanager.NewFileManager(
mockRegistryRepo,
mockGenericBlobRepo,
nil, // nodesRepo - not needed for this test.
mockTransactor,
nil, // reporter - not needed for this test.
nil, // config - not needed for this test.
nil, // storageService - not needed for this test.
nil, // bucketService - not needed for this test.
)
return metadata.NewAPIController(
mockRegistryRepo,
fileManager,
nil, // blobStore.
nil, // genericBlobStore.
nil, // upstreamProxyStore.
nil, // tagStore.
nil, // manifestStore.
nil, // cleanupPolicyStore
nil, // imageStore.
nil, // driver.
nil, // spaceFinder
mockTransactor,
nil, // urlProvider.
nil, // authorizer.
nil, // auditService.
nil, // artifactStore.
nil, // webhooksRepository.
nil, // webhooksExecutionRepository.
mockRegistryMetadataHelper,
nil, // webhookService.
eventReporter,
nil, //
"", // downloadStatRepository.
nil,
mockRegFinder,
nil, // PostProcessingReporter - not needed for this test.
nil,
nil,
nil,
nil,
nil,
func(_ context.Context) bool {
return true
},
nil,
mockPublicAccessService,
)
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Create the controller.
controller := tt.setupMocks()
// Create context with auth session.
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
Type: "user",
},
}
ctx = request.WithAuthSession(ctx, session)
// Call the API.
registryResp, err := controller.CreateRegistry(ctx, tt.request)
// Verify response matches expected type and content.
switch expected := tt.expectedResp.(type) {
case api.CreateRegistry201JSONResponse:
assert.NoError(t, err, "Expected no error but got one")
actualResp, ok := registryResp.(api.CreateRegistry201JSONResponse)
assert.True(t, ok, "Expected 201 response")
assert.Equal(t, expected.Status, actualResp.Status, "Response status should match")
// Verify registry data fields individually.
assert.Equal(t, expected.Data.Identifier, actualResp.Data.Identifier,
"Registry identifier should match")
assert.Equal(t, expected.Data.PackageType, actualResp.Data.PackageType, "Package type should match")
assert.Equal(t, expected.Data.Url, actualResp.Data.Url, "Registry URL should match")
assert.Equal(t, expected.Data.Description, actualResp.Data.Description, "Description should match")
assert.Equal(t, expected.Data.CreatedAt, actualResp.Data.CreatedAt, "CreatedAt should match")
assert.Equal(t, expected.Data.ModifiedAt, actualResp.Data.ModifiedAt, "ModifiedAt should match")
// Verify config type.
assert.NotNil(t, actualResp.Data.Config, "Config should not be nil")
assert.Equal(t, expected.Data.Config.Type, actualResp.Data.Config.Type, "Config type should match")
// Verify mock expectations for success case.
//nolint:errcheck
called := controller.RegistryRepository.(*mocks.RegistryRepository).AssertCalled(t,
"Create",
mock.Anything, mock.MatchedBy(func(r *types.Registry) bool {
return r.Name == tt.request.Body.Identifier &&
r.Type == tt.request.Body.Config.Type &&
r.PackageType == tt.request.Body.PackageType
}))
assert.True(t, called, "Expected Create call not made")
// Verify all mocks expectations were met.
mockRegistry, regOk := controller.RegistryRepository.(*mocks.RegistryRepository)
assert.True(t, regOk, "Type assertion to RegistryRepository failed")
regAssertOk := mockRegistry.AssertExpectations(t)
assert.True(t, regAssertOk, "Mock expectations failed for RegistryRepository")
mockAudit, auditOk := controller.AuditService.(*mocks.AuditService)
assert.True(t, auditOk, "Type assertion to AuditService failed")
auditAssertOk := mockAudit.AssertExpectations(t)
assert.True(t, auditAssertOk, "Mock expectations failed for AuditService")
// Verify audit expectations.
//nolint:errcheck
logCalled := controller.AuditService.(*mocks.AuditService).AssertCalled(t, "Log",
mock.Anything,
mock.Anything, mock.Anything, audit.ActionCreated, mock.Anything, mock.Anything)
assert.True(t, logCalled, "Expected Log call not made")
case api.CreateRegistry400JSONResponse:
actualResp, ok := registryResp.(api.CreateRegistry400JSONResponse)
assert.True(t, ok, "Expected 400 response")
assert.Equal(t, expected.Code, actualResp.Code, "Error code should match")
assert.Equal(t, expected.Message, actualResp.Message, "Error message should match")
// Additional assertions for specific error cases.
switch tt.name {
case "create_registry_invalid_parent":
assert.Contains(t, actualResp.Message, "space not found",
"Error message should indicate invalid parent")
notCalled := controller.RegistryRepository.(*mocks.RegistryRepository).AssertNotCalled(t, //nolint:errcheck
"Create", mock.Anything, mock.Anything)
assert.True(t, notCalled, "Unexpected Create call made")
// Verify expectations for the error case.
metaHelper, metaHelperOk := controller.RegistryMetadataHelper.(*mocks.RegistryMetadataHelper)
assert.True(t, metaHelperOk, "Type assertion to RegistryMetadataHelper failed")
assertMetaOk := metaHelper.AssertExpectations(t)
assert.True(t, assertMetaOk, "Mock expectations failed for RegistryMetadataHelper")
case "create_registry_duplicate":
assert.Contains(t, actualResp.Message, "already defined",
"Error message should indicate duplicate registry")
assert.Contains(t, actualResp.Message, tt.request.Body.Identifier,
"Error message should include the registry identifier")
getByNameCalled := controller.RegistryRepository.(*mocks.RegistryRepository).AssertCalled(t, //nolint:errcheck
"GetByRootParentIDAndName", mock.Anything, mock.Anything, tt.request.Body.Identifier)
assert.True(t, getByNameCalled, "Expected GetByRootParentIDAndName call not made")
}
case api.CreateRegistry403JSONResponse:
assert.Error(t, err, "Expected an error")
actualResp, ok := registryResp.(api.CreateRegistry403JSONResponse)
assert.True(t, ok, "Expected 403 response")
assert.Equal(t, expected.Code, actualResp.Code, "Error code should match")
assert.Equal(t, expected.Message, actualResp.Message, "Error message should match")
assert.Contains(t, actualResp.Message, "unauthorized",
"Error message should indicate authorization failure")
_ = controller.RegistryRepository.(*mocks.RegistryRepository).AssertNotCalled(t, //nolint:errcheck
"Create", mock.Anything, mock.Anything)
default:
t.Fatalf("Unexpected response type: %T", tt.expectedResp)
}
// Verify common mock expectations.
if controller.RegistryRepository != nil {
registryRepo, regOk := controller.RegistryRepository.(*mocks.RegistryRepository)
assert.True(t, regOk, "Type assertion to RegistryRepository failed")
assertRegOk := registryRepo.AssertExpectations(t)
assert.True(t, assertRegOk, "Mock expectations failed for RegistryRepository")
}
if controller.RegistryMetadataHelper != nil {
metaHelper, metaHelperOk := controller.RegistryMetadataHelper.(*mocks.RegistryMetadataHelper)
assert.True(t, metaHelperOk, "Type assertion to RegistryMetadataHelper failed")
assertMetaOk := metaHelper.AssertExpectations(t)
assert.True(t, assertMetaOk, "Mock expectations failed for RegistryMetadataHelper")
}
if controller.SpaceFinder != nil {
spaceFinder, finderOk := controller.SpaceFinder.(*mocks.SpaceFinder)
assert.True(t, finderOk, "Type assertion to spaceFinder failed")
spaceFinderOk := spaceFinder.AssertExpectations(t)
assert.True(t, spaceFinderOk, "Mock expectations failed for spaceFinder")
}
if controller.Authorizer != nil {
auth, authOk := controller.Authorizer.(*mocks.Authorizer)
assert.True(t, authOk, "Type assertion to Authorizer failed")
authAssertOk := auth.AssertExpectations(t)
assert.True(t, authAssertOk, "Mock expectations failed for Authorizer")
}
if controller.AuditService != nil {
auditSvc, auditSvcOk := controller.AuditService.(*mocks.AuditService)
assert.True(t, auditSvcOk, "Type assertion to AuditService failed")
auditSvcAssertOk := auditSvc.AssertExpectations(t)
assert.True(t, auditSvcAssertOk, "Mock expectations failed for AuditService")
}
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_client_setup_details.go | registry/app/api/controller/metadata/get_client_setup_details.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"net/http"
"net/url"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/app/paths"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/common"
"github.com/harness/gitness/registry/utils"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetClientSetupDetails(
ctx context.Context,
r artifact.GetClientSetupDetailsRequestObject,
) (artifact.GetClientSetupDetailsResponseObject, error) {
regRefParam := r.RegistryRef
imageParam := r.Params.Artifact
versionParam := r.Params.Version
regInfo, _ := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(regRefParam))
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetClientSetupDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetClientSetupDetails403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
reg, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return artifact.GetClientSetupDetails404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "registry doesn't exist with this ref"),
),
}, err
}
packageType := string(reg.PackageType)
response := c.GenerateClientSetupDetails(
ctx, packageType, imageParam, versionParam, regInfo.RegistryRef,
regInfo.RegistryType,
)
if response == nil {
return artifact.GetClientSetupDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "Package type not supported"),
),
}, nil
}
return artifact.GetClientSetupDetails200JSONResponse{
ClientSetupDetailsResponseJSONResponse: *response,
}, nil
}
func (c *APIController) GenerateClientSetupDetails(
ctx context.Context,
packageType string,
image *artifact.ArtifactParam,
version *artifact.VersionParam,
registryRef string,
registryType artifact.RegistryType,
) *artifact.ClientSetupDetailsResponseJSONResponse {
blankString := ""
switch packageType {
case string(artifact.PackageTypeRPM):
return c.generateRpmClientSetupDetail(ctx, image, version, registryRef)
case string(artifact.PackageTypeMAVEN):
return c.generateMavenClientSetupDetail(ctx, image, version, registryRef, registryType)
case string(artifact.PackageTypeHELM):
return c.generateHelmClientSetupDetail(ctx, blankString, registryRef, image, version, registryType)
case string(artifact.PackageTypeGENERIC):
return c.generateGenericClientSetupDetail(ctx, blankString, registryRef, image, version, registryType)
case string(artifact.PackageTypePYTHON):
return c.generatePythonClientSetupDetail(ctx, registryRef, image, version, registryType)
case string(artifact.PackageTypeNPM):
return c.generateNpmClientSetupDetail(ctx, registryRef, image, version, registryType)
case string(artifact.PackageTypeDOCKER):
return c.generateDockerClientSetupDetail(ctx, blankString, registryType, registryRef, image, version)
case string(artifact.PackageTypeNUGET):
return c.generateNugetClientSetupDetail(ctx, registryRef, image, version, registryType)
case string(artifact.PackageTypeGO):
return c.generateGoClientSetupDetail(ctx, registryRef, image, version, registryType)
case string(artifact.PackageTypeHUGGINGFACE):
return c.generateHuggingFaceClientSetupDetail(ctx, registryRef, image, version, registryType)
default:
clientSetupDetails, err := c.PackageWrapper.GetClientSetupDetails(
ctx, registryRef, image, version, registryType, packageType,
)
if err != nil {
log.Error().Ctx(ctx).Err(err).Msg("Failed to get client setup details")
return nil
}
return &artifact.ClientSetupDetailsResponseJSONResponse{
Data: *clientSetupDetails,
Status: artifact.StatusSUCCESS,
}
}
}
func (c *APIController) generateDockerClientSetupDetail(
ctx context.Context,
blankString string,
registryType artifact.RegistryType,
registryRef string,
image *artifact.ArtifactParam,
version *artifact.VersionParam,
) *artifact.ClientSetupDetailsResponseJSONResponse {
session, _ := request.AuthSessionFrom(ctx)
username := session.Principal.Email
var clientSetupDetails artifact.ClientSetupDetails
if auth.IsAnonymousSession(session) {
clientSetupDetails = c.getAnonymousDockerClientSetupDetails(ctx, blankString, registryType)
} else {
clientSetupDetails = c.getDockerClientSetupDetails(ctx, blankString, registryType)
}
c.replacePlaceholders(ctx, &clientSetupDetails.Sections, username, registryRef, image, version, "", "", "")
return &artifact.ClientSetupDetailsResponseJSONResponse{
Data: clientSetupDetails,
Status: artifact.StatusSUCCESS,
}
}
func (c *APIController) getAnonymousDockerClientSetupDetails(
ctx context.Context,
blankString string,
registryType artifact.RegistryType,
) artifact.ClientSetupDetails {
header2 := "Pull an image"
section2step1Header := "Run this Docker command in your terminal to pull image."
var dockerPullValue string
if c.UntaggedImagesEnabled(ctx) {
dockerPullValue = "docker pull <HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>@<DIGEST>"
} else {
dockerPullValue = "docker pull <HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>:<TAG>"
}
section2step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &dockerPullValue},
}
section2step1Type := artifact.ClientSetupStepTypeStatic
section2Steps := []artifact.ClientSetupStep{
{
Header: §ion2step1Header,
Commands: §ion2step1Commands,
Type: §ion2step1Type,
},
}
section2 := artifact.ClientSetupSection{
Header: &header2,
}
_ = section2.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion2Steps,
})
sections := []artifact.ClientSetupSection{
section2,
}
if registryType == artifact.RegistryTypeUPSTREAM {
sections = []artifact.ClientSetupSection{
section2,
}
}
clientSetupDetails := artifact.ClientSetupDetails{
MainHeader: "Docker Client Setup",
SecHeader: "Follow these instructions to install/use Docker artifacts or compatible packages.",
Sections: sections,
}
return clientSetupDetails
}
func (c *APIController) getDockerClientSetupDetails(
ctx context.Context,
blankString string,
registryType artifact.RegistryType,
) artifact.ClientSetupDetails {
loginUsernameLabel := "Username: <USERNAME>"
loginUsernameValue := "<USERNAME>"
loginPasswordLabel := "Password: *see step 2*"
header1 := "Login to Docker"
section1step1Header := "Run this Docker command in your terminal to authenticate the client."
dockerLoginValue := "docker login <LOGIN_HOSTNAME>"
section1step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &dockerLoginValue},
{Label: &loginUsernameLabel, Value: &loginUsernameValue},
{Label: &loginPasswordLabel, Value: &blankString},
}
section1step1Type := artifact.ClientSetupStepTypeStatic
section1step2Header := "For the Password field above, generate an identity token"
section1step2Type := artifact.ClientSetupStepTypeGenerateToken
section1Steps := []artifact.ClientSetupStep{
{
Header: §ion1step1Header,
Commands: §ion1step1Commands,
Type: §ion1step1Type,
},
{
Header: §ion1step2Header,
Type: §ion1step2Type,
},
}
section1 := artifact.ClientSetupSection{
Header: &header1,
}
_ = section1.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion1Steps,
})
header2 := "Pull an image"
section2step1Header := "Run this Docker command in your terminal to pull image."
var dockerPullValue string
if c.UntaggedImagesEnabled(ctx) {
dockerPullValue = "docker pull <HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>@<DIGEST>"
} else {
dockerPullValue = "docker pull <HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>:<TAG>"
}
section2step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &dockerPullValue},
}
section2step1Type := artifact.ClientSetupStepTypeStatic
section2Steps := []artifact.ClientSetupStep{
{
Header: §ion2step1Header,
Commands: §ion2step1Commands,
Type: §ion2step1Type,
},
}
section2 := artifact.ClientSetupSection{
Header: &header2,
}
_ = section2.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion2Steps,
})
header3 := "Retag and Push the image"
section3step1Header := "Run this Docker command in your terminal to tag the image."
var dockerTagValue string
if c.UntaggedImagesEnabled(ctx) {
dockerTagValue = "docker tag <HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>@<DIGEST> " +
"<HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>:<NEW_TAG>"
} else {
dockerTagValue = "docker tag <IMAGE_NAME>:<TAG> <HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>:<TAG>"
}
section3step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &dockerTagValue},
}
section3step1Type := artifact.ClientSetupStepTypeStatic
section3step2Header := "Run this Docker command in your terminal to push the image."
dockerPushValue := "docker push <HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>:<NEW_TAG>"
section3step2Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &dockerPushValue},
}
section3step2Type := artifact.ClientSetupStepTypeStatic
section3Steps := []artifact.ClientSetupStep{
{
Header: §ion3step1Header,
Commands: §ion3step1Commands,
Type: §ion3step1Type,
},
{
Header: §ion3step2Header,
Commands: §ion3step2Commands,
Type: §ion3step2Type,
},
}
section3 := artifact.ClientSetupSection{
Header: &header3,
}
_ = section3.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion3Steps,
})
sections := []artifact.ClientSetupSection{
section1,
section2,
section3,
}
if registryType == artifact.RegistryTypeUPSTREAM {
sections = []artifact.ClientSetupSection{
section1,
section2,
}
}
clientSetupDetails := artifact.ClientSetupDetails{
MainHeader: "Docker Client Setup",
SecHeader: "Follow these instructions to install/use Docker artifacts or compatible packages.",
Sections: sections,
}
return clientSetupDetails
}
//nolint:lll
func (c *APIController) generateGenericClientSetupDetail(
ctx context.Context,
blankString string,
registryRef string,
image *artifact.ArtifactParam,
tag *artifact.VersionParam,
registryType artifact.RegistryType,
) *artifact.ClientSetupDetailsResponseJSONResponse {
session, _ := request.AuthSessionFrom(ctx)
var clientSetupDetails artifact.ClientSetupDetails
if auth.IsAnonymousSession(session) {
clientSetupDetails = c.getAnonymousGenericClientSetupDetails(blankString, registryType)
} else {
clientSetupDetails = c.getGenericClientSetupDetails(blankString, registryType)
}
//nolint:lll
c.replacePlaceholders(ctx, &clientSetupDetails.Sections, "", registryRef, image, tag, "", "",
string(artifact.PackageTypeGENERIC))
return &artifact.ClientSetupDetailsResponseJSONResponse{
Data: clientSetupDetails,
Status: artifact.StatusSUCCESS,
}
}
func (c *APIController) getAnonymousGenericClientSetupDetails(
blankString string,
registryType artifact.RegistryType,
) artifact.ClientSetupDetails {
header3 := "Download Artifact"
//nolint:lll
section3step1Header := "Run this command in your terminal to download the artifact at package level. This command works for non-nested paths."
//nolint:lll
pullValue := "curl --location '<HOSTNAME>/generic/<ARTIFACT_NAME>/<VERSION>?filename=<FILENAME>' " +
"-J -O"
section3step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &pullValue},
}
section3step1Type := artifact.ClientSetupStepTypeStatic
section3steps := []artifact.ClientSetupStep{
{
Header: §ion3step1Header,
Commands: §ion3step1Commands,
Type: §ion3step1Type,
},
}
section3 := artifact.ClientSetupSection{
Header: &header3,
}
_ = section3.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion3steps,
})
header4 := "File Operations (Supports both nested and flat paths)"
section4step2Header := "Download a file from a specific path within the package."
//nolint:lll
fileDownloadValue := "curl --location '<HOSTNAME>/files/<ARTIFACT_NAME>/<VERSION>/<NESTED_FILE_PATH>' -J -O"
section4step2Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &fileDownloadValue},
}
section4step3Header := "Get file metadata from a specific path (HEAD request)."
//nolint:lll
fileHeadValue := "curl --location --head '<HOSTNAME>/files/<ARTIFACT_NAME>/<VERSION>/<NESTED_FILE_PATH>'"
section4step3Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &fileHeadValue},
}
section4step1Type := artifact.ClientSetupStepTypeStatic
section4steps := []artifact.ClientSetupStep{
{
Header: §ion4step2Header,
Commands: §ion4step2Commands,
Type: §ion4step1Type,
},
{
Header: §ion4step3Header,
Commands: §ion4step3Commands,
Type: §ion4step1Type,
},
}
if registryType == artifact.RegistryTypeUPSTREAM {
section4steps = []artifact.ClientSetupStep{
{
Header: §ion4step2Header,
Commands: §ion4step2Commands,
Type: §ion4step1Type,
},
{
Header: §ion4step3Header,
Commands: §ion4step3Commands,
Type: §ion4step1Type,
},
}
}
section4 := artifact.ClientSetupSection{
Header: &header4,
}
_ = section4.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion4steps,
})
sections := []artifact.ClientSetupSection{
section3,
section4,
}
if registryType == artifact.RegistryTypeUPSTREAM {
sections = []artifact.ClientSetupSection{
section3,
section4,
}
}
clientSetupDetails := artifact.ClientSetupDetails{
MainHeader: "Generic Client Setup",
SecHeader: "Follow these instructions to install/use Generic artifacts or compatible packages.",
Sections: sections,
}
return clientSetupDetails
}
func (c *APIController) getGenericClientSetupDetails(
blankString string,
registryType artifact.RegistryType,
) artifact.ClientSetupDetails {
header1 := "Generate identity token"
section1Header := "An identity token will serve as the password for uploading and downloading artifact."
section1Type := artifact.ClientSetupStepTypeGenerateToken
section1steps := []artifact.ClientSetupStep{
{
Header: §ion1Header,
Type: §ion1Type,
},
}
section1 := artifact.ClientSetupSection{
Header: &header1,
}
_ = section1.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion1steps,
})
header2 := "Upload Artifact"
//nolint:lll
section2step1Header := "Run this curl command in your terminal to push the artifact at package level. This command works for non-nested paths."
//nolint:lll
pushValue := "curl --location --request PUT '<HOSTNAME>/generic/<ARTIFACT_NAME>/<VERSION>' \\\n--form 'filename=\"<FILENAME>\"' \\\n--form 'file=@\"<FILE_PATH>\"' \\\n--form 'description=\"<DESC>\"' \\\n--header '<AUTH_HEADER_PREFIX> <API_KEY>'"
section2step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &pushValue},
}
section2step1Type := artifact.ClientSetupStepTypeStatic
section2steps := []artifact.ClientSetupStep{
{
Header: §ion2step1Header,
Commands: §ion2step1Commands,
Type: §ion2step1Type,
},
}
section2 := artifact.ClientSetupSection{
Header: &header2,
}
_ = section2.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion2steps,
})
header3 := "Download Artifact"
//nolint:lll
section3step1Header := "Run this command in your terminal to download the artifact at package level. This command works for non-nested paths."
//nolint:lll
pullValue := "curl --location '<HOSTNAME>/generic/<ARTIFACT_NAME>/<VERSION>?filename=<FILENAME>' \\\n --header '<AUTH_HEADER_PREFIX> <API_KEY>' " +
"-J -O"
section3step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &pullValue},
}
section3step1Type := artifact.ClientSetupStepTypeStatic
section3steps := []artifact.ClientSetupStep{
{
Header: §ion3step1Header,
Commands: §ion3step1Commands,
Type: §ion3step1Type,
},
}
section3 := artifact.ClientSetupSection{
Header: &header3,
}
_ = section3.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion3steps,
})
header4 := "File Operations (Supports both nested and flat paths)"
section4step1Header := "Upload a file to a specific path within the package."
//nolint:lll
fileUploadValue := "curl -XPUT '<HOSTNAME>/files/<ARTIFACT_NAME>/<VERSION>/<NESTED_FILE_PATH>' \\\n--header '<AUTH_HEADER_PREFIX> <API_KEY>' -T '<FILE_PATH>'"
section4step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &fileUploadValue},
}
section4step2Header := "Download a file from a specific path within the package."
//nolint:lll
fileDownloadValue := "curl --location '<HOSTNAME>/files/<ARTIFACT_NAME>/<VERSION>/<NESTED_FILE_PATH>' --header '<AUTH_HEADER_PREFIX> <API_KEY>' -J -O"
section4step2Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &fileDownloadValue},
}
section4step3Header := "Get file metadata from a specific path (HEAD request)."
//nolint:lll
fileHeadValue := "curl --location --head '<HOSTNAME>/files/<ARTIFACT_NAME>/<VERSION>/<NESTED_FILE_PATH>' --header '<AUTH_HEADER_PREFIX> <API_KEY>'"
section4step3Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &fileHeadValue},
}
section4step4Header := "Delete a file from a specific path within the package."
//nolint:lll
fileDeleteValue := "curl --location --request DELETE '<HOSTNAME>/files/<ARTIFACT_NAME>/<VERSION>/<NESTED_FILE_PATH>' --header '<AUTH_HEADER_PREFIX> <API_KEY>'"
section4step4Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &fileDeleteValue},
}
section4step4UpstreamHeader := "Delete a file from a specific path within the package (only deletes cached file)."
section4step1Type := artifact.ClientSetupStepTypeStatic
section4steps := []artifact.ClientSetupStep{
{
Header: §ion4step1Header,
Commands: §ion4step1Commands,
Type: §ion4step1Type,
},
{
Header: §ion4step2Header,
Commands: §ion4step2Commands,
Type: §ion4step1Type,
},
{
Header: §ion4step3Header,
Commands: §ion4step3Commands,
Type: §ion4step1Type,
},
{
Header: §ion4step4Header,
Commands: §ion4step4Commands,
Type: §ion4step1Type,
},
}
if registryType == artifact.RegistryTypeUPSTREAM {
section4steps = []artifact.ClientSetupStep{
{
Header: §ion4step2Header,
Commands: §ion4step2Commands,
Type: §ion4step1Type,
},
{
Header: §ion4step3Header,
Commands: §ion4step3Commands,
Type: §ion4step1Type,
},
{
Header: §ion4step4UpstreamHeader,
Commands: §ion4step4Commands,
Type: §ion4step1Type,
},
}
}
section4 := artifact.ClientSetupSection{
Header: &header4,
}
_ = section4.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion4steps,
})
sections := []artifact.ClientSetupSection{
section1,
section2,
section3,
section4,
}
if registryType == artifact.RegistryTypeUPSTREAM {
sections = []artifact.ClientSetupSection{
section1,
section3,
section4,
}
}
clientSetupDetails := artifact.ClientSetupDetails{
MainHeader: "Generic Client Setup",
SecHeader: "Follow these instructions to install/use Generic artifacts or compatible packages.",
Sections: sections,
}
return clientSetupDetails
}
//nolint:lll
func (c *APIController) generateHelmClientSetupDetail(
ctx context.Context,
blankString string,
registryRef string,
image *artifact.ArtifactParam,
tag *artifact.VersionParam,
registryType artifact.RegistryType,
) *artifact.ClientSetupDetailsResponseJSONResponse {
session, _ := request.AuthSessionFrom(ctx)
username := session.Principal.Email
loginUsernameLabel := "Username: <USERNAME>"
loginUsernameValue := "<USERNAME>"
loginPasswordLabel := "Password: *see step 2*"
var clientSetupDetails artifact.ClientSetupDetails
if auth.IsAnonymousSession(session) {
clientSetupDetails = c.getAnonymousHelmClientSetupDetails(ctx, blankString, registryType)
} else {
clientSetupDetails = c.getHelmClientSetupDetails(ctx, blankString,
loginUsernameLabel, loginUsernameValue, loginPasswordLabel, registryType)
}
c.replacePlaceholders(ctx, &clientSetupDetails.Sections, username,
registryRef, image, tag, "", "", "")
return &artifact.ClientSetupDetailsResponseJSONResponse{
Data: clientSetupDetails,
Status: artifact.StatusSUCCESS,
}
}
func (c *APIController) getAnonymousHelmClientSetupDetails(
ctx context.Context,
blankString string,
registryType artifact.RegistryType,
) artifact.ClientSetupDetails {
header3 := "Pull a version"
section3step1Header := "Run this Helm command in your terminal to pull a specific chart version."
var helmPullValue string
if c.UntaggedImagesEnabled(ctx) {
helmPullValue = "helm pull oci://<HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>@<DIGEST>"
} else {
helmPullValue = "helm pull oci://<HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME> --version <TAG>"
}
section3step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &helmPullValue},
}
section3step1Type := artifact.ClientSetupStepTypeStatic
section3Steps := []artifact.ClientSetupStep{
{
Header: §ion3step1Header,
Commands: §ion3step1Commands,
Type: §ion3step1Type,
},
}
section3 := artifact.ClientSetupSection{
Header: &header3,
}
_ = section3.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion3Steps,
})
sections := []artifact.ClientSetupSection{
section3,
}
if registryType == artifact.RegistryTypeUPSTREAM {
sections = []artifact.ClientSetupSection{
section3,
}
}
clientSetupDetails := artifact.ClientSetupDetails{
MainHeader: "Helm Client Setup",
SecHeader: "Follow these instructions to install/use Helm artifacts or compatible packages.",
Sections: sections,
}
return clientSetupDetails
}
func (c *APIController) getHelmClientSetupDetails(
ctx context.Context,
blankString string,
loginUsernameLabel string,
loginUsernameValue string,
loginPasswordLabel string,
registryType artifact.RegistryType,
) artifact.ClientSetupDetails {
header1 := "Login to Helm"
section1step1Header := "Run this Helm command in your terminal to authenticate the client."
helmLoginValue := "helm registry login <LOGIN_HOSTNAME>"
section1step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &helmLoginValue},
{Label: &loginUsernameLabel, Value: &loginUsernameValue},
{Label: &loginPasswordLabel, Value: &blankString},
}
section1step1Type := artifact.ClientSetupStepTypeStatic
section1step2Header := "For the Password field above, generate an identity token"
section1step2Type := artifact.ClientSetupStepTypeGenerateToken
section1Steps := []artifact.ClientSetupStep{
{
Header: §ion1step1Header,
Commands: §ion1step1Commands,
Type: §ion1step1Type,
},
{
Header: §ion1step2Header,
Type: §ion1step2Type,
},
}
section1 := artifact.ClientSetupSection{
Header: &header1,
}
_ = section1.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion1Steps,
})
header2 := "Push a version"
section2step1Header := "Run this Helm push command in your terminal to push a chart in OCI form." +
" Note: Make sure you add oci:// prefix to the repository URL."
helmPushValue := "helm push <CHART_TGZ_FILE> oci://<HOSTNAME>/<REGISTRY_NAME>"
section2step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &helmPushValue},
}
section2step1Type := artifact.ClientSetupStepTypeStatic
section2Steps := []artifact.ClientSetupStep{
{
Header: §ion2step1Header,
Commands: §ion2step1Commands,
Type: §ion2step1Type,
},
}
section2 := artifact.ClientSetupSection{
Header: &header2,
}
_ = section2.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion2Steps,
})
header3 := "Pull a version"
section3step1Header := "Run this Helm command in your terminal to pull a specific chart version."
var helmPullValue string
if c.UntaggedImagesEnabled(ctx) {
helmPullValue = "helm pull oci://<HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME>@<DIGEST>"
} else {
helmPullValue = "helm pull oci://<HOSTNAME>/<REGISTRY_NAME>/<IMAGE_NAME> --version <TAG>"
}
section3step1Commands := []artifact.ClientSetupStepCommand{
{Label: &blankString, Value: &helmPullValue},
}
section3step1Type := artifact.ClientSetupStepTypeStatic
section3Steps := []artifact.ClientSetupStep{
{
Header: §ion3step1Header,
Commands: §ion3step1Commands,
Type: §ion3step1Type,
},
}
section3 := artifact.ClientSetupSection{
Header: &header3,
}
_ = section3.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: §ion3Steps,
})
sections := []artifact.ClientSetupSection{
section1,
section2,
section3,
}
if registryType == artifact.RegistryTypeUPSTREAM {
sections = []artifact.ClientSetupSection{
section1,
section3,
}
}
clientSetupDetails := artifact.ClientSetupDetails{
MainHeader: "Helm Client Setup",
SecHeader: "Follow these instructions to install/use Helm artifacts or compatible packages.",
Sections: sections,
}
return clientSetupDetails
}
// TODO: Remove StringPtr / see why it is used.
func (c *APIController) generateMavenClientSetupDetail(
ctx context.Context,
artifactName *artifact.ArtifactParam,
version *artifact.VersionParam,
registryRef string,
registryType artifact.RegistryType,
) *artifact.ClientSetupDetailsResponseJSONResponse {
staticStepType := artifact.ClientSetupStepTypeStatic
generateTokenStepType := artifact.ClientSetupStepTypeGenerateToken
session, _ := request.AuthSessionFrom(ctx)
username := session.Principal.Email
var clientSetupDetails artifact.ClientSetupDetails
if auth.IsAnonymousSession(session) {
clientSetupDetails = c.getAnonymousMavenClientSetupDetails(staticStepType)
} else {
clientSetupDetails = c.getMavenClientSetupDetails(generateTokenStepType, staticStepType, registryType)
}
groupID := ""
if artifactName != nil {
parts := strings.Split(string(*artifactName), ":")
if len(parts) == 2 {
groupID = parts[0]
*artifactName = artifact.ArtifactParam(parts[1])
}
}
registryURL := c.URLProvider.PackageURL(ctx, registryRef, "maven")
//nolint:lll
c.replacePlaceholders(ctx, &clientSetupDetails.Sections, username, registryRef, artifactName, version, registryURL,
groupID, "")
return &artifact.ClientSetupDetailsResponseJSONResponse{
Data: clientSetupDetails,
Status: artifact.StatusSUCCESS,
}
}
func (c *APIController) getAnonymousMavenClientSetupDetails(
staticStepType artifact.ClientSetupStepType,
) artifact.ClientSetupDetails {
mavenSection1 := artifact.ClientSetupSection{
Header: utils.StringPtr("1. Pull a Maven Package"),
SecHeader: utils.StringPtr("Set default repository in your pom.xml file."),
}
_ = mavenSection1.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: &[]artifact.ClientSetupStep{
{
Header: utils.StringPtr("To set default registry in your pom.xml file by adding the following:"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
//nolint:lll
Value: utils.StringPtr("<repositories>\n <repository>\n <id>maven-dev</id>\n <url><REGISTRY_URL></url>\n <releases>\n <enabled>true</enabled>\n <updatePolicy>always</updatePolicy>\n </releases>\n <snapshots>\n <enabled>true</enabled>\n <updatePolicy>always</updatePolicy>\n </snapshots>\n </repository>\n</repositories>"),
},
},
},
{
//nolint:lll
Header: utils.StringPtr("Add a dependency to the project's pom.xml (replace <GROUP_ID>, <ARTIFACT_ID> & <VERSION> with your own):"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
//nolint:lll
Value: utils.StringPtr("<dependency>\n <groupId><GROUP_ID></groupId>\n <artifactId><ARTIFACT_ID></artifactId>\n <version><VERSION></version>\n</dependency>"),
},
},
},
{
Header: utils.StringPtr("Install dependencies in pom.xml file"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
Value: utils.StringPtr("mvn install"),
},
},
},
},
})
gradleSection1 := artifact.ClientSetupSection{
Header: utils.StringPtr("1. Pull a Gradle Package"),
SecHeader: utils.StringPtr("Set default repository in your build.gradle file."),
}
_ = gradleSection1.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: &[]artifact.ClientSetupStep{
{
//nolint:lll
Header: utils.StringPtr("Set the default registry in your project’s build.gradle by adding the following:"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
//nolint:lll
Value: utils.StringPtr("repositories{\n maven{\n url \"<REGISTRY_URL>\"\n\n }\n}"),
},
},
},
{
Header: utils.StringPtr("Add a dependency to the project’s build.gradle"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
Value: utils.StringPtr("dependencies {\n implementation '<GROUP_ID>:<ARTIFACT_ID>:<VERSION>'\n}"),
},
},
},
{
Header: utils.StringPtr("Install dependencies in build.gradle file"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
Value: utils.StringPtr("gradlew build // Linux or OSX\n gradlew.bat build // Windows"),
},
},
},
},
})
sbtSection1 := artifact.ClientSetupSection{
Header: utils.StringPtr("1. Pull a Sbt/Scala Package"),
SecHeader: utils.StringPtr("Set default repository in your build.sbt file."),
}
_ = sbtSection1.FromClientSetupStepConfig(artifact.ClientSetupStepConfig{
Steps: &[]artifact.ClientSetupStep{
{
//nolint:lll
Header: utils.StringPtr("Set the default registry in your project’s build.sbt by adding the following:"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
//nolint:lll
Value: utils.StringPtr("resolver += \"Harness Registry\" at \"<REGISTRY_URL>\"\n"),
},
},
},
{
Header: utils.StringPtr("Add a dependency to the project’s build.sbt"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
//nolint:lll
Value: utils.StringPtr("libraryDependencies += \"<GROUP_ID>\" % \"<ARTIFACT_ID>\" % \"<VERSION>\""),
},
},
},
{
Header: utils.StringPtr("Install dependencies in build.sbt file"),
Type: &staticStepType,
Commands: &[]artifact.ClientSetupStepCommand{
{
Value: utils.StringPtr("sbt update"),
},
},
},
},
})
section2 := artifact.ClientSetupSection{}
config := artifact.TabSetupStepConfig{
Tabs: &[]artifact.TabSetupStep{
{
Header: utils.StringPtr("Maven"),
Sections: &[]artifact.ClientSetupSection{
mavenSection1,
},
},
{
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | true |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_docker_details.go | registry/app/api/controller/metadata/get_artifacts_docker_details.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
store2 "github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetDockerArtifactDetails(
ctx context.Context,
r artifact.GetDockerArtifactDetailsRequestObject,
) (artifact.GetDockerArtifactDetailsResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.GetDockerArtifactDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetDockerArtifactDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetDockerArtifactDetails403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
image := string(r.Artifact)
version := string(r.Version)
manifestDigest := string(r.Params.Digest)
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return artifact.GetDockerArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
dgst, err := types.NewDigest(digest.Digest(manifestDigest))
if err != nil {
return getArtifactDetailsErrResponse(ctx, err)
}
art, err := c.ArtifactStore.GetArtifactMetadata(ctx, registry.ParentID, registry.Name, image, dgst.String(),
nil)
if err != nil {
return getArtifactDetailsErrResponse(ctx, err)
}
m, err := c.ManifestStore.FindManifestByDigest(ctx, registry.ID, image, dgst)
if err != nil {
if errors.Is(err, store2.ErrResourceNotFound) {
return getArtifactDetailsErrResponse(ctx, fmt.Errorf("manifest not found"))
}
return getArtifactDetailsErrResponse(ctx, err)
}
quarantineArtifacts, err := c.QuarantineArtifactRepository.GetByFilePath(ctx, "",
regInfo.RegistryID, image, dgst.String(), nil)
if err != nil {
return getArtifactDetailsErrResponse(ctx, err)
}
var isQuarantined bool
var quarantineReason *string
if len(quarantineArtifacts) > 0 {
isQuarantined = true
quarantineReason = &quarantineArtifacts[0].Reason
}
//nolint:nestif
if c.UntaggedImagesEnabled(ctx) && !isDockerVersionTag(r) {
dockerArtifactDetails := GetDockerArtifactDetails(
registry, m.ImageName, m.Digest.String(), m.CreatedAt, m.CreatedAt, m.Digest.String(), m.TotalSize,
c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, registry.Name),
art.DownloadCount, isQuarantined, quarantineReason,
)
pullCommandByDigest := GetDockerPullCommand(m.ImageName, m.Digest.String(),
c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, registry.Name), false,
)
dockerArtifactDetails.Data.PullCommandByDigest = &pullCommandByDigest
tags, err := c.TagStore.GetTagsByManifestID(ctx, m.ID)
if err != nil {
return getArtifactDetailsErrResponse(ctx, err)
}
if tags != nil {
dockerArtifactDetails.Data.Metadata = &artifact.ArtifactEntityMetadata{
"tags": tags,
}
}
return artifact.GetDockerArtifactDetails200JSONResponse{
DockerArtifactDetailResponseJSONResponse: *dockerArtifactDetails,
}, nil
}
tag, err := c.TagStore.GetTagDetail(ctx, registry.ID, image, version)
if err != nil {
return getArtifactDetailsErrResponse(ctx, err)
}
dockerArtifactDetails := GetDockerArtifactDetails(
registry, tag.ImageName, tag.Name, tag.CreatedAt, tag.UpdatedAt, m.Digest.String(), m.TotalSize,
c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, registry.Name),
art.DownloadCount, isQuarantined, quarantineReason,
)
pullCommandByTag := GetDockerPullCommand(tag.ImageName, tag.Name, c.URLProvider.RegistryURL(
ctx, regInfo.RootIdentifier, registry.Name), true,
)
dockerArtifactDetails.Data.PullCommand = &pullCommandByTag
if c.UntaggedImagesEnabled(ctx) {
pullCommandByDigest := GetDockerPullCommand(m.ImageName, m.Digest.String(),
c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, registry.Name),
false,
)
dockerArtifactDetails.Data.PullCommandByDigest = &pullCommandByDigest
}
return artifact.GetDockerArtifactDetails200JSONResponse{
DockerArtifactDetailResponseJSONResponse: *dockerArtifactDetails,
}, nil
}
func getArtifactDetailsErrResponse(
ctx context.Context,
err error,
) (artifact.GetDockerArtifactDetailsResponseObject, error) {
log.Error().Ctx(ctx).Msgf("error while getting artifact details: %v", err)
return artifact.GetDockerArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
func isDockerVersionTag(r artifact.GetDockerArtifactDetailsRequestObject) bool {
return r.Params.VersionType != nil && *r.Params.VersionType == artifact.GetDockerArtifactDetailsParamsVersionTypeTAG
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_registry_artifacts.go | registry/app/api/controller/metadata/get_registry_artifacts.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetAllArtifactsByRegistry(
ctx context.Context,
r artifact.GetAllArtifactsByRegistryRequestObject,
) (artifact.GetAllArtifactsByRegistryResponseObject, error) {
registryRequestParams := &RegistryRequestParams{
packageTypesParam: nil,
page: r.Params.Page,
size: r.Params.Size,
search: r.Params.SearchTerm,
Resource: ArtifactResource,
ParentRef: "",
RegRef: string(r.RegistryRef),
labelsParam: nil,
sortOrder: r.Params.SortOrder,
sortField: r.Params.SortField,
registryIDsParam: nil,
}
regInfo, err := c.GetRegistryRequestInfo(ctx, *registryRequestParams)
if err != nil {
return c.getAllArtifactsByRegistry400JsonResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetAllArtifactsByRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetAllArtifactsByRegistry403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
// Validate pagination parameters
if regInfo.limit < 0 || regInfo.offset < 0 {
return artifact.GetAllArtifactsByRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "page and size must be non-negative"),
),
}, nil
}
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, space.ID, regInfo.RegistryIdentifier)
if err != nil {
return artifact.GetAllArtifactsByRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var artifacts *[]types.ArtifactMetadata
var count int64
var artifactType *artifact.ArtifactType
if r.Params.ArtifactType != nil {
artifactType, err = ValidateAndGetArtifactType(registry.PackageType, string(*r.Params.ArtifactType))
if err != nil {
return artifact.GetAllArtifactsByRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
}
//nolint:nestif
if registry.PackageType == artifact.PackageTypeDOCKER || registry.PackageType == artifact.PackageTypeHELM {
artifacts, err = c.TagStore.GetAllArtifactsByRepo(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
regInfo.sortByField, regInfo.sortByOrder, regInfo.limit, regInfo.offset, regInfo.searchTerm, regInfo.labels,
)
count, _ = c.TagStore.CountAllArtifactsByRepo(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
regInfo.searchTerm, regInfo.labels,
)
if err != nil {
return artifact.GetAllArtifactsByRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
} else {
artifacts, err = c.ArtifactStore.GetArtifactsByRepo(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
regInfo.sortByField, regInfo.sortByOrder, regInfo.limit, regInfo.offset, regInfo.searchTerm, regInfo.labels,
artifactType)
count, _ = c.ArtifactStore.CountArtifactsByRepo(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
regInfo.searchTerm, regInfo.labels, artifactType)
if err != nil {
return artifact.GetAllArtifactsByRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
}
artifacts, err = c.enrichArtifactWithQuarantineInfo(ctx, artifacts, registry.ID)
if err != nil {
log.Ctx(ctx).Error().Err(err).Msg("failed to fetch the quarantine info for artifacts")
return artifact.GetAllArtifactsByRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.GetAllArtifactsByRegistry200JSONResponse{
ListRegistryArtifactResponseJSONResponse: *GetAllArtifactByRegistryResponse(
artifacts, count, regInfo.pageNumber, regInfo.limit,
),
}, nil
}
func (c *APIController) enrichArtifactWithQuarantineInfo(
ctx context.Context,
artifacts *[]types.ArtifactMetadata,
registryID int64,
) (*[]types.ArtifactMetadata, error) {
if artifacts == nil || len(*artifacts) == 0 {
return artifacts, nil
}
// Collect unique image names
imageNameMap := make(map[string]bool)
var imageNames []string
for _, artifact := range *artifacts {
if !imageNameMap[artifact.Name] {
imageNameMap[artifact.Name] = true
imageNames = append(imageNames, artifact.Name)
}
}
// Get quarantine status for all images
quarantineStatuses, err := c.TagStore.GetQuarantineStatusForImages(ctx, imageNames, registryID)
if err != nil {
return nil, err
}
// Create a map of image name to quarantine status
quarantineStatusMap := make(map[string]bool)
for i, imageName := range imageNames {
if i < len(quarantineStatuses) {
quarantineStatusMap[imageName] = quarantineStatuses[i]
}
}
// Enrich artifacts with quarantine information
for i := range *artifacts {
artifact := &(*artifacts)[i]
if isQuarantined, exists := quarantineStatusMap[artifact.Name]; exists {
artifact.IsQuarantined = isQuarantined
} else {
artifact.IsQuarantined = false
}
}
return artifacts, nil
}
func (c *APIController) getAllArtifactsByRegistry400JsonResponse(err error) (
artifact.GetAllArtifactsByRegistryResponseObject, error,
) {
return artifact.GetAllArtifactsByRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_versions.go | registry/app/api/controller/metadata/get_artifacts_versions.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
ml "github.com/harness/gitness/registry/app/manifest/manifestlist"
os "github.com/harness/gitness/registry/app/manifest/ocischema"
s2 "github.com/harness/gitness/registry/app/manifest/schema2"
"github.com/harness/gitness/registry/app/pkg/docker"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetAllArtifactVersions(
ctx context.Context,
r artifact.GetAllArtifactVersionsRequestObject,
) (artifact.GetAllArtifactVersionsResponseObject, error) {
registryRequestParams := &RegistryRequestParams{
packageTypesParam: nil,
page: r.Params.Page,
size: r.Params.Size,
search: r.Params.SearchTerm,
Resource: ArtifactVersionResource,
ParentRef: "",
RegRef: string(r.RegistryRef),
labelsParam: nil,
sortOrder: r.Params.SortOrder,
sortField: r.Params.SortField,
registryIDsParam: nil,
}
regInfo, _ := c.GetRegistryRequestInfo(ctx, *registryRequestParams)
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetAllArtifactVersions400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetAllArtifactVersions403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
// Validate pagination parameters
if regInfo.limit < 0 || regInfo.offset < 0 {
return artifact.GetAllArtifactVersions400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "page and size must be non-negative"),
),
}, nil
}
image := string(r.Artifact)
registry, err := c.RegistryRepository.Get(ctx, regInfo.RegistryID)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetAllArtifactVersions404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, err.Error()),
),
}, nil
}
return throw500Error(err)
}
var artifactType *artifact.ArtifactType
if r.Params.ArtifactType != nil {
artifactType, err = ValidateAndGetArtifactType(registry.PackageType, string(*r.Params.ArtifactType))
if err != nil {
return artifact.GetAllArtifactVersions400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
}
img, err := c.ImageStore.GetByNameAndType(ctx, registry.ID, image, artifactType)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetAllArtifactVersions404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, err.Error()),
),
}, nil
}
return throw500Error(err)
}
//nolint:nestif
if registry.PackageType == artifact.PackageTypeDOCKER || registry.PackageType == artifact.PackageTypeHELM {
var ociVersions *[]types.OciVersionMetadata
if c.UntaggedImagesEnabled(ctx) {
ociVersions, err = c.TagStore.GetAllOciVersionsByRepoAndImage(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
image, regInfo.sortByField, regInfo.sortByOrder, regInfo.limit, regInfo.offset, regInfo.searchTerm,
)
} else {
ociVersions, err = c.TagStore.GetAllTagsByRepoAndImage(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
image, regInfo.sortByField, regInfo.sortByOrder, regInfo.limit, regInfo.offset, regInfo.searchTerm,
)
}
if err != nil {
return throw500Error(err)
}
var digests []string
for _, ociVersion := range *ociVersions {
if ociVersion.Digest != "" {
digests = append(digests, ociVersion.Digest)
}
}
counts, err := c.DownloadStatRepository.GetTotalDownloadsForManifests(ctx, digests, img.ID)
if err != nil {
return throw500Error(err)
}
err = c.updateQuarantineInfo(ctx, ociVersions, image, registry.Name, registry.ParentID)
if err != nil {
return throw500Error(err)
}
for i, ociVersion := range *ociVersions {
if ociVersion.Digest != "" {
(*ociVersions)[i].DownloadCount = counts[ociVersion.Digest]
}
}
var count int64
if c.UntaggedImagesEnabled(ctx) {
count, err = c.TagStore.CountOciVersionByRepoAndImage(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
image, regInfo.searchTerm,
)
if err != nil {
return throw500Error(err)
}
} else {
count, err = c.TagStore.CountAllTagsByRepoAndImage(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
image, regInfo.searchTerm,
)
if err != nil {
return throw500Error(err)
}
}
err = setDigestCount(ctx, *ociVersions)
if err != nil {
return throw500Error(err)
}
return artifact.GetAllArtifactVersions200JSONResponse{
ListArtifactVersionResponseJSONResponse: *GetAllArtifactVersionResponse(
ctx, ociVersions, image, count, regInfo.pageNumber, regInfo.limit,
c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, regInfo.RegistryIdentifier),
c.SetupDetailsAuthHeaderPrefix, c.UntaggedImagesEnabled(ctx),
),
}, nil
}
metadata, err := c.ArtifactStore.GetAllVersionsByRepoAndImage(ctx, regInfo.RegistryID, image,
regInfo.sortByField, regInfo.sortByOrder, regInfo.limit, regInfo.offset,
regInfo.searchTerm, artifactType)
if err != nil {
return throw500Error(err)
}
cnt, _ := c.ArtifactStore.CountAllVersionsByRepoAndImage(ctx, regInfo.ParentID, regInfo.RegistryIdentifier, image,
regInfo.searchTerm, artifactType)
registryURL := c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, regInfo.RegistryIdentifier)
if registry.PackageType == artifact.PackageTypeGENERIC {
registryURL = c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier,
strings.ToLower(string(registry.PackageType)), regInfo.RegistryIdentifier)
}
return artifact.GetAllArtifactVersions200JSONResponse{
ListArtifactVersionResponseJSONResponse: *GetNonOCIAllArtifactVersionResponse(
ctx, metadata, image, cnt, regInfo.pageNumber, regInfo.limit, registryURL,
c.SetupDetailsAuthHeaderPrefix, string(registry.PackageType), c.PackageWrapper,
registry.UUID,
),
}, nil
}
func (c *APIController) updateQuarantineInfo(
ctx context.Context,
versions *[]types.OciVersionMetadata,
image string,
regName string,
parentID int64,
) error {
if versions == nil || len(*versions) == 0 {
return nil
}
// Collect all artifact identifiers for quarantine lookup
artifactIdentifiers := make([]types.ArtifactIdentifier, 0, len(*versions))
artifactIndexMap := make(map[types.ArtifactIdentifier]int)
for i, version := range *versions {
// Only process versions that have a digest
if version.Digest != "" {
artifactID := types.ArtifactIdentifier{
Name: image,
Version: version.Digest,
RegistryName: regName,
}
artifactIdentifiers = append(artifactIdentifiers, artifactID)
artifactIndexMap[artifactID] = i
}
}
// Get quarantine information for all versions using the existing tag store method
quarantineMap, err := c.TagStore.GetQuarantineInfoForArtifacts(ctx, artifactIdentifiers, parentID)
if err != nil {
return err
}
// Update versions with quarantine information
for artifactID, quarantineInfo := range quarantineMap {
if index, exists := artifactIndexMap[artifactID]; exists {
(*versions)[index].IsQuarantined = true
(*versions)[index].QuarantineReason = quarantineInfo.Reason
}
}
return nil
}
func setDigestCount(ctx context.Context, tags []types.OciVersionMetadata) error {
for i := range tags {
err := setDigestCountInTagMetadata(ctx, &tags[i])
if err != nil {
return err
}
}
return nil
}
//nolint:unused // kept for potential future use
func setDigestCountInTagMetadata(ctx context.Context, v *types.OciVersionMetadata) error {
m := types.Manifest{
SchemaVersion: v.SchemaVersion,
MediaType: v.MediaType,
NonConformant: v.NonConformant,
Payload: v.Payload,
}
manifest, err := docker.DBManifestToManifest(&m)
if err != nil {
log.Ctx(ctx).Error().Stack().Err(err).Msg("Failed to convert DBManifest to Manifest")
return err
}
switch reqManifest := manifest.(type) {
case *s2.DeserializedManifest, *os.DeserializedManifest:
v.DigestCount = 1
case *ml.DeserializedManifestList:
v.DigestCount = len(reqManifest.Manifests)
default:
err = fmt.Errorf("unknown manifest type: %T", manifest)
log.Ctx(ctx).Error().Stack().Err(err).Msg("Failed to set digest count")
}
return nil
}
//nolint:unused,unparam // kept for potential future use
func throw500Error(err error) (artifact.GetAllArtifactVersionsResponseObject, error) {
wrappedErr := fmt.Errorf("internal server error: %w", err)
return artifact.GetAllArtifactVersions500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, wrappedErr.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/update_webhook.go | registry/app/api/controller/metadata/update_webhook.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) UpdateWebhook(
ctx context.Context,
r api.UpdateWebhookRequestObject,
) (api.UpdateWebhookResponseObject, error) {
webhookRequest := api.WebhookRequest(*r.Body)
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return updateWebhookInternalErrorResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return updateWebhookInternalErrorResponse(err)
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryEdit)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
log.Ctx(ctx).Error().Msgf("permission check failed while updating webhook for registry: %s, error: %v",
regInfo.RegistryIdentifier, err)
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return api.UpdateWebhook401JSONResponse{
UnauthenticatedJSONResponse: api.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return api.UpdateWebhook403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
existingWebhook, err := c.WebhooksRepository.GetByRegistryAndIdentifier(ctx,
regInfo.RegistryID, webhookRequest.Identifier)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return api.UpdateWebhook404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, fmt.Sprintf("webhook '%s' not found", webhookRequest.Identifier)),
),
}, nil
}
log.Ctx(ctx).Error().Msgf("failed to get existing webhook: %s with error: %v",
webhookRequest.Identifier, err)
return updateWebhookInternalErrorResponse(fmt.Errorf("failed to get existing webhook"))
}
if existingWebhook.Type == enum.WebhookTypeInternal {
return updateWebhookBadRequestErrorResponse(fmt.Errorf("cannot edit internal webhook: %s",
webhookRequest.Identifier))
}
webhook, err := c.RegistryMetadataHelper.MapToWebhookCore(ctx, webhookRequest, regInfo)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to update webhook: %s with error: %v", webhookRequest.Identifier, err)
return updateWebhookBadRequestErrorResponse(fmt.Errorf("failed to update webhook"))
}
webhook.Identifier = string(r.WebhookIdentifier)
err = c.WebhooksRepository.Update(ctx, webhook)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to update webhook: %s for registry: %s with error: %v",
webhookRequest.Identifier, regInfo.RegistryRef, err)
return updateWebhookBadRequestErrorResponse(fmt.Errorf("failed to update webhook"))
}
updatedWebhook, err := c.WebhooksRepository.GetByRegistryAndIdentifier(
ctx, regInfo.RegistryID, webhookRequest.Identifier,
)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to get updated webhook: %s with error: %v",
webhookRequest.Identifier, err)
return updateWebhookInternalErrorResponse(fmt.Errorf("failed to get updated webhook"))
}
webhookResponseEntity, err := c.RegistryMetadataHelper.MapToWebhookResponseEntity(ctx, updatedWebhook)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to get updated webhook: %s with error: %v",
webhookRequest.Identifier, err)
return updateWebhookInternalErrorResponse(fmt.Errorf("failed to get updated webhook"))
}
return api.UpdateWebhook201JSONResponse{
WebhookResponseJSONResponse: api.WebhookResponseJSONResponse{
Data: *webhookResponseEntity,
Status: api.StatusSUCCESS,
},
}, nil
}
func updateWebhookInternalErrorResponse(err error) (api.UpdateWebhookResponseObject, error) {
return api.UpdateWebhook500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
func updateWebhookBadRequestErrorResponse(err error) (api.UpdateWebhookResponseObject, error) {
return api.UpdateWebhook400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_versions_test.go | registry/app/api/controller/metadata/get_artifacts_versions_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata_test
import (
"context"
"encoding/json"
"net/http"
"os"
"path/filepath"
"testing"
"time"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/controller/mocks"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
"github.com/stretchr/testify/require"
)
// TestGetAllArtifactVersions tests the GetAllArtifactVersions endpoint for various package types.
//
// Note: Docker and Helm tests require TagRepository with correct mock signatures - skipped for now.
// Testing non-OCI package types and error scenarios.
func TestGetAllArtifactVersions(t *testing.T) {
tests := []struct {
name string
packageType artifact.PackageType
setupMocks func() *metadata.APIController
expectedResp any
}{
// Docker and Helm require TagRepository mocks - skipped
// {name: "docker_versions_success", packageType: artifact.PackageTypeDOCKER, ...},
// {name: "helm_versions_success", packageType: artifact.PackageTypeHELM, ...},
{
name: "maven_versions_success",
packageType: artifact.PackageTypeMAVEN,
setupMocks: func() *metadata.APIController {
return setupVersionsController(t, artifact.PackageTypeMAVEN)
},
expectedResp: artifact.GetAllArtifactVersions200JSONResponse{},
},
{
name: "generic_versions_success",
packageType: artifact.PackageTypeGENERIC,
setupMocks: func() *metadata.APIController {
return setupVersionsController(t, artifact.PackageTypeGENERIC)
},
expectedResp: artifact.GetAllArtifactVersions200JSONResponse{},
},
{
name: "python_versions_success",
packageType: artifact.PackageTypePYTHON,
setupMocks: func() *metadata.APIController {
return setupVersionsController(t, artifact.PackageTypePYTHON)
},
expectedResp: artifact.GetAllArtifactVersions200JSONResponse{},
},
{
name: "npm_versions_success",
packageType: artifact.PackageTypeNPM,
setupMocks: func() *metadata.APIController {
return setupVersionsController(t, artifact.PackageTypeNPM)
},
expectedResp: artifact.GetAllArtifactVersions200JSONResponse{},
},
{
name: errorTypeSpaceNotFound,
packageType: artifact.PackageTypeMAVEN,
setupMocks: func() *metadata.APIController {
return setupVersionsControllerWithError(t, errorTypeSpaceNotFound)
},
expectedResp: artifact.GetAllArtifactVersions400JSONResponse{},
},
{
name: "unauthorized_access",
packageType: artifact.PackageTypeMAVEN,
setupMocks: func() *metadata.APIController {
return setupVersionsControllerWithError(t, errorTypeUnauthorized)
},
expectedResp: artifact.GetAllArtifactVersions403JSONResponse{},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := tt.setupMocks()
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
req := artifact.GetAllArtifactVersionsRequestObject{
RegistryRef: artifact.RegistryRefPathParam("test-registry"),
Artifact: artifact.ArtifactPathParam("test-artifact"),
Params: artifact.GetAllArtifactVersionsParams{},
}
resp, err := controller.GetAllArtifactVersions(ctx, req)
assert.NoError(t, err)
assert.NotNil(t, resp)
// Verify response type matches expected
switch tt.expectedResp.(type) {
case artifact.GetAllArtifactVersions200JSONResponse:
_, ok := resp.(artifact.GetAllArtifactVersions200JSONResponse)
assert.True(t, ok, "Expected 200 response")
case artifact.GetAllArtifactVersions400JSONResponse:
_, ok := resp.(artifact.GetAllArtifactVersions400JSONResponse)
assert.True(t, ok, "Expected 400 response")
case artifact.GetAllArtifactVersions403JSONResponse:
_, ok := resp.(artifact.GetAllArtifactVersions403JSONResponse)
assert.True(t, ok, "Expected 403 response")
case artifact.GetAllArtifactVersions404JSONResponse:
_, ok := resp.(artifact.GetAllArtifactVersions404JSONResponse)
assert.True(t, ok, "Expected 404 response")
}
})
}
}
// TestGetAllArtifactVersionsSnapshot tests that the generated artifact versions responses
// match the expected snapshots for all package types. This ensures consistency across runs.
//
// Note: Docker and Helm tests require TagRepository with correct mock signatures.
// Currently testing non-OCI package types (Maven, Generic, Python, NPM, RPM, Nuget, Go, HuggingFace).
func TestGetAllArtifactVersionsSnapshot(t *testing.T) {
tests := []struct {
name string
packageType artifact.PackageType
}{
// Docker and Helm require TagRepository mocks - skipped for now
// {name: "docker_versions", packageType: artifact.PackageTypeDOCKER},
// {name: "helm_versions", packageType: artifact.PackageTypeHELM},
{name: "maven_versions", packageType: artifact.PackageTypeMAVEN},
{name: "generic_versions", packageType: artifact.PackageTypeGENERIC},
{name: "python_versions", packageType: artifact.PackageTypePYTHON},
{name: "npm_versions", packageType: artifact.PackageTypeNPM},
{name: "rpm_versions", packageType: artifact.PackageTypeRPM},
{name: "nuget_versions", packageType: artifact.PackageTypeNUGET},
{name: "go_versions", packageType: artifact.PackageTypeGO},
{name: "huggingface_versions", packageType: artifact.PackageTypeHUGGINGFACE},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := setupVersionsSnapshotController(t, tt.packageType)
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
req := artifact.GetAllArtifactVersionsRequestObject{
RegistryRef: artifact.RegistryRefPathParam("test-registry"),
Artifact: artifact.ArtifactPathParam("test-artifact"),
Params: artifact.GetAllArtifactVersionsParams{},
}
resp, err := controller.GetAllArtifactVersions(ctx, req)
require.NoError(t, err)
actualResp, ok := resp.(artifact.GetAllArtifactVersions200JSONResponse)
require.True(t, ok, "Expected 200 response")
require.Equal(t, artifact.Status("SUCCESS"), actualResp.Status)
// Verify snapshot
verifyVersionsSnapshot(t, tt.name, actualResp.ListArtifactVersionResponseJSONResponse)
})
}
}
// Helper functions
func setupVersionsController(_ *testing.T, packageType artifact.PackageType) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
mockImageStore := new(mocks.ImageRepository)
mockArtifactStore := new(mocks.ArtifactRepository)
mockURLProvider := new(mocks.Provider)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
regInfo := &metadata.RegistryRequestInfo{
RegistryRequestBaseInfo: &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
RootIdentifier: "root",
},
}
registry := &types.Registry{
ID: 1,
Name: "test-registry",
ParentID: 2,
PackageType: packageType,
}
image := &types.Image{
ID: 1,
Name: "test-artifact",
RegistryID: 1,
CreatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
UpdatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(regInfo.RegistryRequestBaseInfo, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestInfo", mock.Anything, mock.Anything).
Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(true, nil)
mockRegistryRepo.On("Get", mock.Anything, int64(1)).
Return(registry, nil)
mockImageStore.On("GetByNameAndType", mock.Anything, int64(1), "test-artifact", mock.Anything).
Return(image, nil)
// Mock for non-OCI types (Maven, Generic, Python, NPM, RPM, Nuget, Go, HuggingFace)
var artifactType *artifact.ArtifactType
if packageType == artifact.PackageTypeHUGGINGFACE {
modelType := artifact.ArtifactTypeModel
artifactType = &modelType
}
nonOCIVersions := &[]types.NonOCIArtifactMetadata{
{
Name: "v1.0.0",
ModifiedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
ArtifactType: artifactType,
},
}
mockArtifactStore.On("GetAllVersionsByRepoAndImage",
mock.Anything, int64(1), "test-artifact", mock.Anything, mock.Anything,
mock.Anything, mock.Anything, mock.Anything, mock.Anything).
Return(nonOCIVersions, nil)
mockArtifactStore.On("CountAllVersionsByRepoAndImage",
mock.Anything, int64(2), "test-registry", "test-artifact",
mock.Anything, mock.Anything).
Return(int64(1), nil)
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything, mock.Anything).
Return("https://registry.example.com/root/test-registry")
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything, mock.Anything, mock.Anything).
Return("https://registry.example.com/root/test-registry")
eventReporter := createEventReporter()
fileManager := createFileManager()
mockPackageWrapper := new(mocks.MockPackageWrapper)
// Mock PackageWrapper methods - return nil to use default implementation
// which populates package-specific metadata
mockPackageWrapper.On("GetArtifactVersionMetadata", mock.Anything, mock.Anything, mock.Anything).
Return((*artifact.ArtifactVersionMetadata)(nil))
return metadata.NewAPIController(
mockRegistryRepo, fileManager, nil, nil, nil, nil, nil, nil, mockImageStore, nil,
mockSpaceFinder, nil, mockURLProvider, mockAuthorizer, nil, mockArtifactStore, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
mockPackageWrapper, nil,
)
}
func setupVersionsControllerWithError(_ *testing.T, errorType string) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
regInfo := &metadata.RegistryRequestInfo{
RegistryRequestBaseInfo: &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
},
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(regInfo.RegistryRequestBaseInfo, nil)
switch errorType {
case errorTypeSpaceNotFound:
mockRegistryMetadataHelper.On("GetRegistryRequestInfo", mock.Anything, mock.Anything).
Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").
Return(nil, http.ErrNotSupported)
case errorTypeUnauthorized:
mockRegistryMetadataHelper.On("GetRegistryRequestInfo", mock.Anything, mock.Anything).
Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(false, http.ErrNotSupported)
}
eventReporter := createEventReporter()
fileManager := createFileManager()
return metadata.NewAPIController(
nil, fileManager, nil, nil, nil, nil, nil, nil, nil, nil,
mockSpaceFinder, nil, nil, mockAuthorizer, nil, nil, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
}
func setupVersionsSnapshotController(t *testing.T, packageType artifact.PackageType) *metadata.APIController {
return setupVersionsController(t, packageType)
}
// verifyVersionsSnapshot compares the actual artifact versions data with a stored snapshot.
func verifyVersionsSnapshot(t *testing.T, name string, actual artifact.ListArtifactVersionResponseJSONResponse) {
t.Helper()
snapshotDir := filepath.Join("testdata", "snapshots", "artifact_versions")
snapshotFile := filepath.Join(snapshotDir, name+".json")
// Marshal actual data to JSON
actualJSON, err := json.MarshalIndent(actual, "", " ")
require.NoError(t, err, "Failed to marshal actual data")
// Check if UPDATE_SNAPSHOTS environment variable is set
if os.Getenv(envUpdateSnapshots) == envValueTrue {
// Create directory if it doesn't exist
err := os.MkdirAll(snapshotDir, 0755)
require.NoError(t, err, "Failed to create snapshot directory")
// Write snapshot
err = os.WriteFile(snapshotFile, actualJSON, snapshotFilePermissions)
require.NoError(t, err, "Failed to write snapshot file")
t.Logf("Updated snapshot: %s", snapshotFile)
return
}
// Read existing snapshot
expectedJSON, err := os.ReadFile(snapshotFile)
if os.IsNotExist(err) {
t.Fatalf("Snapshot file does not exist: %s\nRun tests with UPDATE_SNAPSHOTS=true to create it", snapshotFile)
}
require.NoError(t, err, "Failed to read snapshot file")
// Compare JSON
var expected, actualParsed any
require.NoError(t, json.Unmarshal(expectedJSON, &expected), "Failed to unmarshal expected JSON")
require.NoError(t, json.Unmarshal(actualJSON, &actualParsed), "Failed to unmarshal actual JSON")
assert.Equal(t, expected, actualParsed,
"Snapshot mismatch for %s.\nExpected:\n%s\n\nActual:\n%s\n\nRun tests with UPDATE_SNAPSHOTS=true to update snapshots",
name, string(expectedJSON), string(actualJSON))
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_client_setup_details_test.go | registry/app/api/controller/metadata/get_client_setup_details_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata_test
import (
"context"
"encoding/json"
"net/http"
"os"
"path/filepath"
"testing"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/controller/mocks"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
registryevents "github.com/harness/gitness/registry/app/events/artifact"
"github.com/harness/gitness/registry/app/pkg/filemanager"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
"github.com/stretchr/testify/require"
)
func TestGetClientSetupDetails(t *testing.T) {
artifactParam := artifact.ArtifactParam("test-artifact")
versionParam := artifact.VersionParam("v1.0.0")
tests := []struct {
name string
registryRef string
packageType artifact.PackageType
setupMocks func() *metadata.APIController
expectedResp any
expectError bool
}{
{
name: "docker_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeDOCKER, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "docker_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeDOCKER, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "helm_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeHELM,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeHELM, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "helm_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeHELM,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeHELM, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "maven_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeMAVEN,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeMAVEN, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "maven_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeMAVEN,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeMAVEN, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "generic_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeGENERIC,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeGENERIC, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "generic_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeGENERIC,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeGENERIC, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "python_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypePYTHON,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypePYTHON, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "python_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypePYTHON,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypePYTHON, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "npm_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeNPM,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeNPM, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "npm_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeNPM,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeNPM, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "nuget_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeNUGET,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeNUGET, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "nuget_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeNUGET,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeNUGET, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "go_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeGO,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeGO, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "go_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeGO,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeGO, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "rpm_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeRPM,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeRPM, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "rpm_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeRPM,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeRPM, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "huggingface_registry_authenticated",
registryRef: "test-registry",
packageType: artifact.PackageTypeHUGGINGFACE,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeHUGGINGFACE, false)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "huggingface_registry_anonymous",
registryRef: "test-registry",
packageType: artifact.PackageTypeHUGGINGFACE,
setupMocks: func() *metadata.APIController {
return setupControllerForPackageType(t, artifact.PackageTypeHUGGINGFACE, true)
},
expectedResp: artifact.GetClientSetupDetails200JSONResponse{},
expectError: false,
},
{
name: "registry_not_found",
registryRef: "non-existent",
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupControllerForError(t, "registry_not_found")
},
expectedResp: artifact.GetClientSetupDetails404JSONResponse{},
expectError: true,
},
{
name: "space_not_found",
registryRef: "test-registry",
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupControllerForError(t, "space_not_found")
},
expectedResp: artifact.GetClientSetupDetails400JSONResponse{},
expectError: false,
},
{
name: "unauthorized_access",
registryRef: "test-registry",
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupControllerForError(t, "unauthorized")
},
expectedResp: artifact.GetClientSetupDetails403JSONResponse{},
expectError: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := tt.setupMocks()
// Create context with appropriate auth session
ctx := context.Background()
if tt.name == "docker_registry_anonymous" || tt.name == "helm_registry_anonymous" ||
tt.name == "maven_registry_anonymous" || tt.name == "generic_registry_anonymous" ||
tt.name == "python_registry_anonymous" || tt.name == "npm_registry_anonymous" ||
tt.name == "nuget_registry_anonymous" || tt.name == "go_registry_anonymous" ||
tt.name == "rpm_registry_anonymous" || tt.name == "huggingface_registry_anonymous" {
// Anonymous session
session := &auth.Session{
Principal: coretypes.Principal{
ID: 0,
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
} else {
// Authenticated session
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
}
// Create request object
req := artifact.GetClientSetupDetailsRequestObject{
RegistryRef: artifact.RegistryRefPathParam(tt.registryRef),
Params: artifact.GetClientSetupDetailsParams{
Artifact: &artifactParam,
Version: &versionParam,
},
}
// Call the API
resp, err := controller.GetClientSetupDetails(ctx, req)
// Verify response
switch tt.expectedResp.(type) {
case artifact.GetClientSetupDetails200JSONResponse:
assert.NoError(t, err)
actualResp, ok := resp.(artifact.GetClientSetupDetails200JSONResponse)
assert.True(t, ok, "Expected 200 response")
assert.Equal(t, artifact.StatusSUCCESS, actualResp.Status)
assert.NotNil(t, actualResp.Data)
assert.NotEmpty(t, actualResp.Data.MainHeader)
assert.NotEmpty(t, actualResp.Data.SecHeader)
assert.NotEmpty(t, actualResp.Data.Sections)
case artifact.GetClientSetupDetails400JSONResponse:
assert.NoError(t, err)
actualResp, ok := resp.(artifact.GetClientSetupDetails400JSONResponse)
assert.True(t, ok, "Expected 400 response")
assert.NotEmpty(t, actualResp.Message)
case artifact.GetClientSetupDetails403JSONResponse:
assert.NoError(t, err)
actualResp, ok := resp.(artifact.GetClientSetupDetails403JSONResponse)
assert.True(t, ok, "Expected 403 response")
assert.NotEmpty(t, actualResp.Message)
case artifact.GetClientSetupDetails404JSONResponse:
assert.Error(t, err)
actualResp, ok := resp.(artifact.GetClientSetupDetails404JSONResponse)
assert.True(t, ok, "Expected 404 response")
assert.NotEmpty(t, actualResp.Message)
}
})
}
}
func TestGenerateClientSetupDetails(t *testing.T) {
artifactParam := artifact.ArtifactParam("test-artifact")
versionParam := artifact.VersionParam("v1.0.0")
tests := []struct {
name string
packageType string
registryType artifact.RegistryType
expectNil bool
}{
{
name: "docker_virtual",
packageType: string(artifact.PackageTypeDOCKER),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "docker_upstream",
packageType: string(artifact.PackageTypeDOCKER),
registryType: artifact.RegistryTypeUPSTREAM,
expectNil: false,
},
{
name: "helm_virtual",
packageType: string(artifact.PackageTypeHELM),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "helm_upstream",
packageType: string(artifact.PackageTypeHELM),
registryType: artifact.RegistryTypeUPSTREAM,
expectNil: false,
},
{
name: "maven_virtual",
packageType: string(artifact.PackageTypeMAVEN),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "generic_virtual",
packageType: string(artifact.PackageTypeGENERIC),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "generic_upstream",
packageType: string(artifact.PackageTypeGENERIC),
registryType: artifact.RegistryTypeUPSTREAM,
expectNil: false,
},
{
name: "python_virtual",
packageType: string(artifact.PackageTypePYTHON),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "python_upstream",
packageType: string(artifact.PackageTypePYTHON),
registryType: artifact.RegistryTypeUPSTREAM,
expectNil: false,
},
{
name: "npm_virtual",
packageType: string(artifact.PackageTypeNPM),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "npm_upstream",
packageType: string(artifact.PackageTypeNPM),
registryType: artifact.RegistryTypeUPSTREAM,
expectNil: false,
},
{
name: "nuget_virtual",
packageType: string(artifact.PackageTypeNUGET),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "go_virtual",
packageType: string(artifact.PackageTypeGO),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "go_upstream",
packageType: string(artifact.PackageTypeGO),
registryType: artifact.RegistryTypeUPSTREAM,
expectNil: false,
},
{
name: "rpm_virtual",
packageType: string(artifact.PackageTypeRPM),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "huggingface_virtual",
packageType: string(artifact.PackageTypeHUGGINGFACE),
registryType: artifact.RegistryTypeVIRTUAL,
expectNil: false,
},
{
name: "huggingface_upstream",
packageType: string(artifact.PackageTypeHUGGINGFACE),
registryType: artifact.RegistryTypeUPSTREAM,
expectNil: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := setupControllerForPackageType(t, artifact.PackageType(tt.packageType), false)
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
result := controller.GenerateClientSetupDetails(
ctx,
tt.packageType,
&artifactParam,
&versionParam,
"root/test-registry",
tt.registryType,
)
if tt.expectNil {
assert.Nil(t, result)
} else {
assert.NotNil(t, result)
assert.Equal(t, artifact.StatusSUCCESS, result.Status)
assert.NotNil(t, result.Data)
assert.NotEmpty(t, result.Data.MainHeader)
assert.NotEmpty(t, result.Data.SecHeader)
assert.NotEmpty(t, result.Data.Sections)
}
})
}
}
func TestGenerateClientSetupDetails_WithUntaggedImages(t *testing.T) {
artifactParam := artifact.ArtifactParam("test-artifact")
versionParam := artifact.VersionParam("sha256:abc123")
tests := []struct {
name string
packageType string
untaggedImagesEnabled bool
}{
{
name: "docker_with_untagged_enabled",
packageType: string(artifact.PackageTypeDOCKER),
untaggedImagesEnabled: true,
},
{
name: "docker_with_untagged_disabled",
packageType: string(artifact.PackageTypeDOCKER),
untaggedImagesEnabled: false,
},
{
name: "helm_with_untagged_enabled",
packageType: string(artifact.PackageTypeHELM),
untaggedImagesEnabled: true,
},
{
name: "helm_with_untagged_disabled",
packageType: string(artifact.PackageTypeHELM),
untaggedImagesEnabled: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
mockURLProvider := new(mocks.Provider)
mockURLProvider.On("PackageURL", mock.Anything, mock.Anything, mock.Anything).
Return("http://example.com/registry/test-registry")
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything).
Return("http://example.com")
fileManager := createFileManager()
eventReporter := createEventReporter()
controller := metadata.NewAPIController(
nil, fileManager, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
mockURLProvider, nil, nil, nil, nil, nil, nil, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool {
return tt.untaggedImagesEnabled
},
nil, nil,
)
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
result := controller.GenerateClientSetupDetails(
ctx,
tt.packageType,
&artifactParam,
&versionParam,
"root/test-registry",
artifact.RegistryTypeVIRTUAL,
)
assert.NotNil(t, result)
assert.Equal(t, artifact.StatusSUCCESS, result.Status)
})
}
}
func TestGenerateClientSetupDetails_MavenWithGroupID(t *testing.T) {
artifactParam := artifact.ArtifactParam("com.example:test-artifact")
versionParam := artifact.VersionParam("v1.0.0")
mockURLProvider := new(mocks.Provider)
mockURLProvider.On("PackageURL", mock.Anything, mock.Anything, mock.Anything).
Return("http://example.com/registry/test-registry/maven")
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything).
Return("http://example.com")
fileManager := createFileManager()
eventReporter := createEventReporter()
controller := metadata.NewAPIController(
nil, fileManager, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
mockURLProvider, nil, nil, nil, nil, nil, nil, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
result := controller.GenerateClientSetupDetails(
ctx,
string(artifact.PackageTypeMAVEN),
&artifactParam,
&versionParam,
"root/test-registry",
artifact.RegistryTypeVIRTUAL,
)
assert.NotNil(t, result)
assert.Equal(t, artifact.StatusSUCCESS, result.Status)
}
// Helper functions
func createFileManager() filemanager.FileManager {
mockRegistryRepo := new(mocks.RegistryRepository)
mockGenericBlobRepo := new(mocks.GenericBlobRepository)
mockTransactor := new(mocks.Transactor)
return filemanager.NewFileManager(
mockRegistryRepo,
mockGenericBlobRepo,
nil, // nodesRepo
mockTransactor,
nil, // reporter
nil, // config
nil, // storageService
nil, // bucketService
)
}
func createEventReporter() registryevents.Reporter {
// Create a no-op reporter for testing
return registryevents.Reporter{}
}
func setupControllerForPackageType(_ *testing.T, packageType artifact.PackageType, _ bool) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
mockURLProvider := new(mocks.Provider)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
baseInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
RootIdentifierID: 3,
RootIdentifier: "root",
RegistryType: artifact.RegistryTypeVIRTUAL,
PackageType: packageType,
RegistryRef: "root/test-registry",
}
registry := &types.Registry{
ID: 1,
Name: "test-registry",
ParentID: 2,
RootParentID: 3,
Type: artifact.RegistryTypeVIRTUAL,
PackageType: packageType,
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "test-registry").
Return(registry, nil)
mockURLProvider.On("PackageURL", mock.Anything, mock.Anything, mock.Anything).
Return("http://example.com/registry/test-registry/" + string(packageType))
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything).
Return("http://example.com")
fileManager := createFileManager()
eventReporter := createEventReporter()
return metadata.NewAPIController(
mockRegistryRepo, fileManager, nil, nil, nil, nil, nil, nil, nil, nil,
mockSpaceFinder, nil, mockURLProvider, mockAuthorizer, nil, nil, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "Authorization: Bearer", nil, nil, nil,
nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
}
func setupControllerForError(_ *testing.T, errorType string) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
baseInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
RootIdentifierID: 3,
RootIdentifier: "root",
RegistryType: artifact.RegistryTypeVIRTUAL,
PackageType: artifact.PackageTypeDOCKER,
}
switch errorType {
case errorTypeSpaceNotFound:
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").
Return(nil, http.ErrNotSupported)
case errorTypeUnauthorized:
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(false, http.ErrNotSupported)
case "registry_not_found":
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "non-existent").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "test-registry").
Return(nil, http.ErrNotSupported)
}
fileManager := createFileManager()
eventReporter := createEventReporter()
return metadata.NewAPIController(
mockRegistryRepo, fileManager, nil, nil, nil, nil, nil, nil, nil, nil,
mockSpaceFinder, nil, nil, mockAuthorizer, nil, nil, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "", nil, nil, nil,
nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
}
// TestGenerateClientSetupDetailsSnapshot tests that the generated client setup details
// match the expected snapshots for all package types. This ensures consistency across runs.
func TestGenerateClientSetupDetailsSnapshot(t *testing.T) {
artifactParam := artifact.ArtifactParam("test-artifact")
versionParam := artifact.VersionParam("v1.0.0")
tests := []struct {
name string
packageType string
registryType artifact.RegistryType
anonymous bool
}{
{
name: "docker_authenticated", packageType: string(artifact.PackageTypeDOCKER),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "docker_anonymous", packageType: string(artifact.PackageTypeDOCKER),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "helm_authenticated", packageType: string(artifact.PackageTypeHELM),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "helm_anonymous", packageType: string(artifact.PackageTypeHELM),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "maven_authenticated", packageType: string(artifact.PackageTypeMAVEN),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "maven_anonymous", packageType: string(artifact.PackageTypeMAVEN),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "generic_authenticated", packageType: string(artifact.PackageTypeGENERIC),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "generic_anonymous", packageType: string(artifact.PackageTypeGENERIC),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "python_authenticated", packageType: string(artifact.PackageTypePYTHON),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "python_anonymous", packageType: string(artifact.PackageTypePYTHON),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "npm_authenticated", packageType: string(artifact.PackageTypeNPM),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "npm_anonymous", packageType: string(artifact.PackageTypeNPM),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "nuget_authenticated", packageType: string(artifact.PackageTypeNUGET),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "nuget_anonymous", packageType: string(artifact.PackageTypeNUGET),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "go_authenticated", packageType: string(artifact.PackageTypeGO),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "go_anonymous", packageType: string(artifact.PackageTypeGO),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "rpm_authenticated", packageType: string(artifact.PackageTypeRPM),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "rpm_anonymous", packageType: string(artifact.PackageTypeRPM),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "huggingface_authenticated", packageType: string(artifact.PackageTypeHUGGINGFACE),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: false,
},
{
name: "huggingface_anonymous", packageType: string(artifact.PackageTypeHUGGINGFACE),
registryType: artifact.RegistryTypeVIRTUAL, anonymous: true,
},
{
name: "docker_upstream", packageType: string(artifact.PackageTypeDOCKER),
registryType: artifact.RegistryTypeUPSTREAM, anonymous: false,
},
{
name: "helm_upstream", packageType: string(artifact.PackageTypeHELM),
registryType: artifact.RegistryTypeUPSTREAM, anonymous: false,
},
{
name: "generic_upstream", packageType: string(artifact.PackageTypeGENERIC),
registryType: artifact.RegistryTypeUPSTREAM, anonymous: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
mockURLProvider := new(mocks.Provider)
mockURLProvider.On("PackageURL", mock.Anything, mock.Anything, mock.Anything).
Return("http://example.com/registry/test-registry/" + tt.packageType)
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything).
Return("http://example.com")
fileManager := createFileManager()
eventReporter := createEventReporter()
controller := metadata.NewAPIController(
nil, fileManager, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
mockURLProvider, nil, nil, nil, nil, nil, nil, nil, eventReporter, nil, "Authorization: Bearer",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 0,
UID: coretypes.AnonymousPrincipalUID,
Type: enum.PrincipalTypeUser,
},
}
if tt.anonymous {
ctx = request.WithAuthSession(ctx, session)
} else {
authSession := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, authSession)
}
result := controller.GenerateClientSetupDetails(
ctx,
tt.packageType,
&artifactParam,
&versionParam,
"root/test-registry",
tt.registryType,
)
require.NotNil(t, result)
require.Equal(t, artifact.StatusSUCCESS, result.Status)
// Verify snapshot
verifySnapshot(t, tt.name, result.Data)
})
}
}
// verifySnapshot compares the actual data with a stored snapshot.
func verifySnapshot(t *testing.T, name string, actual artifact.ClientSetupDetails) {
t.Helper()
snapshotDir := filepath.Join("testdata", "snapshots", "client_setup_details")
snapshotFile := filepath.Join(snapshotDir, name+".json")
// Marshal actual data to JSON
actualJSON, err := json.MarshalIndent(actual, "", " ")
require.NoError(t, err, "Failed to marshal actual data")
// Check if UPDATE_SNAPSHOTS environment variable is set
if os.Getenv(envUpdateSnapshots) == envValueTrue {
// Create directory if it doesn't exist
err := os.MkdirAll(snapshotDir, 0755)
require.NoError(t, err, "Failed to create snapshot directory")
// Write snapshot
err = os.WriteFile(snapshotFile, actualJSON, snapshotFilePermissions)
require.NoError(t, err, "Failed to write snapshot file")
t.Logf("Updated snapshot: %s", snapshotFile)
return
}
// Read existing snapshot
expectedJSON, err := os.ReadFile(snapshotFile)
if os.IsNotExist(err) {
t.Fatalf("Snapshot file does not exist: %s\nRun tests with UPDATE_SNAPSHOTS=true to create it", snapshotFile)
}
require.NoError(t, err, "Failed to read snapshot file")
// Compare JSON
var expected, actualParsed any
require.NoError(t, json.Unmarshal(expectedJSON, &expected), "Failed to unmarshal expected JSON")
require.NoError(t, json.Unmarshal(actualJSON, &actualParsed), "Failed to unmarshal actual JSON")
assert.Equal(t, expected, actualParsed,
"Snapshot mismatch for %s.\nExpected:\n%s\n\nActual:\n%s\n\nRun tests with UPDATE_SNAPSHOTS=true to update snapshots",
name, string(expectedJSON), string(actualJSON))
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/replication.go | registry/app/api/controller/metadata/replication.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
)
func (c *APIController) ListReplicationRules(
_ context.Context,
_ artifact.ListReplicationRulesRequestObject,
) (artifact.ListReplicationRulesResponseObject, error) {
// TODO implement me
panic("implement me")
}
func (c *APIController) CreateReplicationRule(
_ context.Context,
_ artifact.CreateReplicationRuleRequestObject,
) (artifact.CreateReplicationRuleResponseObject, error) {
// TODO implement me
panic("implement me")
}
func (c *APIController) DeleteReplicationRule(
_ context.Context,
_ artifact.DeleteReplicationRuleRequestObject,
) (artifact.DeleteReplicationRuleResponseObject, error) {
// TODO implement me
panic("implement me")
}
func (c *APIController) GetReplicationRule(
_ context.Context,
_ artifact.GetReplicationRuleRequestObject,
) (artifact.GetReplicationRuleResponseObject, error) {
// TODO implement me
panic("implement me")
}
func (c *APIController) UpdateReplicationRule(
_ context.Context,
_ artifact.UpdateReplicationRuleRequestObject,
) (artifact.UpdateReplicationRuleResponseObject, error) {
// TODO implement me
panic("implement me")
}
func (c *APIController) ListMigrationImages(
_ context.Context,
_ artifact.ListMigrationImagesRequestObject,
) (artifact.ListMigrationImagesResponseObject, error) {
// TODO implement me
panic("implement me")
}
func (c *APIController) GetMigrationLogsForImage(
_ context.Context,
_ artifact.GetMigrationLogsForImageRequestObject,
) (artifact.GetMigrationLogsForImageResponseObject, error) {
// TODO implement me
panic("implement me")
}
func (c *APIController) StartMigration(
_ context.Context,
_ artifact.StartMigrationRequestObject,
) (artifact.StartMigrationResponseObject, error) {
// TODO implement me
panic("implement me")
}
func (c *APIController) StopMigration(
_ context.Context,
_ artifact.StopMigrationRequestObject,
) (artifact.StopMigrationResponseObject, error) {
// TODO implement me
panic("implement me")
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/cleanuppolicy_mapper_test.go | registry/app/api/controller/metadata/cleanuppolicy_mapper_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"testing"
"time"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
"github.com/stretchr/testify/assert"
)
func TestCreateCleanupPolicyEntity_FunctionExists(t *testing.T) {
t.Run("test_create_cleanup_policy_entity_exists", func(t *testing.T) {
assert.NotNil(t, CreateCleanupPolicyEntity)
// Check it can be called with nil safely
result, err := CreateCleanupPolicyEntity(nil, 123)
assert.Nil(t, err)
assert.NotNil(t, result) // Now returns empty slice, not nil
assert.Len(t, *result, 0)
})
}
func TestCreateCleanupPolicyResponse_FunctionExists(t *testing.T) {
t.Run("test_create_cleanup_policy_response_exists", func(t *testing.T) {
assert.NotNil(t, CreateCleanupPolicyResponse)
// Check it can be called with nil slice safely
var entities []types.CleanupPolicy
result := CreateCleanupPolicyResponse(&entities)
assert.NotNil(t, result)
assert.Len(t, *result, 0)
})
}
func TestGetCleanupPolicyEntity_FunctionExists(t *testing.T) {
t.Run("test_get_cleanup_policy_entity_exists", func(t *testing.T) {
assert.NotNil(t, getCleanupPolicyEntity)
name := "policy1"
versionPrefixSlice := []string{"v1."}
packagePrefixSlice := []string{"pkg-"}
expireDays := 7
input := artifact.CleanupPolicy{
Name: &name,
VersionPrefix: &versionPrefixSlice,
PackagePrefix: &packagePrefixSlice,
ExpireDays: &expireDays,
}
entity, err := getCleanupPolicyEntity(input, 42)
assert.Nil(t, err)
assert.NotNil(t, entity)
assert.Equal(t, name, entity.Name)
assert.Equal(t, []string{"v1."}, entity.VersionPrefix)
assert.Equal(t, []string{"pkg-"}, entity.PackagePrefix)
assert.Equal(t, int64(expireDays*24*60*60*1000), entity.ExpiryTime)
assert.Equal(t, int64(42), entity.RegistryID)
})
}
func TestGetCleanupPolicyDto_FunctionExists(t *testing.T) {
t.Run("test_get_cleanup_policy_dto_exists", func(t *testing.T) {
assert.NotNil(t, getCleanupPolicyDto)
input := types.CleanupPolicy{
Name: "policy2",
VersionPrefix: []string{"v1."},
PackagePrefix: []string{"pkg-"},
ExpiryTime: int64(3 * 24 * 60 * 60 * 1000),
RegistryID: 99,
}
dto := getCleanupPolicyDto(input)
assert.NotNil(t, dto)
assert.Equal(t, &input.Name, dto.Name)
assert.Equal(t, &input.VersionPrefix, dto.VersionPrefix)
assert.Equal(t, &input.PackagePrefix, dto.PackagePrefix)
expireDays := int(time.Duration(input.ExpiryTime).Hours() / 24)
assert.Equal(t, &expireDays, dto.ExpireDays)
})
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_registry.go | registry/app/api/controller/metadata/get_registry.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
)
func (c *APIController) GetRegistry(
ctx context.Context,
r artifact.GetRegistryRequestObject,
) (artifact.GetRegistryResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
// Check if registry not found - error is properly wrapped with %w through the chain
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetRegistry404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "Registry not found"),
),
}, nil
}
return artifact.GetRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return artifact.GetRegistry401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return artifact.GetRegistry403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
repoEntity, _ := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if string(repoEntity.Type) == string(artifact.RegistryTypeVIRTUAL) {
cleanupPolicies, err := c.CleanupPolicyStore.GetByRegistryID(ctx, repoEntity.ID)
if err != nil {
return throwGetRegistry500Error(err), nil
}
if len(repoEntity.Name) == 0 {
return artifact.GetRegistry404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "registry doesn't exist with this key"),
),
}, nil
}
ref := space.Path + "/" + repoEntity.Name
jsonResponse, err := c.CreateVirtualRepositoryResponse(ctx,
repoEntity, c.getUpstreamProxyKeys(ctx, repoEntity.UpstreamProxies), cleanupPolicies,
c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, regInfo.RegistryIdentifier), ref)
if err != nil {
return artifact.GetRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.GetRegistry200JSONResponse{
RegistryResponseJSONResponse: *jsonResponse,
}, nil
}
upstreamproxyEntity, err := c.UpstreamProxyStore.GetByRegistryIdentifier(
ctx,
regInfo.ParentID, regInfo.RegistryIdentifier,
)
if len(upstreamproxyEntity.RepoKey) == 0 {
return artifact.GetRegistry404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "registry doesn't exist with this key"),
),
}, nil
}
if err != nil {
return throwGetRegistry500Error(err), nil
}
ref := space.Path + "/" + upstreamproxyEntity.RepoKey
jsonResponse, err := c.CreateUpstreamProxyResponseJSONResponse(ctx, upstreamproxyEntity, ref)
if err != nil {
return throwGetRegistry500Error(err), nil
}
return artifact.GetRegistry200JSONResponse{
RegistryResponseJSONResponse: *jsonResponse,
}, nil
}
func throwGetRegistry500Error(err error) artifact.GetRegistry500JSONResponse {
return artifact.GetRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/utils.go | registry/app/api/controller/metadata/utils.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"math"
"net/http"
"net/url"
"regexp"
"slices"
"strconv"
"strings"
"time"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/api/usererror"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/app/paths"
"github.com/harness/gitness/registry/app/api/interfaces"
a "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/pkg/commons"
"github.com/inhies/go-bytesize"
"github.com/rs/zerolog/log"
)
var registrySort = []string{
"identifier",
"lastModified",
"registrySize",
"artifactsCount",
"downloadsCount",
"type",
}
const (
RepositoryResource = "repository"
ArtifactResource = "artifact"
ArtifactVersionResource = "artifactversion"
ArtifactFilesResource = "artifactFiles"
RegistryIdentifierErrorMsg = "registry name should be 1~255 characters long with lower case characters, numbers " +
"and ._- and must be start with numbers or characters"
RegexIdentifierPattern = "^[a-z0-9]+(?:[._-][a-z0-9]+)*$"
internalWebhookIdentifier = "harnesstriggerwebhok"
commonAuthHeader = " --header '<AUTH_HEADER_PREFIX> <API_KEY>'"
)
var RegistrySortMap = map[string]string{
"identifier": "name",
"lastModified": "updated_at",
"registrySize": "size",
"artifactsCount": "artifact_count",
"downloadsCount": "download_count",
"createdAt": "created_at",
"type": "type",
}
var artifactSort = []string{
"repoKey",
"name",
"lastModified",
"downloadsCount",
}
var artifactSortMap = map[string]string{
"repoKey": "name",
"lastModified": "updated_at",
"name": "image_name",
"downloadsCount": "download_count",
"createdAt": "created_at",
}
var artifactVersionSort = []string{
"name",
"size",
"pullCommand",
"downloadsCount",
"lastModified",
}
var artifactFilesSort = []string{
"name",
"size",
"createdAt",
}
var artifactVersionSortMap = map[string]string{
"name": "name",
"size": "name",
"pullCommand": "name",
"downloadsCount": "download_count",
"lastModified": "updated_at",
"createdAt": "created_at",
}
var artifactFilesSortMap = map[string]string{
"name": "name",
"size": "size",
"createdAt": "created_at",
}
var validScopes = []string{
string(a.Ancestors),
string(a.Descendants),
string(a.None),
}
var validArtifactTypesMapping = map[string][]string{
string(a.PackageTypeHUGGINGFACE): {string(a.ArtifactTypeModel), string(a.ArtifactTypeDataset)},
}
func ValidateScope(scope string) error {
if len(scope) == 0 || IsScopeValid(scope) {
return nil
}
return errors.New("invalid scope")
}
func ValidateAndGetArtifactType(packageType a.PackageType, artifactTypeParam string) (*a.ArtifactType, error) {
validTypes, ok := validArtifactTypesMapping[string(packageType)]
if !ok {
return nil, errors.New("invalid package type")
}
if slices.Contains(validTypes, artifactTypeParam) {
at := a.ArtifactType(artifactTypeParam)
return &at, nil
}
return nil, errors.New("invalid artifact type for package type")
}
func ValidatePackageTypeChange(fromDB, newPackage string) error {
if len(fromDB) > 0 && len(newPackage) > 0 && fromDB == newPackage {
return nil
}
return errors.New("package type change is not allowed")
}
func ValidateRepoTypeChange(fromDB, newRepo string) error {
if len(fromDB) > 0 && len(newRepo) > 0 && fromDB == newRepo {
return nil
}
return errors.New("registry type change is not allowed")
}
func ValidateIdentifierChange(fromDB, newIdentifier string) error {
if len(fromDB) > 0 && len(newIdentifier) > 0 && fromDB == newIdentifier {
return nil
}
return errors.New("registry identifier change is not allowed")
}
func ValidateIdentifier(identifier string) error {
if len(identifier) == 0 {
return errors.New(RegistryIdentifierErrorMsg)
}
matched, err := regexp.MatchString(RegexIdentifierPattern, identifier)
if err != nil || !matched {
return errors.New(RegistryIdentifierErrorMsg)
}
return nil
}
func ValidateUpstream(
packageWrapper interfaces.PackageWrapper,
packageType a.PackageType,
config *a.RegistryConfig,
) error {
upstreamConfig, err := config.AsUpstreamConfig()
if err != nil {
return err
}
if !commons.IsEmpty(config.Type) && config.Type == a.RegistryTypeUPSTREAM {
// Check if Source is nil before dereferencing
if upstreamConfig.Source != nil &&
packageWrapper.IsURLRequiredForUpstreamSource(string(packageType), string(*upstreamConfig.Source)) {
if commons.IsEmpty(upstreamConfig.Url) {
return usererror.BadRequest("URL is required for upstream repository")
}
}
}
return nil
}
func IsScopeValid(scope string) bool {
return slices.Contains(validScopes, scope)
}
func GetTimeInMs(t time.Time) string {
return fmt.Sprint(t.UnixMilli())
}
func GetErrorResponse(code int, message string) *a.Error {
return &a.Error{
Code: fmt.Sprint(code),
Message: message,
}
}
func GetSortByOrder(sortOrder string) string {
defaultSortOrder := "ASC"
decreasingSortOrder := "DESC"
if len(sortOrder) == 0 {
return defaultSortOrder
}
if sortOrder == decreasingSortOrder {
return decreasingSortOrder
}
return defaultSortOrder
}
func sortKey(slice []string, target string) string {
for _, item := range slice {
if item == target {
return item
}
}
return "createdAt"
}
func GetSortByField(sortByField string, resource string) string {
switch resource {
case RepositoryResource:
sortkey := sortKey(registrySort, sortByField)
return RegistrySortMap[sortkey]
case ArtifactResource:
sortkey := sortKey(artifactSort, sortByField)
return artifactSortMap[sortkey]
case ArtifactVersionResource:
sortkey := sortKey(artifactVersionSort, sortByField)
return artifactVersionSortMap[sortkey]
case ArtifactFilesResource:
sortkey := sortKey(artifactFilesSort, sortByField)
return artifactFilesSortMap[sortkey]
}
return "created_at"
}
func GetPageLimit(pageSize *a.PageSize) int {
defaultPageSize := 10
if pageSize != nil {
return int(*pageSize)
}
return defaultPageSize
}
func GetOffset(pageSize *a.PageSize, pageNumber *a.PageNumber) int {
defaultOffset := 0
if pageSize == nil || pageNumber == nil {
return defaultOffset
}
if *pageNumber == 0 {
return 0
}
return (int(*pageSize)) * int(*pageNumber)
}
func GetPageNumber(pageNumber *a.PageNumber) int64 {
defaultPageNumber := int64(1)
if pageNumber == nil {
return defaultPageNumber
}
return int64(*pageNumber)
}
func GetSuccessResponse() *a.Success {
return &a.Success{
Status: a.StatusSUCCESS,
}
}
func GetPageCount(count int64, pageSize int) int64 {
return int64(math.Ceil(float64(count) / float64(pageSize)))
}
func GetImageSize(size string) string {
sizeVal, _ := strconv.ParseInt(size, 10, 64)
return GetSize(sizeVal)
}
func GetSize(sizeVal int64) string {
size := bytesize.New(float64(sizeVal))
return size.String()
}
func GetRegistryRef(rootIdentifier string, registryName string) string {
return rootIdentifier + "/" + registryName
}
func GetRepoURLWithoutProtocol(registryURL string) string {
repoURL := registryURL
parsedURL, err := url.Parse(repoURL)
if err != nil {
log.Error().Stack().Err(err).Msg("Error parsing URL: ")
return ""
}
return parsedURL.Host + parsedURL.Path
}
func GetTagURL(artifact string, version string, registryURL string) string {
url := registryURL
url += "/" + artifact + "/"
url += version
return url
}
func GetPullCommand(
ctx context.Context,
image string, version string,
packageType string, registryURL string, setupDetailsAuthHeaderPrefix string, artifactType *a.ArtifactType,
byTag bool,
) string {
session, _ := request.AuthSessionFrom(ctx)
switch packageType {
case string(a.PackageTypeDOCKER):
return GetDockerPullCommand(image, version, registryURL, byTag)
case string(a.PackageTypeHELM):
return GetHelmPullCommand(image, version, registryURL, byTag)
case string(a.PackageTypeGENERIC):
return GetGenericArtifactFileDownloadCommand(registryURL, image, version, "<FILENAME>",
setupDetailsAuthHeaderPrefix, auth.IsAnonymousSession(session))
case string(a.PackageTypePYTHON):
return GetPythonDownloadCommand(image, version)
case string(a.PackageTypeNPM):
return GetNPMDownloadCommand(image, version)
case string(a.PackageTypeRPM):
return GetRPMDownloadCommand(image, version)
case string(a.PackageTypeNUGET):
return GetNugetDownloadCommand(image, version)
case string(a.PackageTypeGO):
return GetGoDownloadCommand(image, version)
case string(a.PackageTypeHUGGINGFACE):
return GetHuggingFaceArtifactFileDownloadCommand(registryURL, image, version, "<FILENAME>",
setupDetailsAuthHeaderPrefix, artifactType, auth.IsAnonymousSession(session))
default:
return ""
}
}
func GetDockerPullCommand(
image string, version string, registryURL string, byTag bool,
) string {
var versionDelimiter string
if byTag {
versionDelimiter = ":"
} else {
versionDelimiter = "@"
}
return "docker pull " + GetRepoURLWithoutProtocol(registryURL) + "/" + image + versionDelimiter + version
}
func GetHelmPullCommand(image string, version string, registryURL string, byTag bool) string {
var versionDelimiter string
if byTag {
versionDelimiter = " --version "
} else {
versionDelimiter = "@"
}
return "helm pull oci://" + GetRepoURLWithoutProtocol(registryURL) + "/" + image + versionDelimiter + version
}
func GetRPMDownloadCommand(artifact, version string) string {
downloadCommand := "yum install <ARTIFACT>-<VERSION>"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<ARTIFACT>": artifact,
"<VERSION>": version,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetNugetDownloadCommand(artifact, version string) string {
downloadCommand := "nuget install <ARTIFACT> -Version <VERSION> -Source <SOURCE>"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<ARTIFACT>": artifact,
"<VERSION>": version,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetCargoDownloadCommand(artifact, version string) string {
downloadCommand := "cargo add <ARTIFACT>@<VERSION> --registry <REGISTRY>"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<ARTIFACT>": artifact,
"<VERSION>": version,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetGoDownloadCommand(artifact, version string) string {
downloadCommand := "go get <ARTIFACT>@<VERSION>"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<ARTIFACT>": artifact,
"<VERSION>": version,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetNPMDownloadCommand(artifact, version string) string {
downloadCommand := "npm install <ARTIFACT>@<VERSION> "
// Replace the placeholders with the actual values
replacements := map[string]string{
"<ARTIFACT>": artifact,
"<VERSION>": version,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetPythonDownloadCommand(artifact, version string) string {
downloadCommand := "pip install <ARTIFACT>==<VERSION> "
// Replace the placeholders with the actual values
replacements := map[string]string{
"<ARTIFACT>": artifact,
"<VERSION>": version,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetGenericFileDownloadCommand(
regURL, artifact, version, filename string,
setupDetailsAuthHeaderPrefix string, isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = commonAuthHeader
}
downloadCommand := "curl --location '<HOSTNAME>/files/<ARTIFACT>/<VERSION>/<FILENAME>'" + authHeader +
" -J -o '<OUTPUT_FILE_NAME>'"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<ARTIFACT>": artifact,
"<VERSION>": version,
"<FILENAME>": filename,
"<AUTH_HEADER_PREFIX>": setupDetailsAuthHeaderPrefix,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetGenericArtifactFileDownloadCommand(
regURL, artifact, version, filePath string,
setupDetailsAuthHeaderPrefix string, isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = commonAuthHeader
}
downloadCommand := "curl --location '<HOSTNAME>/<ARTIFACT>/<VERSION>/<FILENAME>'" + authHeader +
" -J -o '<OUTPUT_FILE_NAME>'"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<ARTIFACT>": artifact,
"<VERSION>": version,
"<FILENAME>": filePath,
"<AUTH_HEADER_PREFIX>": setupDetailsAuthHeaderPrefix,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetHuggingFaceArtifactFileDownloadCommand(
regURL, artifact, version, filename string,
setupDetailsAuthHeaderPrefix string, artifactType *a.ArtifactType, isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = commonAuthHeader
}
downloadCommand := "curl --location '<HOSTNAME>/<ARTIFACT_TYPE>/<ARTIFACT>/resolve/<VERSION>/<FILENAME>'" +
authHeader +
" -J -o '<OUTPUT_FILE_NAME>'"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<ARTIFACT_TYPE>": string(*artifactType),
"<ARTIFACT>": artifact,
"<VERSION>": version,
"<FILENAME>": filename,
"<AUTH_HEADER_PREFIX>": setupDetailsAuthHeaderPrefix,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func getDownloadURL(
registryURL string,
packageType a.PackageType, artifact, version, filename string,
) string {
//nolint:exhaustive
switch packageType {
case a.PackageTypeGENERIC:
return fmt.Sprintf("%s/%s/%s?filename=%s", registryURL, artifact, version, filename)
case a.PackageTypeCARGO, a.PackageTypeMAVEN, a.PackageTypeNPM, a.PackageTypeNUGET, a.PackageTypePYTHON,
a.PackageTypeRPM:
return fmt.Sprintf("%s/%s/%s/%s", registryURL, artifact, version, filename)
default:
return ""
}
}
func GetNPMArtifactFileDownloadCommand(
regURL, artifact, version, filename string, isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = " --header 'Authorization: Bearer <API_KEY>'"
}
downloadCommand := "curl --location '<HOSTNAME>/<ARTIFACT>/-/<FILENAME>'" + authHeader +
" -J -o '<OUTPUT_FILE_NAME>'"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<ARTIFACT>": artifact,
"<VERSION>": version,
"<FILENAME>": filename,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetRPMArtifactFileDownloadCommand(
regURL, artifactName string,
versionWithArch string,
filename string,
setupDetailsAuthHeaderPrefix string,
isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = commonAuthHeader
}
_, file, _ := paths.DisectLeaf(filename)
lastDotIndex := strings.LastIndex(versionWithArch, ".")
arch := versionWithArch[lastDotIndex+1:]
version := versionWithArch[:lastDotIndex]
downloadFilePath := fmt.Sprintf("/%s/%s/%s/%s", artifactName, version, arch, file)
downloadCommand := "curl --location '<HOSTNAME>/package<FILENAME>'" + authHeader +
" -J -o '<OUTPUT_FILE_NAME>'"
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<FILENAME>": downloadFilePath,
"<AUTH_HEADER_PREFIX>": setupDetailsAuthHeaderPrefix,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetNugetArtifactFileDownloadCommand(
regURL, artifact, version, filename,
setupDetailsAuthHeaderPrefix string, isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = commonAuthHeader
}
downloadCommand := "curl --location '<HOSTNAME>/<ARTIFACT>/<VERSION>/<FILENAME>'" + authHeader +
" -J -o '<OUTPUT_FILE_NAME>'"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<ARTIFACT>": artifact,
"<VERSION>": version,
"<FILENAME>": filename,
"<AUTH_HEADER_PREFIX>": setupDetailsAuthHeaderPrefix,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetCargoArtifactFileDownloadCommand(
regURL, artifact, version,
setupDetailsAuthHeaderPrefix string, isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = commonAuthHeader
}
downloadCommand := "curl --location '<HOSTNAME>/api/v1/crates/<ARTIFACT>/<VERSION>/download'" + authHeader +
" -J -o '<OUTPUT_FILE_NAME>'"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<ARTIFACT>": artifact,
"<VERSION>": version,
"<AUTH_HEADER_PREFIX>": setupDetailsAuthHeaderPrefix,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetGoArtifactFileDownloadCommand(
regURL, artifact, filename,
setupDetailsAuthHeaderPrefix string, isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = commonAuthHeader
}
downloadCommand := "curl --location '<HOSTNAME>/<ARTIFACT>/@v/<FILENAME>'" + authHeader +
" -J -o '<OUTPUT_FILE_NAME>'"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<ARTIFACT>": artifact,
"<FILENAME>": filename,
"<AUTH_HEADER_PREFIX>": setupDetailsAuthHeaderPrefix,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
func GetMavenArtifactFileDownloadCommand(
regURL, artifact, version, filename string,
setupDetailsAuthHeaderPrefix string, isAnonymous bool,
) string {
var authHeader string
if !isAnonymous {
authHeader = commonAuthHeader
}
downloadCommand := "curl --location '<HOSTNAME>/<ARTIFACT>/<VERSION>/<FILENAME>'" + authHeader +
" -o '<OUTPUT_FILE_NAME>'"
// Replace the placeholders with the actual values
replacements := map[string]string{
"<HOSTNAME>": regURL,
"<ARTIFACT>": artifact,
"<VERSION>": version,
"<FILENAME>": filename,
"<AUTH_HEADER_PREFIX>": setupDetailsAuthHeaderPrefix,
}
for placeholder, value := range replacements {
downloadCommand = strings.ReplaceAll(downloadCommand, placeholder, value)
}
return downloadCommand
}
// CleanURLPath removes leading and trailing spaces and trailing slashes from the given URL string.
func CleanURLPath(input *string) {
if input == nil {
return
}
// Parse the input to URL
u, err := url.Parse(*input)
if err != nil {
return
}
// Clean the path by removing trailing slashes and spaces
cleanedPath := strings.TrimRight(strings.TrimSpace(u.Path), "/")
// Update the URL path in the original input string
u.Path = cleanedPath
// Update the input string with the cleaned URL string representation
*input = u.String()
}
// - 401: Authentication is required but missing or invalid
// - 403: Authentication succeeded but user lacks required permissions.
func HandleAuthError(err error) (statusCode int, message string) {
if errors.Is(err, apiauth.ErrUnauthorized) {
return http.StatusUnauthorized, err.Error()
}
if errors.Is(err, apiauth.ErrForbidden) {
return http.StatusForbidden, err.Error()
}
// Default to forbidden for other auth-related errors
return http.StatusForbidden, err.Error()
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifact_detail_test.go | registry/app/api/controller/metadata/get_artifact_detail_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata_test
import (
"context"
"encoding/json"
"net/http"
"os"
"path/filepath"
"testing"
"time"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/controller/mocks"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
"github.com/stretchr/testify/require"
)
const (
errorTypeSpaceNotFound = "space_not_found"
errorTypeUnauthorized = "unauthorized"
envUpdateSnapshots = "UPDATE_SNAPSHOTS"
envValueTrue = "true"
snapshotFilePermissions = 0600
)
func TestGetArtifactDetails(t *testing.T) {
tests := []struct {
name string
packageType artifact.PackageType
setupMocks func() *metadata.APIController
expectedResp any
}{
{
name: "maven_artifact_success",
packageType: artifact.PackageTypeMAVEN,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "generic_artifact_success",
packageType: artifact.PackageTypeGENERIC,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "python_artifact_success",
packageType: artifact.PackageTypePYTHON,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "npm_artifact_success",
packageType: artifact.PackageTypeNPM,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "rpm_artifact_success",
packageType: artifact.PackageTypeRPM,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "nuget_artifact_success",
packageType: artifact.PackageTypeNUGET,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "go_artifact_success",
packageType: artifact.PackageTypeGO,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "huggingface_artifact_success",
packageType: artifact.PackageTypeHUGGINGFACE,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "docker_artifact_success",
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: "helm_artifact_success",
packageType: artifact.PackageTypeHELM,
setupMocks: func() *metadata.APIController {
return setupBasicController(t)
},
expectedResp: artifact.GetArtifactDetails200JSONResponse{},
},
{
name: errorTypeSpaceNotFound,
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupControllerWithError(t, errorTypeSpaceNotFound)
},
expectedResp: artifact.GetArtifactDetails400JSONResponse{},
},
{
name: "unauthorized_access",
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupControllerWithError(t, errorTypeUnauthorized)
},
expectedResp: artifact.GetArtifactDetails403JSONResponse{},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := tt.setupMocks()
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
req := artifact.GetArtifactDetailsRequestObject{
RegistryRef: artifact.RegistryRefPathParam("test-registry"),
Artifact: artifact.ArtifactPathParam("test-artifact"),
Version: artifact.VersionPathParam("v1.0.0"),
Params: artifact.GetArtifactDetailsParams{},
}
resp, err := controller.GetArtifactDetails(ctx, req)
assert.NoError(t, err)
assert.NotNil(t, resp)
// Verify response type matches expected
switch tt.expectedResp.(type) {
case artifact.GetArtifactDetails200JSONResponse:
actualResp, ok := resp.(artifact.GetArtifactDetails200JSONResponse)
assert.True(t, ok, "Expected 200 response")
if ok {
assert.Equal(t, artifact.Status("SUCCESS"), actualResp.Status, "Expected SUCCESS status")
assert.NotNil(t, actualResp.Data, "Expected artifact data to be present")
}
case artifact.GetArtifactDetails400JSONResponse:
_, ok := resp.(artifact.GetArtifactDetails400JSONResponse)
assert.True(t, ok, "Expected 400 response")
case artifact.GetArtifactDetails403JSONResponse:
_, ok := resp.(artifact.GetArtifactDetails403JSONResponse)
assert.True(t, ok, "Expected 403 response")
case artifact.GetArtifactDetails500JSONResponse:
_, ok := resp.(artifact.GetArtifactDetails500JSONResponse)
assert.True(t, ok, "Expected 500 response")
}
})
}
}
// Helper functions
func setupBasicController(_ *testing.T) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
mockImageStore := new(mocks.ImageRepository)
mockArtifactStore := new(mocks.ArtifactRepository)
mockDownloadStatRepo := new(mocks.MockDownloadStatRepository)
mockQuarantineRepo := new(mocks.MockQuarantineArtifactRepository)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
baseInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
}
registry := &types.Registry{
ID: 1,
Name: "test-registry",
ParentID: 2,
PackageType: artifact.PackageTypeDOCKER,
}
image := &types.Image{
ID: 1,
Name: "test-artifact",
RegistryID: 1,
CreatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
UpdatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
}
metadataBytes, _ := json.Marshal(map[string]any{
"name": "test-artifact",
"version": "v1.0.0",
"description": "Test artifact",
})
art := &types.Artifact{
ID: 1,
ImageID: 1,
Version: "v1.0.0",
CreatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
UpdatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
Metadata: metadataBytes,
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "test-registry").
Return(registry, nil)
mockImageStore.On("GetByNameAndType", mock.Anything, int64(1), "test-artifact", mock.Anything).
Return(image, nil)
mockArtifactStore.On("GetByName", mock.Anything, int64(1), "v1.0.0").
Return(art, nil)
mockDownloadStatRepo.On("GetTotalDownloadsForArtifactID", mock.Anything, int64(1)).
Return(int64(100), nil)
mockQuarantineRepo.On("GetByFilePath", mock.Anything, "", int64(1), "test-artifact", "v1.0.0", mock.Anything).
Return([]*types.QuarantineArtifact{}, nil)
fileManager := createFileManager()
eventReporter := createEventReporter()
return metadata.NewAPIController(
mockRegistryRepo, fileManager, nil, nil, nil, nil, nil, nil, mockImageStore, nil,
mockSpaceFinder, nil, nil, mockAuthorizer, nil, mockArtifactStore, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, mockDownloadStatRepo, "",
nil, nil, nil, nil, nil, mockQuarantineRepo, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
}
func setupControllerWithError(_ *testing.T, errorType string) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
baseInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
}
switch errorType {
case errorTypeSpaceNotFound:
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").
Return(nil, http.ErrNotSupported)
case errorTypeUnauthorized:
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(false, http.ErrNotSupported)
}
fileManager := createFileManager()
eventReporter := createEventReporter()
return metadata.NewAPIController(
nil, fileManager, nil, nil, nil, nil, nil, nil, nil, nil,
mockSpaceFinder, nil, nil, mockAuthorizer, nil, nil, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
}
// TestGetArtifactDetailsSnapshot tests that the generated artifact details
// match the expected snapshots for all package types. This ensures consistency across runs.
func TestGetArtifactDetailsSnapshot(t *testing.T) {
tests := []struct {
name string
packageType artifact.PackageType
}{
{name: "docker_artifact", packageType: artifact.PackageTypeDOCKER},
{name: "helm_artifact", packageType: artifact.PackageTypeHELM},
{name: "maven_artifact", packageType: artifact.PackageTypeMAVEN},
{name: "generic_artifact", packageType: artifact.PackageTypeGENERIC},
{name: "python_artifact", packageType: artifact.PackageTypePYTHON},
{name: "npm_artifact", packageType: artifact.PackageTypeNPM},
{name: "rpm_artifact", packageType: artifact.PackageTypeRPM},
{name: "nuget_artifact", packageType: artifact.PackageTypeNUGET},
{name: "go_artifact", packageType: artifact.PackageTypeGO},
{name: "huggingface_artifact", packageType: artifact.PackageTypeHUGGINGFACE},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := setupSnapshotController(t, tt.packageType)
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
req := artifact.GetArtifactDetailsRequestObject{
RegistryRef: artifact.RegistryRefPathParam("test-registry"),
Artifact: artifact.ArtifactPathParam("test-artifact"),
Version: artifact.VersionPathParam("v1.0.0"),
Params: artifact.GetArtifactDetailsParams{},
}
resp, err := controller.GetArtifactDetails(ctx, req)
require.NoError(t, err)
actualResp, ok := resp.(artifact.GetArtifactDetails200JSONResponse)
require.True(t, ok, "Expected 200 response")
require.Equal(t, artifact.Status("SUCCESS"), actualResp.Status)
// Verify snapshot
verifyArtifactSnapshot(t, tt.name, actualResp.Data)
})
}
}
func setupSnapshotController(_ *testing.T, packageType artifact.PackageType) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
mockImageStore := new(mocks.ImageRepository)
mockArtifactStore := new(mocks.ArtifactRepository)
mockDownloadStatRepo := new(mocks.MockDownloadStatRepository)
mockQuarantineRepo := new(mocks.MockQuarantineArtifactRepository)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
baseInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
}
registry := &types.Registry{
ID: 1,
Name: "test-registry",
ParentID: 2,
PackageType: packageType,
}
image := &types.Image{
ID: 1,
Name: "test-artifact",
RegistryID: 1,
CreatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
UpdatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "test-registry").
Return(registry, nil)
// Create metadata based on package type
var metadataBytes []byte
switch packageType { //nolint:exhaustive // Only testing specific package types
case artifact.PackageTypeMAVEN:
metadataBytes, _ = json.Marshal(map[string]any{
"groupId": "com.example",
"artifactId": "test-artifact",
"version": "v1.0.0",
})
case artifact.PackageTypeGENERIC:
metadataBytes, _ = json.Marshal(map[string]any{
"files": []map[string]any{
{
"name": "test-file.txt",
"size": 1024,
},
},
"file_count": 1,
"size": 1024,
})
default:
metadataBytes, _ = json.Marshal(map[string]any{
"name": "test-artifact",
"version": "v1.0.0",
"description": "Test artifact for " + string(packageType),
})
}
art := &types.Artifact{
ID: 1,
ImageID: 1,
Version: "v1.0.0",
CreatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
UpdatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
Metadata: metadataBytes,
}
mockImageStore.On("GetByNameAndType", mock.Anything, int64(1), "test-artifact", mock.Anything).
Return(image, nil)
mockArtifactStore.On("GetByName", mock.Anything, int64(1), "v1.0.0").
Return(art, nil)
mockDownloadStatRepo.On("GetTotalDownloadsForArtifactID", mock.Anything, int64(1)).
Return(int64(100), nil)
mockQuarantineRepo.On("GetByFilePath", mock.Anything, "", int64(1), "test-artifact", "v1.0.0", mock.Anything).
Return([]*types.QuarantineArtifact{}, nil)
fileManager := createFileManager()
eventReporter := createEventReporter()
return metadata.NewAPIController(
mockRegistryRepo, fileManager, nil, nil, nil, nil, nil, nil, mockImageStore, nil,
mockSpaceFinder, nil, nil, mockAuthorizer, nil, mockArtifactStore, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, mockDownloadStatRepo, "",
nil, nil, nil, nil, nil, mockQuarantineRepo, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
}
// verifyArtifactSnapshot compares the actual artifact detail data with a stored snapshot.
func verifyArtifactSnapshot(t *testing.T, name string, actual artifact.ArtifactDetail) {
t.Helper()
snapshotDir := filepath.Join("testdata", "snapshots", "artifact_details")
snapshotFile := filepath.Join(snapshotDir, name+".json")
// Marshal actual data to JSON
actualJSON, err := json.MarshalIndent(actual, "", " ")
require.NoError(t, err, "Failed to marshal actual data")
// Check if UPDATE_SNAPSHOTS environment variable is set
if os.Getenv(envUpdateSnapshots) == envValueTrue {
// Create directory if it doesn't exist
err := os.MkdirAll(snapshotDir, 0755)
require.NoError(t, err, "Failed to create snapshot directory")
// Write snapshot
err = os.WriteFile(snapshotFile, actualJSON, snapshotFilePermissions)
require.NoError(t, err, "Failed to write snapshot file")
t.Logf("Updated snapshot: %s", snapshotFile)
return
}
// Read existing snapshot
expectedJSON, err := os.ReadFile(snapshotFile)
if os.IsNotExist(err) {
t.Fatalf("Snapshot file does not exist: %s\nRun tests with UPDATE_SNAPSHOTS=true to create it", snapshotFile)
}
require.NoError(t, err, "Failed to read snapshot file")
// Compare JSON
var expected, actualParsed any
require.NoError(t, json.Unmarshal(expectedJSON, &expected), "Failed to unmarshal expected JSON")
require.NoError(t, json.Unmarshal(actualJSON, &actualParsed), "Failed to unmarshal actual JSON")
assert.Equal(t, expected, actualParsed,
"Snapshot mismatch for %s.\nExpected:\n%s\n\nActual:\n%s\n\nRun tests with UPDATE_SNAPSHOTS=true to update snapshots",
name, string(expectedJSON), string(actualJSON))
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifact_files_test.go | registry/app/api/controller/metadata/get_artifact_files_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata_test
import (
"context"
"encoding/json"
"net/http"
"os"
"path/filepath"
"testing"
"time"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/controller/mocks"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/pkg/filemanager"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
"github.com/stretchr/testify/require"
)
// TestGetArtifactFiles tests the GetArtifactFiles endpoint for various package types.
//
// Note: This test is currently skipped because it requires a NodesRepository mock that doesn't exist yet.
// To enable this test:
// 1. Create a NodesRepository mock in registry/app/api/controller/mocks/
// 2. Mock the GetFilesMetadataByPathAndRegistryID and CountFilesByPath methods
// 3. Remove the t.Skip() call below
//
// Reference snapshots exist in testdata/snapshots/artifact_files/ for expected responses.
func TestGetArtifactFiles(t *testing.T) {
t.Skip("Skipping - requires NodesRepository mock to be created. See comment above for details.")
tests := []struct {
name string
packageType artifact.PackageType
setupMocks func() *metadata.APIController
expectedResp any
}{
{
name: "maven_files_success",
packageType: artifact.PackageTypeMAVEN,
setupMocks: func() *metadata.APIController {
return setupFilesController(t, artifact.PackageTypeMAVEN)
},
expectedResp: artifact.GetArtifactFiles200JSONResponse{},
},
{
name: "generic_files_success",
packageType: artifact.PackageTypeGENERIC,
setupMocks: func() *metadata.APIController {
return setupFilesController(t, artifact.PackageTypeGENERIC)
},
expectedResp: artifact.GetArtifactFiles200JSONResponse{},
},
{
name: "python_files_success",
packageType: artifact.PackageTypePYTHON,
setupMocks: func() *metadata.APIController {
return setupFilesController(t, artifact.PackageTypePYTHON)
},
expectedResp: artifact.GetArtifactFiles200JSONResponse{},
},
{
name: "npm_files_success",
packageType: artifact.PackageTypeNPM,
setupMocks: func() *metadata.APIController {
return setupFilesController(t, artifact.PackageTypeNPM)
},
expectedResp: artifact.GetArtifactFiles200JSONResponse{},
},
{
name: "rpm_files_success",
packageType: artifact.PackageTypeRPM,
setupMocks: func() *metadata.APIController {
return setupFilesController(t, artifact.PackageTypeRPM)
},
expectedResp: artifact.GetArtifactFiles200JSONResponse{},
},
{
name: "nuget_files_success",
packageType: artifact.PackageTypeNUGET,
setupMocks: func() *metadata.APIController {
return setupFilesController(t, artifact.PackageTypeNUGET)
},
expectedResp: artifact.GetArtifactFiles200JSONResponse{},
},
{
name: "go_files_success",
packageType: artifact.PackageTypeGO,
setupMocks: func() *metadata.APIController {
return setupFilesController(t, artifact.PackageTypeGO)
},
expectedResp: artifact.GetArtifactFiles200JSONResponse{},
},
{
name: "huggingface_files_success",
packageType: artifact.PackageTypeHUGGINGFACE,
setupMocks: func() *metadata.APIController {
return setupFilesController(t, artifact.PackageTypeHUGGINGFACE)
},
expectedResp: artifact.GetArtifactFiles200JSONResponse{},
},
{
name: errorTypeSpaceNotFound,
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupFilesControllerWithError(t, errorTypeSpaceNotFound)
},
expectedResp: artifact.GetArtifactFiles400JSONResponse{},
},
{
name: "unauthorized_access",
packageType: artifact.PackageTypeDOCKER,
setupMocks: func() *metadata.APIController {
return setupFilesControllerWithError(t, errorTypeUnauthorized)
},
expectedResp: artifact.GetArtifactFiles403JSONResponse{},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := tt.setupMocks()
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
req := artifact.GetArtifactFilesRequestObject{
RegistryRef: artifact.RegistryRefPathParam("test-registry"),
Artifact: artifact.ArtifactPathParam("test-artifact"),
Version: artifact.VersionPathParam("v1.0.0"),
Params: artifact.GetArtifactFilesParams{},
}
resp, err := controller.GetArtifactFiles(ctx, req)
assert.NoError(t, err)
assert.NotNil(t, resp)
// Verify response type matches expected
switch tt.expectedResp.(type) {
case artifact.GetArtifactFiles200JSONResponse:
_, ok := resp.(artifact.GetArtifactFiles200JSONResponse)
assert.True(t, ok, "Expected 200 response")
case artifact.GetArtifactFiles400JSONResponse:
_, ok := resp.(artifact.GetArtifactFiles400JSONResponse)
assert.True(t, ok, "Expected 400 response")
case artifact.GetArtifactFiles403JSONResponse:
_, ok := resp.(artifact.GetArtifactFiles403JSONResponse)
assert.True(t, ok, "Expected 403 response")
case artifact.GetArtifactFiles500JSONResponse:
_, ok := resp.(artifact.GetArtifactFiles500JSONResponse)
assert.True(t, ok, "Expected 500 response")
}
})
}
}
// TestGetArtifactFilesSnapshot tests that the generated artifact files responses
// match the expected snapshots for all package types. This ensures consistency across runs.
//
// Note: This test is currently skipped for the same reason as TestGetArtifactFiles.
// See TestGetArtifactFiles comment for details on how to enable.
func TestGetArtifactFilesSnapshot(t *testing.T) {
t.Skip("Skipping - requires NodesRepository mock. See TestGetArtifactFiles comment for details.")
tests := []struct {
name string
packageType artifact.PackageType
}{
{name: "maven_files", packageType: artifact.PackageTypeMAVEN},
{name: "generic_files", packageType: artifact.PackageTypeGENERIC},
{name: "python_files", packageType: artifact.PackageTypePYTHON},
{name: "npm_files", packageType: artifact.PackageTypeNPM},
{name: "rpm_files", packageType: artifact.PackageTypeRPM},
{name: "nuget_files", packageType: artifact.PackageTypeNUGET},
{name: "go_files", packageType: artifact.PackageTypeGO},
{name: "huggingface_files", packageType: artifact.PackageTypeHUGGINGFACE},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := setupFilesSnapshotController(t, tt.packageType)
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
req := artifact.GetArtifactFilesRequestObject{
RegistryRef: artifact.RegistryRefPathParam("test-registry"),
Artifact: artifact.ArtifactPathParam("test-artifact"),
Version: artifact.VersionPathParam("v1.0.0"),
Params: artifact.GetArtifactFilesParams{},
}
resp, err := controller.GetArtifactFiles(ctx, req)
require.NoError(t, err)
actualResp, ok := resp.(artifact.GetArtifactFiles200JSONResponse)
require.True(t, ok, "Expected 200 response")
require.Equal(t, artifact.Status("SUCCESS"), actualResp.Status)
// Verify snapshot
verifyFilesSnapshot(t, tt.name, actualResp.FileDetailResponseJSONResponse)
})
}
}
// Helper functions
func setupFilesController(_ *testing.T, packageType artifact.PackageType) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
mockImageStore := new(mocks.ImageRepository)
mockArtifactStore := new(mocks.ArtifactRepository)
mockGenericBlobRepo := new(mocks.GenericBlobRepository)
mockTransactor := new(mocks.Transactor)
mockURLProvider := new(mocks.Provider)
// Create FileManager with mocked dependencies
// Note: NodesRepository mock doesn't exist yet, so passing nil
// This will cause the test to fail if it tries to access file metadata
mockFileManager := filemanager.NewFileManager(
mockRegistryRepo,
mockGenericBlobRepo,
nil, // nodesRepo - TODO: Create NodesRepository mock
mockTransactor,
nil, // reporter
nil, // config
nil, // storageService
nil, // bucketService
)
// TODO: Once NodesRepository mock is created, add these mocks:
// mockNodesRepo.On("GetFilesMetadataByPathAndRegistryID", ...).Return(&fileMetadata, nil)
// mockNodesRepo.On("CountFilesByPath", ...).Return(int64(1), nil)
// Mock URLProvider methods
mockURLProvider.On("PackageURL", mock.Anything, mock.Anything, mock.Anything).
Return("https://registry.example.com/root/test-registry")
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything, mock.Anything, mock.Anything).
Return("https://registry.example.com/root/test-registry")
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
baseInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
}
registry := &types.Registry{
ID: 1,
Name: "test-registry",
ParentID: 2,
PackageType: packageType,
}
image := &types.Image{
ID: 1,
Name: "test-artifact",
RegistryID: 1,
CreatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
UpdatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
}
art := &types.Artifact{
ID: 1,
ImageID: 1,
Version: "v1.0.0",
CreatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
UpdatedAt: time.Date(2024, 1, 1, 0, 0, 0, 0, time.UTC),
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "test-registry").
Return(registry, nil)
mockImageStore.On("GetByNameAndType", mock.Anything, int64(1), "test-artifact", mock.Anything).
Return(image, nil)
mockArtifactStore.On("GetByName", mock.Anything, int64(1), "v1.0.0").
Return(art, nil)
eventReporter := createEventReporter()
mockPackageWrapper := new(mocks.MockPackageWrapper)
// Mock PackageWrapper methods for all package types
mockPackageWrapper.On("GetFilePath", mock.Anything, mock.Anything, mock.Anything).
Return("test-artifact/v1.0.0", nil)
mockPackageWrapper.On("GetPackageURL",
mock.Anything, mock.Anything, mock.Anything, mock.Anything).
Return("https://registry.example.com/root/test-registry", nil)
mockPackageWrapper.On("GetFileMetadata",
mock.Anything, mock.Anything, mock.Anything, mock.Anything,
mock.Anything, mock.Anything, mock.Anything).
Return(&artifact.FileDetail{})
return metadata.NewAPIController(
mockRegistryRepo, mockFileManager, nil, mockGenericBlobRepo, nil, nil, nil, nil, mockImageStore, nil,
mockSpaceFinder, nil, mockURLProvider, mockAuthorizer, nil, mockArtifactStore, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
mockPackageWrapper, nil,
)
}
func setupFilesControllerWithError(_ *testing.T, errorType string) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
baseInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
}
switch errorType {
case errorTypeSpaceNotFound:
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").
Return(nil, http.ErrNotSupported)
case errorTypeUnauthorized:
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "test-registry").
Return(baseInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(false, http.ErrNotSupported)
}
fileManager := createFileManager()
eventReporter := createEventReporter()
return metadata.NewAPIController(
nil, fileManager, nil, nil, nil, nil, nil, nil, nil, nil,
mockSpaceFinder, nil, nil, mockAuthorizer, nil, nil, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
}
func setupFilesSnapshotController(t *testing.T, packageType artifact.PackageType) *metadata.APIController {
return setupFilesController(t, packageType)
}
// verifyFilesSnapshot compares the actual artifact files data with a stored snapshot.
func verifyFilesSnapshot(t *testing.T, name string, actual artifact.FileDetailResponseJSONResponse) {
t.Helper()
snapshotDir := filepath.Join("testdata", "snapshots", "artifact_files")
snapshotFile := filepath.Join(snapshotDir, name+".json")
// Marshal actual data to JSON
actualJSON, err := json.MarshalIndent(actual, "", " ")
require.NoError(t, err, "Failed to marshal actual data")
// Check if UPDATE_SNAPSHOTS environment variable is set
if os.Getenv(envUpdateSnapshots) == envValueTrue {
// Create directory if it doesn't exist
err := os.MkdirAll(snapshotDir, 0755)
require.NoError(t, err, "Failed to create snapshot directory")
// Write snapshot
err = os.WriteFile(snapshotFile, actualJSON, snapshotFilePermissions)
require.NoError(t, err, "Failed to write snapshot file")
t.Logf("Updated snapshot: %s", snapshotFile)
return
}
// Read existing snapshot
expectedJSON, err := os.ReadFile(snapshotFile)
if os.IsNotExist(err) {
t.Fatalf("Snapshot file does not exist: %s\nRun tests with UPDATE_SNAPSHOTS=true to create it", snapshotFile)
}
require.NoError(t, err, "Failed to read snapshot file")
// Compare JSON
var expected, actualParsed any
require.NoError(t, json.Unmarshal(expectedJSON, &expected), "Failed to unmarshal expected JSON")
require.NoError(t, json.Unmarshal(actualJSON, &actualParsed), "Failed to unmarshal actual JSON")
assert.Equal(t, expected, actualParsed,
"Snapshot mismatch for %s.\nExpected:\n%s\n\nActual:\n%s\n\nRun tests with UPDATE_SNAPSHOTS=true to update snapshots",
name, string(expectedJSON), string(actualJSON))
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/create_registry.go | registry/app/api/controller/metadata/create_registry.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"net/http"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/api/usererror"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
registrytypes "github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types"
gitnessenum "github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) CreateRegistry(
ctx context.Context,
r artifact.CreateRegistryRequestObject,
) (artifact.CreateRegistryResponseObject, error) {
registryRequest := artifact.RegistryRequest(*r.Body)
parentRef := artifact.SpaceRefPathParam(registryRequest.ParentRef)
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, string(parentRef), "")
if err != nil {
//nolint:nilerr
return artifact.CreateRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
//nolint:nilerr
return artifact.CreateRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
if registryRequest.IsPublic {
isPublicAccessSupported, err := c.PublicAccess.
IsPublicAccessSupported(ctx, gitnessenum.PublicResourceTypeRegistry, space.Path)
if err != nil {
return artifact.CreateRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, fmt.Errorf(
"failed to check if public access is supported for parent space %q: %w",
space.Path,
err,
).Error()),
),
}, nil
}
if !isPublicAccessSupported {
return artifact.CreateRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, errPublicArtifactRegistryCreationDisabled.Error()),
),
}, nil
}
}
session, _ := request.AuthSessionFrom(ctx)
if err = apiauth.CheckSpaceScope(
ctx,
c.Authorizer,
session,
space,
gitnessenum.ResourceTypeRegistry,
gitnessenum.PermissionRegistryEdit,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
//nolint:nilerr
return artifact.CreateRegistry401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
//nolint:nilerr
return artifact.CreateRegistry403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
if registryRequest.Config.Type == artifact.RegistryTypeVIRTUAL {
return c.createVirtualRegistry(ctx, registryRequest, regInfo, session, parentRef)
}
registry, upstreamproxy, err := c.CreateUpstreamProxyEntity(
ctx,
registryRequest,
regInfo.ParentID, regInfo.RootIdentifierID,
)
var registryID int64
if err != nil {
//nolint:nilerr
return throwCreateRegistry400Error(err), nil
}
err = c.tx.WithTx(
ctx, func(ctx context.Context) error {
registryID, err = c.createRegistryWithAudit(ctx, registry, session.Principal, string(parentRef))
if err != nil {
return fmt.Errorf("%w", err)
}
upstreamproxy.RegistryID = registryID
_, err = c.createUpstreamProxyWithAudit(
ctx, upstreamproxy, session.Principal, string(parentRef), registry.Name,
)
if err != nil {
return fmt.Errorf("failed to create upstream proxy: %w", err)
}
return nil
},
)
if err != nil {
if isDuplicateKeyError(err) {
if err2 := c.handleDuplicateRegistryError(ctx, registry); err2 != nil {
return throwCreateRegistry400Error(err2), nil //nolint:nilerr
}
}
return throwCreateRegistry400Error(err), nil //nolint:nilerr
}
upstreamproxyEntity, err := c.UpstreamProxyStore.Get(ctx, registryID)
if err != nil {
return throwCreateRegistry400Error(err), nil //nolint:nilerr
}
if registry.PackageType == artifact.PackageTypeRPM {
c.PostProcessingReporter.BuildRegistryIndex(ctx, registry.ID, make([]registrytypes.SourceRef, 0))
} else {
err = c.PackageWrapper.ReportBuildRegistryIndexEvent(ctx, registry.ID, make([]registrytypes.SourceRef, 0))
log.Error().Err(err).Msg("failed to report build registry index event")
}
ref := space.Path + "/" + upstreamproxyEntity.RepoKey
jsonResponse, err := c.CreateUpstreamProxyResponseJSONResponse(ctx, upstreamproxyEntity, ref)
if err != nil {
//nolint:nilerr
return artifact.CreateRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.CreateRegistry201JSONResponse{
RegistryResponseJSONResponse: *jsonResponse,
}, nil
}
func (c *APIController) createVirtualRegistry(
ctx context.Context, registryRequest artifact.RegistryRequest, regInfo *registrytypes.RegistryRequestBaseInfo,
session *auth.Session, parentRef artifact.SpaceRefPathParam,
) (artifact.CreateRegistryResponseObject, error) {
registry, err := c.CreateRegistryEntity(registryRequest, regInfo.ParentID, regInfo.RootIdentifierID)
if err != nil {
return throwCreateRegistry400Error(err), nil
}
if registry.PackageType != artifact.PackageTypeGENERIC {
err = c.setUpstreamProxyIDs(ctx, registry, registryRequest, regInfo.ParentID)
}
if err != nil {
return throwCreateRegistry400Error(err), nil
}
id, err := c.createRegistryWithAudit(ctx, registry, session.Principal, string(parentRef))
if err != nil {
if isDuplicateKeyError(err) {
if err2 := c.handleDuplicateRegistryError(ctx, registry); err2 != nil {
return throwCreateRegistry400Error(err2), nil //nolint:nilerr
}
}
return throwCreateRegistry400Error(err), nil
}
repoEntity, err := c.RegistryRepository.Get(ctx, id)
if err != nil {
return throwCreateRegistry400Error(err), nil
}
cleanupPolicies, err := c.CleanupPolicyStore.GetByRegistryID(ctx, repoEntity.ID)
if err != nil {
return throwCreateRegistry400Error(err), nil
}
repoURL := c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, repoEntity.Name)
space, err := c.SpaceFinder.FindByID(ctx, repoEntity.ParentID)
if err != nil {
return throwCreateRegistry400Error(err), nil
}
ref := space.Path + "/" + repoEntity.Name
jsonResponse, err := c.CreateVirtualRepositoryResponse(ctx,
repoEntity, c.getUpstreamProxyKeys(ctx, repoEntity.UpstreamProxies),
cleanupPolicies, repoURL, ref)
if err != nil {
return artifact.CreateRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.CreateRegistry201JSONResponse{
RegistryResponseJSONResponse: *jsonResponse,
}, nil
}
func (c *APIController) createUpstreamProxyWithAudit(
ctx context.Context,
upstreamProxy *registrytypes.UpstreamProxyConfig, principal types.Principal,
parentRef string, registryName string,
) (int64, error) {
id, err := c.UpstreamProxyStore.Create(ctx, upstreamProxy)
if err != nil {
return id, err
}
auditErr := c.AuditService.Log(
ctx,
principal,
audit.NewResource(audit.ResourceTypeRegistryUpstreamProxy, registryName),
audit.ActionCreated,
parentRef,
audit.WithNewObject(
audit.RegistryUpstreamProxyConfigObject{
ID: id,
RegistryID: upstreamProxy.RegistryID,
Source: upstreamProxy.Source,
URL: upstreamProxy.URL,
AuthType: upstreamProxy.AuthType,
CreatedAt: upstreamProxy.CreatedAt,
UpdatedAt: upstreamProxy.UpdatedAt,
CreatedBy: upstreamProxy.CreatedBy,
UpdatedBy: upstreamProxy.UpdatedBy,
},
),
)
if auditErr != nil {
log.Ctx(ctx).Warn().Msgf(
"failed to insert audit log for create upstream proxy config operation: %s", auditErr,
)
}
return id, err
}
func (c *APIController) createRegistryWithAudit(
ctx context.Context, registry *registrytypes.Registry,
principal types.Principal, parentRef string,
) (int64, error) {
id, err := c.RegistryRepository.Create(ctx, registry)
if err != nil {
return id, err
}
registryRef := parentRef + "/" + registry.Name
err = c.PublicAccess.Set(ctx, gitnessenum.PublicResourceTypeRegistry, registryRef, registry.IsPublic)
if err != nil {
if dErr := c.PublicAccess.Delete(ctx, gitnessenum.PublicResourceTypeRegistry, registryRef); dErr != nil {
return 0, fmt.Errorf("failed to set registry public access (and public access cleanup: %w): %w", dErr, err)
}
if dErr := c.RegistryRepository.Delete(ctx, registry.ParentID, registry.Name); dErr != nil {
return 0, fmt.Errorf("failed to set repo public access (and registry delete: %w): %w", dErr, err)
}
return 0, fmt.Errorf("failed to set repo public access (successful cleanup): %w", err)
}
auditErr := c.AuditService.Log(
ctx,
principal,
audit.NewResource(audit.ResourceTypeRegistry, registry.Name),
audit.ActionCreated,
parentRef,
audit.WithNewObject(
audit.RegistryObject{
Registry: *registry,
},
),
)
if auditErr != nil {
log.Ctx(ctx).Warn().Msgf("failed to insert audit log for create registry operation: %s", auditErr)
}
return id, err
}
func throwCreateRegistry400Error(err error) artifact.CreateRegistry400JSONResponse {
return artifact.CreateRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}
}
func (c *APIController) CreateRegistryEntity(
dto artifact.RegistryRequest, parentID int64,
rootParentID int64,
) (*registrytypes.Registry, error) {
allowedPattern, blockedPattern, description, labels := getRepoEntityFields(dto)
ok := c.PackageWrapper.IsValidPackageType(string(dto.PackageType))
if !ok {
return nil, usererror.BadRequest(fmt.Sprintf("invalid package type: %s", dto.PackageType))
}
ok = c.PackageWrapper.ValidateRepoType(string(dto.PackageType), string(dto.Config.Type))
if !ok {
return nil, usererror.BadRequest(fmt.Sprintf("invalid repo type: %s", dto.Config.Type))
}
e := ValidateIdentifier(dto.Identifier)
if e != nil {
return nil, e
}
entity := ®istrytypes.Registry{
Name: dto.Identifier,
ParentID: parentID,
RootParentID: rootParentID,
Description: description,
AllowedPattern: allowedPattern,
BlockedPattern: blockedPattern,
PackageType: dto.PackageType,
Labels: labels,
Type: dto.Config.Type,
IsPublic: dto.IsPublic,
}
return entity, nil
}
//nolint:gocognit,cyclop
func (c *APIController) CreateUpstreamProxyEntity(
ctx context.Context, dto artifact.RegistryRequest, parentID int64, rootParentID int64,
) (*registrytypes.Registry, *registrytypes.UpstreamProxyConfig, error) {
allowedPattern := []string{}
if dto.AllowedPattern != nil {
allowedPattern = *dto.AllowedPattern
}
blockedPattern := []string{}
if dto.BlockedPattern != nil {
blockedPattern = *dto.BlockedPattern
}
ok := c.PackageWrapper.IsValidPackageType(string(dto.PackageType))
if !ok {
return nil, nil, usererror.BadRequest(fmt.Sprintf("invalid package type: %s", dto.PackageType))
}
e := ValidateUpstream(c.PackageWrapper, dto.PackageType, dto.Config)
if e != nil {
return nil, nil, e
}
e = ValidateIdentifier(dto.Identifier)
if e != nil {
return nil, nil, e
}
config, e := dto.Config.AsUpstreamConfig()
if e != nil {
return nil, nil, e
}
// Validate URL is present before proceeding (only for sources that require URL)
if config.Source != nil &&
c.PackageWrapper.IsURLRequiredForUpstreamSource(string(dto.PackageType), string(*config.Source)) {
if config.Url == nil {
return nil, nil, usererror.BadRequest("URL is required for upstream repository")
}
}
registryConfig := ®istrytypes.RegistryConfig{}
if config.RemoteUrlSuffix != nil {
registryConfig.RemoteUrlSuffix = *config.RemoteUrlSuffix
}
repoEntity := ®istrytypes.Registry{
Name: dto.Identifier,
ParentID: parentID,
RootParentID: rootParentID,
AllowedPattern: allowedPattern,
BlockedPattern: blockedPattern,
PackageType: dto.PackageType,
Type: artifact.RegistryTypeUPSTREAM,
IsPublic: dto.IsPublic,
Config: registryConfig,
}
CleanURLPath(config.Url)
upstreamProxyConfigEntity := ®istrytypes.UpstreamProxyConfig{
AuthType: string(config.AuthType),
}
if config.Url != nil {
upstreamProxyConfigEntity.URL = *config.Url
}
if config.Source != nil && len(string(*config.Source)) > 0 {
ok := c.PackageWrapper.ValidateUpstreamSource(string(dto.PackageType), string(*config.Source))
if !ok {
return nil, nil, usererror.BadRequest(fmt.Sprintf("invalid upstream source: %s", *config.Source))
}
upstreamProxyConfigEntity.Source = string(*config.Source)
}
//nolint:exhaustive
switch config.AuthType {
case artifact.AuthTypeUserPassword:
res, err := config.Auth.AsUserPassword()
if err != nil {
return nil, nil, err
}
upstreamProxyConfigEntity.UserName = res.UserName
if res.SecretIdentifier == nil {
return nil, nil, fmt.Errorf("failed to create upstream proxy: secret_identifier missing")
}
if res.SecretSpacePath != nil && len(*res.SecretSpacePath) > 0 {
upstreamProxyConfigEntity.SecretSpaceID, err = c.RegistryMetadataHelper.GetSecretSpaceID(ctx,
res.SecretSpacePath)
if err != nil {
return nil, nil, err
}
} else if res.SecretSpaceId != nil {
upstreamProxyConfigEntity.SecretSpaceID = *res.SecretSpaceId
}
upstreamProxyConfigEntity.SecretIdentifier = *res.SecretIdentifier
case artifact.AuthTypeAccessKeySecretKey:
res, err := config.Auth.AsAccessKeySecretKey()
if err != nil {
return nil, nil, err
}
switch {
case res.AccessKey != nil && len(*res.AccessKey) > 0:
upstreamProxyConfigEntity.UserName = *res.AccessKey
case res.AccessKeySecretIdentifier == nil:
return nil, nil, fmt.Errorf("failed to create upstream proxy: access_key_secret_identifier missing")
default:
if res.AccessKeySecretSpacePath != nil && len(*res.AccessKeySecretSpacePath) > 0 {
upstreamProxyConfigEntity.UserNameSecretSpaceID, err =
c.RegistryMetadataHelper.GetSecretSpaceID(ctx, res.AccessKeySecretSpacePath)
if err != nil {
return nil, nil, err
}
} else if res.AccessKeySecretSpaceId != nil {
upstreamProxyConfigEntity.UserNameSecretSpaceID = *res.AccessKeySecretSpaceId
}
upstreamProxyConfigEntity.UserNameSecretIdentifier = *res.AccessKeySecretIdentifier
}
if res.SecretKeySpacePath != nil && len(*res.SecretKeySpacePath) > 0 {
upstreamProxyConfigEntity.SecretSpaceID, err = c.RegistryMetadataHelper.GetSecretSpaceID(ctx,
res.SecretKeySpacePath)
if err != nil {
return nil, nil, err
}
} else if res.SecretKeySpaceId != nil {
upstreamProxyConfigEntity.SecretSpaceID = *res.SecretKeySpaceId
}
upstreamProxyConfigEntity.SecretIdentifier = res.SecretKeyIdentifier
}
return repoEntity, upstreamProxyConfigEntity, nil
}
func isDuplicateKeyError(err error) bool {
return strings.Contains(err.Error(), "resource is a duplicate")
}
func (c *APIController) handleDuplicateRegistryError(ctx context.Context, registry *registrytypes.Registry) error {
registryData, err := c.RegistryRepository.GetByRootParentIDAndName(ctx, registry.RootParentID, registry.Name)
if err != nil {
return fmt.Errorf("failed to fetch existing registry details: %w", err)
}
parentSpace, err := c.SpaceFinder.FindByID(ctx, registryData.ParentID)
if err != nil {
return fmt.Errorf("failed to fetch space details: %w", err)
}
if parentSpace == nil {
return fmt.Errorf("unexpected error: parent space not found")
}
return fmt.Errorf(
"registry '%s' is already defined under '%s'. "+
"Please choose a different name or check existing registries",
registry.Name,
parentSpace.Path,
)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/update_artifact.go | registry/app/api/controller/metadata/update_artifact.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types/enum"
)
func (c *APIController) UpdateArtifactLabels(
ctx context.Context,
r artifact.UpdateArtifactLabelsRequestObject,
) (artifact.UpdateArtifactLabelsResponseObject, error) {
registryRequestParams := &RegistryRequestParams{
packageTypesParam: nil,
page: nil,
size: nil,
search: nil,
Resource: ArtifactVersionResource,
ParentRef: "",
RegRef: string(r.RegistryRef),
labelsParam: nil,
sortOrder: nil,
sortField: nil,
registryIDsParam: nil,
}
regInfo, _ := c.GetRegistryRequestInfo(ctx, *registryRequestParams)
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.UpdateArtifactLabels400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryEdit)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return artifact.UpdateArtifactLabels401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return artifact.UpdateArtifactLabels403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
a := string(r.Artifact)
artifactEntity, err := c.ImageStore.GetByRepoAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier, a)
if len(artifactEntity.Name) == 0 {
return artifact.UpdateArtifactLabels404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "artifact doesn't exist with this name"),
),
}, nil
}
if err != nil {
return throwModifyArtifact400Error(err), nil
}
existingArtifact, err := AttachLabels(artifact.ArtifactLabelRequest(*r.Body), artifactEntity)
if err != nil {
return throwModifyArtifact400Error(err), nil
}
err = c.ImageStore.Update(ctx, existingArtifact)
if err != nil {
return throwModifyArtifact400Error(err), nil
}
// TODO: use the correct way to get download count if this endpoint is used
tag, err := c.TagStore.GetLatestTagMetadata(ctx, regInfo.ParentID, regInfo.RegistryIdentifier, a)
if err != nil {
return artifact.UpdateArtifactLabels500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.UpdateArtifactLabels200JSONResponse{
ArtifactLabelResponseJSONResponse: *getArtifactSummary(*tag),
}, nil
}
func throwModifyArtifact400Error(err error) artifact.UpdateArtifactLabels400JSONResponse {
return artifact.UpdateArtifactLabels400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}
}
func AttachLabels(
dto artifact.ArtifactLabelRequest,
existingArtifact *types.Image,
) (*types.Image, error) {
return &types.Image{
ID: existingArtifact.ID,
RegistryID: existingArtifact.RegistryID,
Name: existingArtifact.Name,
Labels: dto.Labels,
CreatedAt: existingArtifact.CreatedAt,
}, nil
}
func getArtifactSummary(t types.ArtifactMetadata) *artifact.ArtifactLabelResponseJSONResponse {
downloads := int64(0)
createdAt := GetTimeInMs(t.CreatedAt)
modifiedAt := GetTimeInMs(t.ModifiedAt)
artifactVersionSummary := &artifact.ArtifactSummary{
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
DownloadsCount: &downloads,
ImageName: t.Name,
Labels: &t.Labels,
PackageType: t.PackageType,
}
response := &artifact.ArtifactLabelResponseJSONResponse{
Data: *artifactVersionSummary,
Status: artifact.StatusSUCCESS,
}
return response
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts.go | registry/app/api/controller/metadata/get_artifacts.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/registry/utils"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetAllArtifacts(
ctx context.Context,
r artifact.GetAllArtifactsRequestObject,
) (artifact.GetAllArtifactsResponseObject, error) {
registryRequestParams := &RegistryRequestParams{
packageTypesParam: r.Params.PackageType,
page: r.Params.Page,
size: r.Params.Size,
search: r.Params.SearchTerm,
Resource: ArtifactResource,
ParentRef: string(r.SpaceRef),
RegRef: "",
labelsParam: nil,
sortOrder: r.Params.SortOrder,
sortField: r.Params.SortField,
registryIDsParam: r.Params.RegIdentifier,
}
regInfo, err := c.GetRegistryRequestInfo(ctx, *registryRequestParams)
if err != nil {
return c.getAllArtifacts400JsonResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetAllArtifacts400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetAllArtifacts403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
// Validate pagination parameters
if regInfo.limit < 0 || regInfo.offset < 0 {
return artifact.GetAllArtifacts400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "page and size must be non-negative"),
),
}, nil
}
latestVersion := false
if r.Params.LatestVersion != nil {
latestVersion = bool(*r.Params.LatestVersion)
}
var artifacts *[]types.ArtifactMetadata
if c.UntaggedImagesEnabled(ctx) {
artifacts, err = c.TagStore.GetAllArtifactsByParentIDUntagged(
ctx, regInfo.ParentID, ®Info.registryIDs,
regInfo.sortByField, regInfo.sortByOrder, regInfo.limit, regInfo.offset, regInfo.searchTerm,
regInfo.packageTypes)
} else {
artifacts, err = c.TagStore.GetAllArtifactsByParentID(
ctx, regInfo.ParentID, ®Info.registryIDs,
regInfo.sortByField, regInfo.sortByOrder, regInfo.limit, regInfo.offset, regInfo.searchTerm,
latestVersion, regInfo.packageTypes)
}
count, _ := c.TagStore.CountAllArtifactsByParentID(
ctx, regInfo.ParentID, ®Info.registryIDs,
regInfo.searchTerm, latestVersion, regInfo.packageTypes, c.UntaggedImagesEnabled(ctx))
if err != nil {
return artifact.GetAllArtifacts500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
// Enrich artifacts with quarantine information
if artifacts != nil && len(*artifacts) > 0 {
enrichedArtifacts, err := c.enrichArtifactsWithQuarantineInfo(ctx, artifacts, regInfo.ParentID)
if err != nil {
return artifact.GetAllArtifacts500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifacts = enrichedArtifacts
}
return artifact.GetAllArtifacts200JSONResponse{
ListArtifactResponseJSONResponse: *GetAllArtifactResponse(ctx, artifacts, count, regInfo.pageNumber, regInfo.limit,
regInfo.RootIdentifier, c.URLProvider, c.SetupDetailsAuthHeaderPrefix, c.UntaggedImagesEnabled(ctx),
c.PackageWrapper),
}, nil
}
// enrichArtifactsWithQuarantineInfo enriches artifacts with quarantine information.
func (c *APIController) enrichArtifactsWithQuarantineInfo(
ctx context.Context,
artifacts *[]types.ArtifactMetadata,
parentID int64,
) (*[]types.ArtifactMetadata, error) {
if artifacts == nil || len(*artifacts) == 0 {
return artifacts, nil
}
// Collect all artifact identifiers and map them to their indices
artifactIdentifiers := make([]types.ArtifactIdentifier, 0, len(*artifacts))
artifactIndexMap := make(map[types.ArtifactIdentifier]int) // artifactIdentifier -> index in artifacts slice
for i, art := range *artifacts {
// Only process artifacts that have a version
if art.Version != "" {
var version = art.Version
var err error
// For Docker and Helm packages, convert version to parsed digest string
if c.UntaggedImagesEnabled(ctx) &&
(art.PackageType == artifact.PackageTypeDOCKER || art.PackageType == artifact.PackageTypeHELM) {
version, err = utils.GetParsedDigest(version)
if err != nil {
log.Ctx(ctx).Warn().Err(err).
Msgf("Failed to parse digest info while fetching global artifacts")
return nil, err
}
}
artifactID := types.ArtifactIdentifier{
Name: art.Name,
Version: version,
RegistryName: art.RepoName,
}
artifactIdentifiers = append(artifactIdentifiers, artifactID)
artifactIndexMap[artifactID] = i
}
}
// Get quarantine information for all artifacts using regID
quarantineMap, err := c.TagStore.GetQuarantineInfoForArtifacts(ctx, artifactIdentifiers, parentID)
if err != nil {
return nil, err
}
// Update artifacts with quarantine information
for artifactID, quarantineInfo := range quarantineMap {
if index, exists := artifactIndexMap[artifactID]; exists {
(*artifacts)[index].IsQuarantined = true
(*artifacts)[index].QuarantineReason = &quarantineInfo.Reason
}
}
return artifacts, nil
}
func (c *APIController) getAllArtifacts400JsonResponse(err error) (artifact.GetAllArtifactsResponseObject, error) {
return artifact.GetAllArtifacts400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/list_webhooks.go | registry/app/api/controller/metadata/list_webhooks.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
gitnesstypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) ListWebhooks(
ctx context.Context,
r api.ListWebhooksRequestObject,
) (api.ListWebhooksResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return listWebhookInternalErrorResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return listWebhookInternalErrorResponse(err)
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
log.Ctx(ctx).Error().Msgf("permission check failed while listing webhook for registry: %s, error: %v",
regInfo.RegistryIdentifier, err)
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return api.ListWebhooks401JSONResponse{
UnauthenticatedJSONResponse: api.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return api.ListWebhooks403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
offset := GetOffset(r.Params.Size, r.Params.Page)
limit := GetPageLimit(r.Params.Size)
pageNumber := GetPageNumber(r.Params.Page)
searchTerm := ""
if r.Params.SearchTerm != nil {
searchTerm = string(*r.Params.SearchTerm)
}
sortByField := ""
sortByOrder := ""
if r.Params.SortOrder != nil {
sortByOrder = string(*r.Params.SortOrder)
}
if r.Params.SortField != nil {
sortByField = string(*r.Params.SortField)
}
webhooks, err := c.WebhooksRepository.ListByRegistry(
ctx,
sortByField,
sortByOrder,
limit,
offset,
searchTerm,
regInfo.RegistryID,
)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to list webhooks for registry: %s with error: %v", regInfo.RegistryRef, err)
return listWebhookInternalErrorResponse(fmt.Errorf("failed list to webhooks"))
}
count, err := c.WebhooksRepository.CountAllByRegistry(ctx, regInfo.RegistryID, searchTerm)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to list webhooks for registry: %s with error: %v", regInfo.RegistryRef, err)
return listWebhookInternalErrorResponse(fmt.Errorf("failed list to webhooks"))
}
webhooksResponse, err := c.mapToListWebhookResponseEntity(ctx, webhooks)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to list webhooks for registry: %s with error: %v", regInfo.RegistryRef, err)
return listWebhookInternalErrorResponse(fmt.Errorf("failed to list webhooks"))
}
pageCount := GetPageCount(count, limit)
return api.ListWebhooks200JSONResponse{
ListWebhooksResponseJSONResponse: api.ListWebhooksResponseJSONResponse{
Data: api.ListWebhooks{
PageIndex: &pageNumber,
PageCount: &pageCount,
PageSize: &limit,
ItemCount: &count,
Webhooks: webhooksResponse,
},
Status: api.StatusSUCCESS,
},
}, nil
}
func listWebhookInternalErrorResponse(err error) (api.ListWebhooksResponseObject, error) {
return api.ListWebhooks500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
func (c *APIController) mapToListWebhookResponseEntity(
ctx context.Context,
webhooks []*gitnesstypes.WebhookCore,
) ([]api.Webhook, error) {
webhooksEntities := make([]api.Webhook, 0, len(webhooks))
for _, d := range webhooks {
webhook, err := c.RegistryMetadataHelper.MapToWebhookResponseEntity(ctx, d)
if err != nil {
return nil, err
}
webhooksEntities = append(webhooksEntities, *webhook)
}
return webhooksEntities, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/create_webhook.go | registry/app/api/controller/metadata/create_webhook.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"net/http"
"net/url"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
const webhookScopeRegistry = int64(0)
func (c *APIController) CreateWebhook(
ctx context.Context,
r api.CreateWebhookRequestObject,
) (api.CreateWebhookResponseObject, error) {
webhookRequest := api.WebhookRequest(*r.Body)
// Validate required fields
if webhookRequest.Identifier == "" {
return createWebhookBadRequestErrorResponse(fmt.Errorf("webhook identifier is required"))
}
if webhookRequest.Name == "" {
return createWebhookBadRequestErrorResponse(fmt.Errorf("webhook name is required"))
}
if webhookRequest.Url == "" {
return createWebhookBadRequestErrorResponse(fmt.Errorf("webhook url is required"))
}
// Validate URL format
parsedURL, err := url.Parse(webhookRequest.Url)
if err != nil {
return createWebhookBadRequestErrorResponse(fmt.Errorf("invalid webhook url format: %w", err))
}
if parsedURL.Scheme == "" || parsedURL.Host == "" {
return createWebhookBadRequestErrorResponse(fmt.Errorf("webhook url must be a valid URL with scheme and host"))
}
// Only allow http and https schemes (case-insensitive whitelist)
allowedSchemes := map[string]bool{
"http": true,
"https": true,
}
if !allowedSchemes[strings.ToLower(parsedURL.Scheme)] {
return createWebhookBadRequestErrorResponse(fmt.Errorf("webhook url must use http or https scheme"))
}
if webhookRequest.Identifier == internalWebhookIdentifier {
return createWebhookBadRequestErrorResponse(
fmt.Errorf("webhook identifier %s is reserved", internalWebhookIdentifier),
)
}
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return createWebhookBadRequestErrorResponse(err)
}
if regInfo.RegistryType != api.RegistryTypeVIRTUAL {
log.Ctx(ctx).Error().Msgf("failed to store webhook: %s with error: %v", webhookRequest.Identifier, err)
return createWebhookBadRequestErrorResponse(
fmt.Errorf("not allowed to create webhook for %s registry", regInfo.RegistryType),
)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return createWebhookBadRequestErrorResponse(err)
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryEdit)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
log.Ctx(ctx).Error().Msgf("permission check failed while creating webhook for registry: %s, error: %v",
regInfo.RegistryIdentifier, err)
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return api.CreateWebhook401JSONResponse{
UnauthenticatedJSONResponse: api.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return api.CreateWebhook403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
webhook, err := c.RegistryMetadataHelper.MapToWebhookCore(ctx, webhookRequest, regInfo)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to store webhook: %s with error: %v", webhookRequest.Identifier, err)
return createWebhookBadRequestErrorResponse(fmt.Errorf("failed to store webhook %w", err))
}
webhook.Type = enum.WebhookTypeExternal
webhook.CreatedBy = session.Principal.ID
err = c.WebhooksRepository.Create(ctx, webhook)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to store webhook: %s with error: %v", webhookRequest.Identifier, err)
if isDuplicateKeyError(err) {
return createWebhookBadRequestErrorResponse(fmt.Errorf(
"failed to store webhook, Webhook with identifier %s already exists", webhookRequest.Identifier,
))
}
return createWebhookBadRequestErrorResponse(fmt.Errorf("failed to store webhook: %w", err))
}
createdWebhook, err := c.WebhooksRepository.GetByRegistryAndIdentifier(
ctx, regInfo.RegistryID, webhookRequest.Identifier,
)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to stored webhook: %s with error: %v",
webhookRequest.Identifier, err)
return createWebhookInternalErrorResponse(fmt.Errorf("failed to stored webhook: %w", err))
}
webhookResponseEntity, err := c.RegistryMetadataHelper.MapToWebhookResponseEntity(ctx, createdWebhook)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to stored webhook: %s with error: %v",
webhookRequest.Identifier, err)
return createWebhookInternalErrorResponse(fmt.Errorf("failed to stored webhook: %w", err))
}
return api.CreateWebhook201JSONResponse{
WebhookResponseJSONResponse: api.WebhookResponseJSONResponse{
Data: *webhookResponseEntity,
Status: api.StatusSUCCESS,
},
}, nil
}
func createWebhookBadRequestErrorResponse(err error) (api.CreateWebhookResponseObject, error) {
return api.CreateWebhook400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
func createWebhookInternalErrorResponse(err error) (api.CreateWebhookResponseObject, error) {
return api.CreateWebhook500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/update_registry.go | registry/app/api/controller/metadata/update_registry.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"net/http"
"reflect"
"strconv"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/api/usererror"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
types2 "github.com/harness/gitness/types"
gitnessenum "github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) ModifyRegistry(
ctx context.Context,
r artifact.ModifyRegistryRequestObject,
) (artifact.ModifyRegistryResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
//nolint:nilerr // Error is encoded in response, not returned separately
return artifact.ModifyRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
//nolint:nilerr // Error is encoded in response, not returned separately
return artifact.ModifyRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, gitnessenum.PermissionRegistryEdit)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return artifact.ModifyRegistry401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return artifact.ModifyRegistry403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
repoEntity, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return throwModifyRegistry500Error(err), err
}
if string(repoEntity.Type) == string(artifact.RegistryTypeVIRTUAL) {
return c.updateVirtualRegistry(ctx, r, repoEntity, err, regInfo, session, space)
}
upstreamproxyEntity, err := c.UpstreamProxyStore.GetByRegistryIdentifier(
ctx, regInfo.ParentID,
regInfo.RegistryIdentifier,
)
if len(upstreamproxyEntity.RepoKey) == 0 {
return artifact.ModifyRegistry404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "registry doesn't exist with this key"),
),
}, nil
}
if err != nil {
return throwModifyRegistry500Error(err), err
}
registry, upstreamproxy, err := c.UpdateUpstreamProxyEntity(
ctx,
artifact.RegistryRequest(*r.Body),
regInfo.ParentID, regInfo.RootIdentifierID, upstreamproxyEntity,
)
if err != nil {
//nolint:nilerr
return throwModifyRegistry400Error(err), nil
}
registry.ID = repoEntity.ID
upstreamproxy.ID = upstreamproxyEntity.ID
upstreamproxy.RegistryID = repoEntity.ID
if err != nil {
return throwModifyRegistry500Error(err), err
}
err = c.tx.WithTx(
ctx, func(ctx context.Context) error {
err = c.updateRegistryWithAudit(ctx, repoEntity, registry, session.Principal, regInfo.ParentRef)
if err != nil {
return fmt.Errorf("failed to update registry: %w", err)
}
err = c.updateUpstreamProxyWithAudit(
ctx, upstreamproxy, session.Principal, regInfo.ParentRef, registry.Name,
)
if err != nil {
return fmt.Errorf("failed to update upstream proxy: %w", err)
}
return nil
},
)
if err != nil {
return throwModifyRegistry500Error(err), err
}
modifiedRepoEntity, err := c.UpstreamProxyStore.Get(ctx, upstreamproxyEntity.RegistryID)
if err != nil {
return throwModifyRegistry500Error(err), err
}
if registry.PackageType == artifact.PackageTypeRPM {
c.PostProcessingReporter.BuildRegistryIndex(ctx, registry.ID, make([]types.SourceRef, 0))
} else {
err = c.PackageWrapper.ReportBuildRegistryIndexEvent(ctx, registry.ID, make([]types.SourceRef, 0))
log.Error().Err(err).Msg("failed to report build registry index event")
}
ref := space.Path + "/" + upstreamproxyEntity.RepoKey
jsonResponse, err := c.CreateUpstreamProxyResponseJSONResponse(ctx, modifiedRepoEntity, ref)
if err != nil {
//nolint:nilerr
return artifact.ModifyRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.ModifyRegistry200JSONResponse{
RegistryResponseJSONResponse: *jsonResponse,
}, nil
}
func (c *APIController) updateVirtualRegistry(
ctx context.Context, r artifact.ModifyRegistryRequestObject, repoEntity *types.Registry, err error,
regInfo *types.RegistryRequestBaseInfo, session *auth.Session, space *types2.SpaceCore,
) (artifact.ModifyRegistryResponseObject, error) {
if len(repoEntity.Name) == 0 {
return artifact.ModifyRegistry404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "registry doesn't exist with this key"),
),
}, nil
}
if err != nil {
return throwModifyRegistry500Error(err), err
}
registry, err := UpdateRepoEntity(
artifact.RegistryRequest(*r.Body),
repoEntity.ParentID,
repoEntity.RootParentID,
repoEntity,
)
if err != nil {
return artifact.ModifyRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
err = c.setUpstreamProxyIDs(ctx, registry, artifact.RegistryRequest(*r.Body), regInfo.ParentID)
if err != nil {
return throwModifyRegistry500Error(err), nil
}
if registry.PackageType == artifact.PackageTypeRPM {
c.PostProcessingReporter.BuildRegistryIndex(ctx, registry.ID, make([]types.SourceRef, 0))
} else {
err = c.PackageWrapper.ReportBuildRegistryIndexEvent(ctx, registry.ID, make([]types.SourceRef, 0))
log.Error().Err(err).Msg("failed to report build registry index event")
}
err = c.updateRegistryWithAudit(ctx, repoEntity, registry, session.Principal, regInfo.ParentRef)
if err != nil {
return throwModifyRegistry500Error(err), nil
}
err = c.updateCleanupPolicy(ctx, r.Body, registry.ID)
if err != nil {
return artifact.ModifyRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
modifiedRepoEntity, err := c.RegistryRepository.Get(ctx, registry.ID)
if err != nil {
return throwModifyRegistry500Error(err), nil
}
cleanupPolicies, err := c.CleanupPolicyStore.GetByRegistryID(ctx, repoEntity.ID)
if err != nil {
return throwModifyRegistry500Error(err), nil
}
ref := space.Path + "/" + repoEntity.Name
jsonResponse, err := c.CreateVirtualRepositoryResponse(ctx,
modifiedRepoEntity, c.getUpstreamProxyKeys(ctx, modifiedRepoEntity.UpstreamProxies), cleanupPolicies,
c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, regInfo.RegistryIdentifier), ref)
if err != nil {
return throwModifyRegistry500Error(err), nil
}
return artifact.ModifyRegistry200JSONResponse{
RegistryResponseJSONResponse: *jsonResponse,
}, nil
}
func (c *APIController) updateUpstreamProxyWithAudit(
ctx context.Context, upstreamProxy *types.UpstreamProxyConfig,
principal types2.Principal, parentRef string, registryName string,
) error {
existingUpstreamProxy, err := c.UpstreamProxyStore.Get(ctx, upstreamProxy.RegistryID)
if err != nil {
log.Ctx(ctx).Warn().Msgf(
"failed to fig upstream proxy config for: %d",
upstreamProxy.RegistryID,
)
}
err = c.UpstreamProxyStore.Update(ctx, upstreamProxy)
if err != nil {
return err
}
if existingUpstreamProxy != nil {
auditErr := c.AuditService.Log(
ctx,
principal,
audit.NewResource(audit.ResourceTypeRegistryUpstreamProxy, registryName),
audit.ActionUpdated,
parentRef,
audit.WithOldObject(
audit.RegistryUpstreamProxyConfigObject{
ID: existingUpstreamProxy.ID,
RegistryID: existingUpstreamProxy.RegistryID,
Source: existingUpstreamProxy.Source,
URL: existingUpstreamProxy.RepoURL,
AuthType: existingUpstreamProxy.RepoAuthType,
CreatedAt: existingUpstreamProxy.CreatedAt,
UpdatedAt: existingUpstreamProxy.UpdatedAt,
CreatedBy: existingUpstreamProxy.CreatedBy,
UpdatedBy: existingUpstreamProxy.UpdatedBy,
},
),
audit.WithNewObject(
audit.RegistryUpstreamProxyConfigObject{
ID: upstreamProxy.ID,
RegistryID: upstreamProxy.RegistryID,
Source: upstreamProxy.Source,
URL: upstreamProxy.URL,
AuthType: upstreamProxy.AuthType,
CreatedAt: upstreamProxy.CreatedAt,
UpdatedAt: upstreamProxy.UpdatedAt,
CreatedBy: upstreamProxy.CreatedBy,
UpdatedBy: upstreamProxy.UpdatedBy,
},
),
)
if auditErr != nil {
log.Ctx(ctx).Warn().Msgf(
"failed to insert audit log for update upstream proxy "+
"config operation: %s", auditErr,
)
}
}
return err
}
func (c *APIController) updateRegistryWithAudit(
ctx context.Context, oldRegistry *types.Registry,
newRegistry *types.Registry, principal types2.Principal, parentRef string,
) error {
err := c.updatePublicAccess(ctx, parentRef, newRegistry, oldRegistry)
if err != nil {
return err
}
err = c.RegFinder.Update(ctx, newRegistry)
if err != nil {
return err
}
auditErr := c.AuditService.Log(
ctx,
principal,
audit.NewResource(audit.ResourceTypeRegistry, newRegistry.Name),
audit.ActionUpdated,
parentRef,
audit.WithOldObject(oldRegistry),
audit.WithNewObject(newRegistry),
)
if auditErr != nil {
log.Ctx(ctx).Warn().Msgf("failed to insert audit log for update registry operation: %s", auditErr)
}
return err
}
func (c *APIController) updatePublicAccess(
ctx context.Context,
parentRef string,
newRegistry *types.Registry,
oldRegistry *types.Registry,
) error {
space, err := c.SpaceFinder.FindByRef(ctx, parentRef)
if err != nil {
return err
}
ref := space.Path + "/" + newRegistry.Name
isPublicAccessSupported, err := c.PublicAccess.IsPublicAccessSupported(ctx,
gitnessenum.PublicResourceTypeRegistry, ref)
if err != nil {
return fmt.Errorf(
"failed to check if public access is supported for registry %s: %w",
newRegistry.Name,
err,
)
}
if !isPublicAccessSupported && newRegistry.IsPublic {
return errPublicAccessToArtifactRegistriesDisabled
}
isPublic, err := c.PublicAccess.Get(ctx, gitnessenum.PublicResourceTypeRegistry, ref)
if err != nil {
return fmt.Errorf("failed to check current public access status: %w", err)
}
if newRegistry.Type == artifact.RegistryTypeVIRTUAL &&
newRegistry.IsPublic && !reflect.DeepEqual(newRegistry.UpstreamProxies, oldRegistry.UpstreamProxies) {
err := c.checkIfVirtualHasPrivateUpstreams(ctx, newRegistry.Name, newRegistry.UpstreamProxies)
if err != nil {
return err
}
}
//nolint:nestif
if isPublic != newRegistry.IsPublic {
if !newRegistry.IsPublic {
err := c.checkIfUpstreamIsUsedInPublicRegistries(ctx, newRegistry.RootParentID,
newRegistry.Name, newRegistry.ID)
if err != nil {
return err
}
} else if newRegistry.Type == artifact.RegistryTypeVIRTUAL {
err := c.checkIfVirtualHasPrivateUpstreams(ctx, newRegistry.Name, newRegistry.UpstreamProxies)
if err != nil {
return err
}
}
if err = c.PublicAccess.Set(ctx,
gitnessenum.PublicResourceTypeRegistry, ref, newRegistry.IsPublic); err != nil {
return fmt.Errorf("failed to update artiafct registry public access: %w", err)
}
}
return nil
}
func throwModifyRegistry500Error(err error) artifact.ModifyRegistry500JSONResponse {
return artifact.ModifyRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}
}
func throwModifyRegistry400Error(err error) artifact.ModifyRegistry400JSONResponse {
return artifact.ModifyRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}
}
func (c *APIController) updateCleanupPolicy(
ctx context.Context, config *artifact.ModifyRegistryJSONRequestBody, registryID int64,
) error {
existingCleanupPolicies, err := c.CleanupPolicyStore.GetIDsByRegistryID(ctx, registryID)
if err != nil {
return err
}
currentCleanupPolicyEntities, err := CreateCleanupPolicyEntity(config, registryID)
if err != nil {
return err
}
err = c.CleanupPolicyStore.ModifyCleanupPolicies(ctx, currentCleanupPolicyEntities, existingCleanupPolicies)
return err
}
func UpdateRepoEntity(
dto artifact.RegistryRequest,
parentID int64,
rootParentID int64,
existingRepo *types.Registry,
) (*types.Registry, error) {
allowedPattern, blockedPattern, description, labels := getRepoEntityFields(dto)
e := ValidatePackageTypeChange(string(existingRepo.PackageType), string(dto.PackageType))
if e != nil {
return nil, e
}
e = ValidateRepoTypeChange(string(existingRepo.Type), string(dto.Config.Type))
if e != nil {
return nil, e
}
e = ValidateIdentifierChange(existingRepo.Name, dto.Identifier)
if e != nil {
return nil, e
}
entity := &types.Registry{
Name: dto.Identifier,
ID: existingRepo.ID,
ParentID: parentID,
RootParentID: rootParentID,
Description: description,
AllowedPattern: allowedPattern,
BlockedPattern: blockedPattern,
PackageType: existingRepo.PackageType,
Type: existingRepo.Type,
Labels: labels,
CreatedAt: existingRepo.CreatedAt,
IsPublic: dto.IsPublic,
}
return entity, nil
}
// UpdateUpstreamProxyEntity TODO: update_registry and create_registry both share almost same logic to
// create UpdateUpstreamProxyEntity
//
//nolint:gocognit,cyclop
func (c *APIController) UpdateUpstreamProxyEntity(
ctx context.Context, dto artifact.RegistryRequest, parentID int64, rootParentID int64, u *types.UpstreamProxy,
) (*types.Registry, *types.UpstreamProxyConfig, error) {
allowedPattern := []string{}
if dto.AllowedPattern != nil {
allowedPattern = *dto.AllowedPattern
}
blockedPattern := []string{}
if dto.BlockedPattern != nil {
blockedPattern = *dto.BlockedPattern
}
e := ValidatePackageTypeChange(string(u.PackageType), string(dto.PackageType))
if e != nil {
return nil, nil, e
}
e = ValidateIdentifierChange(u.RepoKey, dto.Identifier)
if e != nil {
return nil, nil, e
}
e = ValidateUpstream(c.PackageWrapper, dto.PackageType, dto.Config)
if e != nil {
return nil, nil, e
}
config, _ := dto.Config.AsUpstreamConfig()
registryConfig := &types.RegistryConfig{}
if config.RemoteUrlSuffix != nil {
registryConfig.RemoteUrlSuffix = *config.RemoteUrlSuffix
}
repoEntity := &types.Registry{
ID: u.RegistryID,
Name: dto.Identifier,
ParentID: parentID,
RootParentID: rootParentID,
AllowedPattern: allowedPattern,
BlockedPattern: blockedPattern,
PackageType: dto.PackageType,
Type: artifact.RegistryTypeUPSTREAM,
CreatedAt: u.CreatedAt,
IsPublic: dto.IsPublic,
Config: registryConfig,
}
CleanURLPath(config.Url)
upstreamProxyConfigEntity := &types.UpstreamProxyConfig{
AuthType: string(config.AuthType),
RegistryID: u.RegistryID,
CreatedAt: u.CreatedAt,
}
if config.Url != nil {
upstreamProxyConfigEntity.URL = *config.Url
}
if config.Source != nil && len(string(*config.Source)) > 0 {
ok := c.PackageWrapper.ValidateUpstreamSource(string(u.PackageType), string(*config.Source))
if !ok {
return nil, nil, usererror.BadRequest(fmt.Sprintf("invalid upstream source: %s", *config.Source))
}
upstreamProxyConfigEntity.Source = string(*config.Source)
}
// For sources that don't require URL (like Dockerhub, PyPi, etc.), clear the URL
if config.Source != nil &&
!c.PackageWrapper.IsURLRequiredForUpstreamSource(string(u.PackageType), string(*config.Source)) {
upstreamProxyConfigEntity.URL = ""
}
if u.ID != -1 {
upstreamProxyConfigEntity.ID = u.ID
}
//nolint:exhaustive
switch config.AuthType {
case artifact.AuthTypeUserPassword:
res, err := config.Auth.AsUserPassword()
if err != nil {
return nil, nil, err
}
upstreamProxyConfigEntity.UserName = res.UserName
if res.SecretIdentifier == nil {
return nil, nil, fmt.Errorf("failed to create upstream proxy: secret_identifier missing")
}
if res.SecretSpacePath != nil && len(*res.SecretSpacePath) > 0 {
upstreamProxyConfigEntity.SecretSpaceID, err = c.RegistryMetadataHelper.GetSecretSpaceID(ctx,
res.SecretSpacePath)
if err != nil {
return nil, nil, err
}
} else if res.SecretSpaceId != nil {
upstreamProxyConfigEntity.SecretSpaceID = *res.SecretSpaceId
}
upstreamProxyConfigEntity.SecretIdentifier = *res.SecretIdentifier
case artifact.AuthTypeAccessKeySecretKey:
res, err := config.Auth.AsAccessKeySecretKey()
if err != nil {
return nil, nil, err
}
switch {
case res.AccessKey != nil && len(*res.AccessKey) > 0:
upstreamProxyConfigEntity.UserName = *res.AccessKey
case res.AccessKeySecretIdentifier == nil:
return nil, nil, fmt.Errorf("failed to create upstream proxy: access_key_secret_identifier missing")
default:
if res.AccessKeySecretSpacePath != nil && len(*res.AccessKeySecretSpacePath) > 0 {
upstreamProxyConfigEntity.UserNameSecretSpaceID, err =
c.RegistryMetadataHelper.GetSecretSpaceID(ctx, res.AccessKeySecretSpacePath)
if err != nil {
return nil, nil, err
}
} else if res.AccessKeySecretSpaceId != nil {
upstreamProxyConfigEntity.UserNameSecretSpaceID = *res.AccessKeySecretSpaceId
}
upstreamProxyConfigEntity.UserNameSecretIdentifier = *res.AccessKeySecretIdentifier
}
if res.SecretKeySpacePath != nil && len(*res.SecretKeySpacePath) > 0 {
upstreamProxyConfigEntity.SecretSpaceID, err =
c.RegistryMetadataHelper.GetSecretSpaceID(ctx, res.SecretKeySpacePath)
if err != nil {
return nil, nil, err
}
} else if res.SecretKeySpaceId != nil {
upstreamProxyConfigEntity.SecretSpaceID = *res.SecretKeySpaceId
}
upstreamProxyConfigEntity.SecretIdentifier = res.SecretKeyIdentifier
default:
upstreamProxyConfigEntity.UserName = ""
upstreamProxyConfigEntity.SecretIdentifier = ""
upstreamProxyConfigEntity.SecretSpaceID = 0
}
return repoEntity, upstreamProxyConfigEntity, nil
}
func (c *APIController) checkIfUpstreamIsUsedInPublicRegistries(
ctx context.Context,
rootIdentifierID int64,
registryName string,
registryID int64,
) error {
registryIDs, err := c.RegistryRepository.FetchRegistriesIDByUpstreamProxyID(
ctx, strconv.FormatInt(registryID, 10), rootIdentifierID)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to fetch registryIDs: %s", err)
return fmt.Errorf("failed to fetch registryIDs IDs: %w", err)
}
//nolint:nestif
if len(registryIDs) > 0 {
registries, err := c.RegistryRepository.GetByIDIn(ctx, registryIDs)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to fetch registries: %s", err)
return fmt.Errorf("failed to fetch registries: %w", err)
}
var registryScopeMappings []string
for _, registry := range *registries {
name := registry.Name
space, err := c.SpaceFinder.FindByID(ctx, registry.ParentID)
if err != nil {
err2 := fmt.Errorf("failed to fetch space details: %w", err)
log.Ctx(ctx).Error().Msgf("error: %v", err2)
return err2
}
ref := space.Path + "/" + registry.Name
isPublic, err := c.PublicAccess.Get(ctx, gitnessenum.PublicResourceTypeRegistry, ref)
if err != nil {
err2 := fmt.Errorf("failed to get public access for registry: %w", err)
log.Ctx(ctx).Error().Msgf("error: %v", err2)
return err2
}
if isPublic {
registryScopeMappings = append(registryScopeMappings, name+" ("+space.Path+")")
}
}
if len(registryScopeMappings) > 0 {
return fmt.Errorf(
"upstream Proxy: [%s] is being used inside public registry registries: [%s]",
registryName, strings.Join(registryScopeMappings, ", "),
)
}
}
return nil
}
func (c *APIController) checkIfVirtualHasPrivateUpstreams(
ctx context.Context,
registryName string,
registryIDs []int64,
) error {
//nolint:nestif
if len(registryIDs) > 0 {
registries, err := c.RegistryRepository.GetByIDIn(ctx, registryIDs)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to fetch registries: %s", err)
return fmt.Errorf("failed to fetch registries: %w", err)
}
var registryScopeMappings []string
for _, registry := range *registries {
name := registry.Name
space, err := c.SpaceFinder.FindByID(ctx, registry.ParentID)
if err != nil {
err2 := fmt.Errorf("failed to fetch space details: %w", err)
log.Ctx(ctx).Error().Msgf("error: %v", err2)
return err2
}
ref := space.Path + "/" + registry.Name
isPublic, err := c.PublicAccess.Get(ctx, gitnessenum.PublicResourceTypeRegistry, ref)
if err != nil {
err2 := fmt.Errorf("failed to get public access for registry: %w", err)
log.Ctx(ctx).Error().Msgf("error: %v", err2)
return err2
}
if !isPublic {
registryScopeMappings = append(registryScopeMappings, name+" ("+space.Path+")")
}
}
if len(registryScopeMappings) > 0 {
return fmt.Errorf(
"registry: [%s] has the following private registries upstreams: [%s]",
registryName, strings.Join(registryScopeMappings, ", "),
)
}
}
return nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_helm_details.go | registry/app/api/controller/metadata/get_artifacts_helm_details.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
store2 "github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
)
func (c *APIController) GetHelmArtifactDetails(
ctx context.Context,
r artifact.GetHelmArtifactDetailsRequestObject,
) (artifact.GetHelmArtifactDetailsResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.GetHelmArtifactDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetHelmArtifactDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetHelmArtifactDetails403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
image := string(r.Artifact)
version := string(r.Version)
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return artifact.GetHelmArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var m *types.Manifest
var artifactDetails *artifact.HelmArtifactDetailResponseJSONResponse
//nolint:nestif
if c.UntaggedImagesEnabled(ctx) && !isHelmVersionTag(r) {
dgst, err := types.NewDigest(digest.Digest(version))
if err != nil {
return getHelmArtifactDetailsErrResponse(err)
}
m, err = c.ManifestStore.FindManifestByDigest(ctx, registry.ID, image, dgst)
if err != nil {
if errors.Is(err, store2.ErrResourceNotFound) {
return getHelmArtifactDetailsErrResponse(fmt.Errorf("manifest not found"))
}
return getHelmArtifactDetailsErrResponse(err)
}
registryURL := c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, regInfo.RegistryIdentifier)
artifactDetails = GetHelmArtifactDetails(
registry, m.ImageName, m.Digest.String(), m.CreatedAt, m.CreatedAt, m, registryURL)
pullCommandByDigest := GetHelmPullCommand(m.ImageName, m.Digest.String(), registryURL, false)
artifactDetails.Data.PullCommandByDigest = &pullCommandByDigest
tags, err := c.TagStore.GetTagsByManifestID(ctx, m.ID)
if err != nil {
return getHelmArtifactDetailsErrResponse(err)
}
if tags != nil {
artifactDetails.Data.Metadata = &artifact.ArtifactEntityMetadata{
"tags": tags,
}
}
} else {
tag, err := c.TagStore.GetTagDetail(ctx, registry.ID, image, version)
if err != nil {
return getHelmArtifactDetailsErrResponse(err)
}
m, err = c.ManifestStore.FindManifestByTagName(ctx, registry.ID, image, version)
if err != nil {
if errors.Is(err, store2.ErrResourceNotFound) {
return getHelmArtifactDetailsErrResponse(fmt.Errorf("manifest not found"))
}
return getHelmArtifactDetailsErrResponse(err)
}
registryURL := c.URLProvider.RegistryURL(ctx, regInfo.RootIdentifier, regInfo.RegistryIdentifier)
artifactDetails = GetHelmArtifactDetails(
registry, m.ImageName, m.Digest.String(), m.CreatedAt, m.CreatedAt, m, registryURL)
pullCommand := GetHelmPullCommand(m.ImageName, tag.Name, registryURL, true)
artifactDetails.Data.PullCommand = &pullCommand
if c.UntaggedImagesEnabled(ctx) {
pullCommandByDigest := GetHelmPullCommand(m.ImageName, m.Digest.String(), registryURL, false)
artifactDetails.Data.PullCommandByDigest = &pullCommandByDigest
}
}
parsedDigest, err := types.NewDigest(m.Digest)
if err != nil {
return getHelmArtifactDetailsErrResponse(err)
}
art, err := c.ArtifactStore.GetArtifactMetadata(ctx, registry.ParentID, registry.Name, image, parsedDigest.String(),
nil)
if err != nil {
return getHelmArtifactDetailsErrResponse(err)
}
artifactDetails.Data.DownloadsCount = &art.DownloadCount
return artifact.GetHelmArtifactDetails200JSONResponse{
HelmArtifactDetailResponseJSONResponse: *artifactDetails,
}, nil
}
func getHelmArtifactDetailsErrResponse(err error) (artifact.GetHelmArtifactDetailsResponseObject, error) {
return artifact.GetHelmArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
func isHelmVersionTag(r artifact.GetHelmArtifactDetailsRequestObject) bool {
return r.Params.VersionType != nil && *r.Params.VersionType == artifact.GetHelmArtifactDetailsParamsVersionTypeTAG
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifact_file.go | registry/app/api/controller/metadata/get_artifact_file.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"net/http"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/api/utils"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
)
func (c *APIController) GetArtifactFile(
ctx context.Context,
r artifact.GetArtifactFileRequestObject,
) (artifact.GetArtifactFileResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.GetArtifactFile400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetArtifactFile400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
if errors.Is(err, apiauth.ErrUnauthorized) {
return artifact.GetArtifactFile401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, err.Error()),
),
}, nil
}
return artifact.GetArtifactFile403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
image := string(r.Artifact)
version := string(r.Version)
file := string(r.FileName)
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return artifact.GetArtifactFile500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var artifactType *artifact.ArtifactType
if r.Params.ArtifactType != nil {
artifactType, err = ValidateAndGetArtifactType(registry.PackageType, string(*r.Params.ArtifactType))
if err != nil {
return artifact.GetArtifactFile400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
}
img, err := c.ImageStore.GetByNameAndType(ctx, regInfo.RegistryID, image, artifactType)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetArtifactFile404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "Artifact not found"),
),
}, nil
}
return artifact.GetArtifactFile500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
art, err := c.ArtifactStore.GetByName(ctx, img.ID, version)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetArtifactFile404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "Artifact version not found"),
),
}, nil
}
return artifact.GetArtifactFile500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
registryURL := c.URLProvider.PackageURL(ctx, regInfo.RootIdentifier+"/"+regInfo.RegistryIdentifier,
strings.ToLower(string(registry.PackageType)))
filePathPrefix, err := utils.GetFilePath(registry.PackageType, img.Name, art.Version)
if err != nil {
return artifact.GetArtifactFile500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
filePath := filePathPrefix + "/" + file
fileInfo, err := c.fileManager.GetFileMetadata(ctx, filePath, img.RegistryID)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetArtifactFile404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "File not found"),
),
}, nil
}
return artifact.GetArtifactFile500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.GetArtifactFile200JSONResponse{
ArtifactFileResponseJSONResponse: *GetArtifactFileResponseJSONResponse(
registryURL, registry.PackageType, img.Name, art.Version, fileInfo.Filename),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/delete_artifact.go | registry/app/api/controller/metadata/delete_artifact.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/api/utils"
registryTypes "github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) DeleteArtifact(ctx context.Context, r artifact.DeleteArtifactRequestObject) (
artifact.DeleteArtifactResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.DeleteArtifact400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.DeleteArtifact400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
if err = apiauth.CheckSpaceScope(
ctx,
c.Authorizer,
session,
space,
enum.ResourceTypeRegistry,
enum.PermissionArtifactsDelete,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return artifact.DeleteArtifact401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return artifact.DeleteArtifact403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
repoEntity, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
//nolint:nilerr
return artifact.DeleteArtifact404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "registry doesn't exist with this key"),
),
}, nil
}
artifactName := string(r.Artifact)
_, err = c.ImageStore.GetByName(ctx, regInfo.RegistryID, artifactName)
if err != nil {
//nolint:nilerr
return artifact.DeleteArtifact404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "artifact doesn't exist with this key"),
),
}, nil
}
//nolint:exhaustive
switch regInfo.PackageType {
case artifact.PackageTypeDOCKER:
err = c.deleteOCIImage(ctx, regInfo, artifactName)
case artifact.PackageTypeHELM:
err = c.deleteOCIImage(ctx, regInfo, artifactName)
case artifact.PackageTypeGENERIC:
err = c.deleteGenericImage(ctx, regInfo, artifactName)
case artifact.PackageTypeMAVEN:
err = c.deleteGenericImage(ctx, regInfo, artifactName)
case artifact.PackageTypePYTHON:
err = c.deleteGenericImage(ctx, regInfo, artifactName)
case artifact.PackageTypeNPM:
err = c.deleteGenericImage(ctx, regInfo, artifactName)
case artifact.PackageTypeNUGET:
err = c.deleteGenericImage(ctx, regInfo, artifactName)
case artifact.PackageTypeRPM:
err = fmt.Errorf("delete artifact not supported for rpm")
case artifact.PackageTypeGO:
err = c.deleteGenericImage(ctx, regInfo, artifactName)
case artifact.PackageTypeHUGGINGFACE:
err = fmt.Errorf("unsupported package type: %s", regInfo.PackageType)
default:
err = c.PackageWrapper.DeleteArtifact(ctx, regInfo, artifactName)
}
if err != nil {
return throwDeleteArtifact500Error(err), err
}
auditErr := c.AuditService.Log(
ctx,
session.Principal,
audit.NewResource(audit.ResourceTypeRegistryArtifact, string(r.Artifact)),
audit.ActionDeleted,
regInfo.ParentRef,
audit.WithData("registry name", repoEntity.Name),
audit.WithData("artifact name", string(r.Artifact)),
)
if auditErr != nil {
log.Ctx(ctx).Warn().Msgf("failed to insert audit log for delete tag operation: %s", auditErr)
}
return artifact.DeleteArtifact200JSONResponse{
SuccessJSONResponse: artifact.SuccessJSONResponse(*GetSuccessResponse()),
}, nil
}
func (c *APIController) deleteOCIImage(
ctx context.Context,
regInfo *registryTypes.RegistryRequestBaseInfo,
artifactName string,
) error {
err := c.tx.WithTx(
ctx, func(ctx context.Context) error {
// Delete manifests linked to the image
_, err := c.ManifestStore.DeleteManifestByImageName(ctx, regInfo.RegistryID, artifactName)
if err != nil {
return fmt.Errorf("failed to delete manifests: %w", err)
}
// Delete registry blobs linked to the image
_, err = c.RegistryBlobStore.UnlinkBlobByImageName(ctx, regInfo.RegistryID, artifactName)
if err != nil {
return fmt.Errorf("failed to delete registry blobs: %w", err)
}
// Delete Artifacts linked to image
err = c.ArtifactStore.DeleteByImageNameAndRegistryID(ctx, regInfo.RegistryID, artifactName)
if err != nil {
return fmt.Errorf("failed to delete versions: %w", err)
}
// Delete image
err = c.ImageStore.DeleteByImageNameAndRegID(
ctx, regInfo.RegistryID, artifactName,
)
if err != nil {
return fmt.Errorf("failed to delete artifact: %w", err)
}
return nil
},
)
return err
}
func (c *APIController) deleteGenericImage(
ctx context.Context,
regInfo *registryTypes.RegistryRequestBaseInfo,
artifactName string,
) error {
err := c.tx.WithTx(
ctx, func(ctx context.Context) error {
// Get File Path
filePath, err := utils.GetFilePath(regInfo.PackageType, artifactName, "")
if err != nil {
return fmt.Errorf("failed to get file path: %w", err)
}
// Delete Artifact Files
err = c.fileManager.DeleteNode(ctx, regInfo.RegistryID, filePath)
if err != nil {
return fmt.Errorf("failed to delete artifact files: %w", err)
}
// Delete Artifacts
err = c.ArtifactStore.DeleteByImageNameAndRegistryID(ctx, regInfo.RegistryID, artifactName)
if err != nil {
return fmt.Errorf("failed to delete versions: %w", err)
}
// Delete image
err = c.ImageStore.DeleteByImageNameAndRegID(
ctx, regInfo.RegistryID, artifactName,
)
if err != nil {
return fmt.Errorf("failed to delete artifact: %w", err)
}
return nil
},
)
return err
}
func throwDeleteArtifact500Error(err error) artifact.DeleteArtifact500JSONResponse {
return artifact.DeleteArtifact500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/utils_test.go | registry/app/api/controller/metadata/utils_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata_test
import (
"context"
"testing"
"time"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/stretchr/testify/assert"
)
func TestValidateIdentifier(t *testing.T) {
tests := []struct {
name string
identifier string
wantErr bool
errMsg string
}{
{
name: "valid_identifier",
identifier: "valid-identifier",
wantErr: false,
},
{
name: "invalid_identifier",
identifier: "Invalid Identifier",
wantErr: true,
errMsg: metadata.RegistryIdentifierErrorMsg,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
err := metadata.ValidateIdentifier(tt.identifier)
if tt.wantErr {
assert.Error(t, err)
assert.Equal(t, tt.errMsg, err.Error())
} else {
assert.NoError(t, err)
}
})
}
}
func TestCleanURLPath(t *testing.T) {
tests := []struct {
name string
input string
expected string
}{
{
name: "valid_url",
input: "https://example.com/path/",
expected: "https://example.com/path",
},
{
name: "invalid_url",
input: "://invalid-url",
expected: "://invalid-url",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
input := tt.input
metadata.CleanURLPath(&input)
assert.Equal(t, tt.expected, input)
})
}
}
func TestGetTimeInMs(t *testing.T) {
tests := []struct {
name string
time time.Time
expected string
}{
{
name: "valid_time",
time: time.Unix(1234567890, 0),
expected: "1234567890000",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetTimeInMs(tt.time)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetPullCommand(t *testing.T) {
tests := []struct {
name string
image string
tag string
pkgType string
baseURL string
expected string
}{
{
name: "docker_command",
image: "image",
tag: "tag",
pkgType: "DOCKER",
baseURL: "https://example.com",
expected: "docker pull example.com/image:tag",
},
{
name: "helm_command",
image: "image",
tag: "tag",
pkgType: "HELM",
baseURL: "https://example.com",
expected: "helm pull oci://example.com/image --version tag",
},
{
name: "invalid_type",
image: "image",
tag: "tag",
pkgType: "INVALID",
baseURL: "https://example.com",
expected: "",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetPullCommand(context.Background(), tt.image, tt.tag, tt.pkgType, tt.baseURL,
"Authorization: Bearer", nil, true)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetDockerPullCommand(t *testing.T) {
tests := []struct {
name string
image string
tag string
baseURL string
expected string
}{
{
name: "valid_command",
image: "image",
tag: "tag",
baseURL: "https://example.com",
expected: "docker pull example.com/image:tag",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetDockerPullCommand(tt.image, tt.tag, tt.baseURL, true)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetHelmPullCommand(t *testing.T) {
tests := []struct {
name string
image string
tag string
baseURL string
expected string
}{
{
name: "valid_command",
image: "image",
tag: "tag",
baseURL: "https://example.com",
expected: "helm pull oci://example.com/image --version tag",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetHelmPullCommand(tt.image, tt.tag, tt.baseURL, true)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetErrorResponse(t *testing.T) {
tests := []struct {
name string
code int
message string
expected *artifact.Error
}{
{
name: "valid_error",
code: 404,
message: "Not Found",
expected: &artifact.Error{
Code: "404",
Message: "Not Found",
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetErrorResponse(tt.code, tt.message)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetSortByOrder(t *testing.T) {
tests := []struct {
name string
order string
expected string
}{
{
name: "empty_order",
order: "",
expected: "ASC",
},
{
name: "desc_order",
order: "DESC",
expected: "DESC",
},
{
name: "invalid_order",
order: "INVALID",
expected: "ASC",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetSortByOrder(tt.order)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetSortByField(t *testing.T) {
tests := []struct {
name string
field string
resource string
expected string
}{
{
name: "identifier_field",
field: "identifier",
resource: "repository",
expected: "name",
},
{
name: "invalid_field",
field: "invalid",
resource: "repository",
expected: "created_at",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetSortByField(tt.field, tt.resource)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetPageLimit(t *testing.T) {
tests := []struct {
name string
pageSize *artifact.PageSize
expected int
}{
{
name: "valid_page_size",
pageSize: func() *artifact.PageSize { ps := artifact.PageSize(20); return &ps }(),
expected: 20,
},
{
name: "nil_page_size",
pageSize: nil,
expected: 10,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetPageLimit(tt.pageSize)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetOffset(t *testing.T) {
tests := []struct {
name string
pageSize *artifact.PageSize
pageNumber *artifact.PageNumber
expected int
}{
{
name: "valid_offset",
pageSize: func() *artifact.PageSize { ps := artifact.PageSize(20); return &ps }(),
pageNumber: func() *artifact.PageNumber { pn := artifact.PageNumber(2); return &pn }(),
expected: 40,
},
{
name: "nil_values",
pageSize: nil,
pageNumber: nil,
expected: 0,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetOffset(tt.pageSize, tt.pageNumber)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetPageNumber(t *testing.T) {
tests := []struct {
name string
pageNumber *artifact.PageNumber
expected int64
}{
{
name: "valid_page_number",
pageNumber: func() *artifact.PageNumber { pn := artifact.PageNumber(2); return &pn }(),
expected: 2,
},
{
name: "nil_page_number",
pageNumber: nil,
expected: 1,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetPageNumber(tt.pageNumber)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetSuccessResponse(t *testing.T) {
tests := []struct {
name string
expected *artifact.Success
}{
{
name: "valid_response",
expected: &artifact.Success{
Status: artifact.StatusSUCCESS,
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetSuccessResponse()
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetPageCount(t *testing.T) {
tests := []struct {
name string
count int64
limit int
expected int64
}{
{
name: "valid_count",
count: 50,
limit: 10,
expected: 5,
},
{
name: "zero_count",
count: 0,
limit: 10,
expected: 0,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetPageCount(tt.count, tt.limit)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetRegistryRef(t *testing.T) {
tests := []struct {
name string
root string
registry string
expected string
}{
{
name: "valid_ref",
root: "root",
registry: "registry",
expected: "root/registry",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetRegistryRef(tt.root, tt.registry)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetRepoURLWithoutProtocol(t *testing.T) {
tests := []struct {
name string
url string
expected string
}{
{
name: "valid_url",
url: "https://example.com/path",
expected: "example.com/path",
},
{
name: "invalid_url",
url: "://invalid-url",
expected: "",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetRepoURLWithoutProtocol(tt.url)
assert.Equal(t, tt.expected, result)
})
}
}
func TestGetTagURL(t *testing.T) {
tests := []struct {
name string
artifact string
version string
baseURL string
expected string
}{
{
name: "valid_url",
artifact: "artifact",
version: "version",
baseURL: "https://example.com",
expected: "https://example.com/artifact/version",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := metadata.GetTagURL(tt.artifact, tt.version, tt.baseURL)
assert.Equal(t, tt.expected, result)
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifact_detail.go | registry/app/api/controller/metadata/get_artifact_detail.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"encoding/json"
"errors"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/metadata"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
)
func (c *APIController) GetArtifactDetails(
ctx context.Context,
r artifact.GetArtifactDetailsRequestObject,
) (artifact.GetArtifactDetailsResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.GetArtifactDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetArtifactDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
if errors.Is(err, apiauth.ErrUnauthorized) {
return artifact.GetArtifactDetails401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, err.Error()),
),
}, nil
}
return artifact.GetArtifactDetails403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
image := string(r.Artifact)
version := string(r.Version)
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var artifactType *artifact.ArtifactType
if r.Params.ArtifactType != nil {
artifactType, err = ValidateAndGetArtifactType(registry.PackageType, string(*r.Params.ArtifactType))
if err != nil {
return artifact.GetArtifactDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
}
img, err := c.ImageStore.GetByNameAndType(ctx, regInfo.RegistryID, image, artifactType)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetArtifactDetails404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "Artifact not found"),
),
}, nil
}
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
art, err := c.ArtifactStore.GetByName(ctx, img.ID, version)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetArtifactDetails404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "Artifact version not found"),
),
}, nil
}
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
downloadCount, err := c.DownloadStatRepository.GetTotalDownloadsForArtifactID(ctx, art.ID)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var artifactDetails artifact.ArtifactDetail
// FIXME: Arvind: Unify the metadata structure to avoid this type checking
//nolint:exhaustive
switch registry.PackageType {
case artifact.PackageTypeMAVEN:
var metadata metadata.MavenMetadata
err := json.Unmarshal(art.Metadata, &metadata)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifactDetails = GetMavenArtifactDetail(img, art, metadata)
case artifact.PackageTypeGENERIC:
var metadata metadata.GenericMetadata
err := json.Unmarshal(art.Metadata, &metadata)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifactDetails = GetGenericArtifactDetail(img, art, metadata)
case artifact.PackageTypePYTHON:
var result map[string]any
err := json.Unmarshal(art.Metadata, &result)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifactDetails = GetPythonArtifactDetail(img, art, result)
case artifact.PackageTypeNPM:
var result map[string]any
err := json.Unmarshal(art.Metadata, &result)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifactDetails = GetNPMArtifactDetail(img, art, result, downloadCount)
case artifact.PackageTypeRPM:
var result map[string]any
err := json.Unmarshal(art.Metadata, &result)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifactDetails = GetRPMArtifactDetail(img, art, result, downloadCount)
case artifact.PackageTypeNUGET:
var result map[string]any
err := json.Unmarshal(art.Metadata, &result)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifactDetails = GetNugetArtifactDetail(img, art, result, downloadCount)
case artifact.PackageTypeHUGGINGFACE:
var result map[string]any
err := json.Unmarshal(art.Metadata, &result)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifactDetails = GetHFArtifactDetail(img, art, result, downloadCount)
case artifact.PackageTypeGO:
var result map[string]any
err := json.Unmarshal(art.Metadata, &result)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
artifactDetails = GetGoArtifactDetail(img, art, result, downloadCount)
case artifact.PackageTypeDOCKER:
case artifact.PackageTypeHELM:
default:
details, err := c.PackageWrapper.GetArtifactDetail(string(registry.PackageType), img, art, downloadCount)
if err != nil {
return artifact.GetArtifactDetails400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
if details != nil {
artifactDetails = *details
}
}
quarantinedArtifacts, err := c.QuarantineArtifactRepository.GetByFilePath(ctx,
"", regInfo.RegistryID, image, version, artifactType)
if err != nil {
return artifact.GetArtifactDetails500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
if len(quarantinedArtifacts) > 0 {
isQuarantined := true
artifactDetails.IsQuarantined = &isQuarantined
artifactDetails.QuarantineReason = &quarantinedArtifacts[0].Reason
} else {
isQuarantined := false
artifactDetails.IsQuarantined = &isQuarantined
}
return artifact.GetArtifactDetails200JSONResponse{
ArtifactDetailResponseJSONResponse: artifact.ArtifactDetailResponseJSONResponse{
Data: artifactDetails,
Status: "SUCCESS",
},
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_webhook_details.go | registry/app/api/controller/metadata/get_webhook_details.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetWebhook(
ctx context.Context,
r api.GetWebhookRequestObject,
) (api.GetWebhookResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to get registry details: %v", err)
return getWebhookInternalErrorResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to find space: %v", err)
return getWebhookInternalErrorResponse(err)
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
log.Ctx(ctx).Error().Msgf("permission check failed while getting webhook for registry: %s, error: %v",
regInfo.RegistryIdentifier, err)
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return api.GetWebhook401JSONResponse{
UnauthenticatedJSONResponse: api.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return api.GetWebhook403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
webhookIdentifier := string(r.WebhookIdentifier)
webhook, err := c.WebhooksRepository.GetByRegistryAndIdentifier(ctx, regInfo.RegistryID, webhookIdentifier)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return api.GetWebhook404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, fmt.Sprintf("webhook '%s' not found", webhookIdentifier)),
),
}, nil
}
log.Ctx(ctx).Error().Msgf("failed to get webhook: %s with error: %v", webhookIdentifier, err)
return getWebhookInternalErrorResponse(fmt.Errorf("failed to get webhook"))
}
webhookResponseEntity, err := c.RegistryMetadataHelper.MapToWebhookResponseEntity(ctx, webhook)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to get webhook: %s with error: %v", webhookIdentifier, err)
return getWebhookInternalErrorResponse(fmt.Errorf("failed to get webhook"))
}
return api.GetWebhook200JSONResponse{
WebhookResponseJSONResponse: api.WebhookResponseJSONResponse{
Data: *webhookResponseEntity,
Status: api.StatusSUCCESS,
},
}, nil
}
func getWebhookInternalErrorResponse(err error) (api.GetWebhookResponseObject, error) {
return api.GetWebhook500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, err
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/registry_metadata_helper_test.go | registry/app/api/controller/metadata/registry_metadata_helper_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//nolint:lll,revive // revive:disable:unused-parameter
package metadata
import (
"context"
"fmt"
"testing"
"time"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
gitnesstypes "github.com/harness/gitness/types"
gitnessenum "github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
// Test data setup.
var (
regInfo = &types.RegistryRequestBaseInfo{
RegistryID: 1,
}
)
// Helper function to create string pointer.
func stringPtr(s string) *string {
return &s
}
func TestMapToWebhook(t *testing.T) {
tests := []struct {
name string
webhookReq api.WebhookRequest
setupMocks func(*mocks.SpacePathStore)
expectedError string
validate func(*testing.T, *gitnesstypes.WebhookCore, error)
}{
{
name: "success_case",
webhookReq: api.WebhookRequest{
Identifier: "webhook",
Name: "webhook",
Url: "http://example.com",
Enabled: true,
Insecure: false,
Triggers: &[]api.Trigger{api.TriggerARTIFACTCREATION, api.TriggerARTIFACTDELETION},
Description: stringPtr("Test webhook"),
ExtraHeaders: &[]api.ExtraHeader{
{Key: "key", Value: "value"},
},
},
validate: func(t *testing.T, webhook *gitnesstypes.WebhookCore, err error) {
assert.NoError(t, err)
assert.NotNil(t, webhook)
assert.Equal(t, "webhook", webhook.Identifier)
assert.Equal(t, "webhook", webhook.DisplayName)
assert.Equal(t, "http://example.com", webhook.URL)
assert.True(t, webhook.Enabled)
assert.False(t, webhook.Insecure)
assert.Equal(t, "Test webhook", webhook.Description)
assert.Len(t, webhook.ExtraHeaders, 1)
assert.Equal(t, "key", webhook.ExtraHeaders[0].Key)
assert.Equal(t, "value", webhook.ExtraHeaders[0].Value)
assert.Len(t, webhook.Triggers, 2)
assert.Equal(t, gitnessenum.WebhookTriggerArtifactCreated, webhook.Triggers[0])
assert.Equal(t, gitnessenum.WebhookTriggerArtifactDeleted, webhook.Triggers[1])
},
},
{
name: "with_secret_space_path",
webhookReq: api.WebhookRequest{
Identifier: "webhook",
Name: "webhook",
Url: "http://example.com",
Enabled: true,
Insecure: false,
Triggers: &[]api.Trigger{api.TriggerARTIFACTCREATION},
SecretSpacePath: stringPtr("secret/path"),
},
setupMocks: func(mockSpacePathStore *mocks.SpacePathStore) {
mockSpacePathStore.On("FindByPath", mock.Anything, "secret/path").Return(
&gitnesstypes.SpacePath{Value: "secret/path", SpaceID: 2}, nil)
},
validate: func(t *testing.T, webhook *gitnesstypes.WebhookCore, err error) {
assert.NoError(t, err)
assert.NotNil(t, webhook)
assert.Equal(t, int64(2), webhook.SecretSpaceID)
},
},
{
name: "invalid_secret_space_path",
webhookReq: api.WebhookRequest{
Identifier: "webhook",
Name: "webhook",
Url: "http://example.com",
Enabled: true,
Insecure: false,
Triggers: &[]api.Trigger{api.TriggerARTIFACTCREATION},
SecretSpacePath: stringPtr("secret/path"),
},
setupMocks: func(mockSpacePathStore *mocks.SpacePathStore) {
mockSpacePathStore.On("FindByPath", mock.Anything, "secret/path").Return(nil, fmt.Errorf("not found"))
},
expectedError: "failed to get Space Path: not found",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Create mocks
mockSpacePathStore := new(mocks.SpacePathStore)
// Create helper
helper := &GitnessRegistryMetadataHelper{
spacePathStore: mockSpacePathStore,
}
// Setup mocks if provided
if tt.setupMocks != nil {
tt.setupMocks(mockSpacePathStore)
}
// Execute test
webhook, err := helper.MapToWebhookCore(context.Background(), tt.webhookReq, regInfo)
// Validate results
if tt.expectedError != "" {
assert.Error(t, err)
assert.Contains(t, err.Error(), tt.expectedError)
assert.Nil(t, webhook)
} else if tt.validate != nil {
tt.validate(t, webhook, err)
}
// Verify mock expectations
mockSpacePathStore.AssertExpectations(t)
})
}
}
func TestMapToWebhook_WithSecretSpacePath(t *testing.T) {
ctx := context.Background()
mockSpacePathStore := new(mocks.SpacePathStore)
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
helper := NewRegistryMetadataHelper(mockSpacePathStore, mockSpaceFinder, mockRegistryRepository)
secretSpacePath := "secret/path"
webhookRequest := api.WebhookRequest{
Identifier: "webhook",
Name: "webhook",
Url: "http://example.com",
Enabled: true,
Insecure: false,
Triggers: &[]api.Trigger{api.TriggerARTIFACTCREATION},
SecretSpacePath: &secretSpacePath,
}
mockSpacePathStore.On(
"FindByPath",
ctx,
"secret/path",
).Return(&gitnesstypes.SpacePath{
Value: "secret/path",
SpaceID: 2,
}, nil)
webhook, err := helper.MapToWebhookCore(ctx, webhookRequest, regInfo)
assert.NoError(t, err)
assert.NotNil(t, webhook)
assert.Equal(t, int64(2), webhook.SecretSpaceID)
mockSpacePathStore.AssertExpectations(t)
}
func TestMapToWebhook_WithInexistentSecretSpacePath(t *testing.T) {
ctx := context.Background()
mockSpacePathStore := new(mocks.SpacePathStore)
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
helper := NewRegistryMetadataHelper(mockSpacePathStore, mockSpaceFinder, mockRegistryRepository)
secretSpacePath := "secret/path"
webhookRequest := api.WebhookRequest{
Identifier: "webhook",
Name: "webhook",
Url: "http://example.com",
Enabled: true,
Insecure: false,
Triggers: &[]api.Trigger{api.TriggerARTIFACTCREATION},
SecretSpacePath: &secretSpacePath,
}
mockSpacePathStore.On("FindByPath", ctx, "secret/path").
Return(nil, fmt.Errorf("error finding path"))
webhook, err := helper.MapToWebhookCore(ctx, webhookRequest, regInfo)
assert.Error(t, err)
assert.Nil(t, webhook)
assert.Equal(t, "failed to get Space Path: error finding path", err.Error())
}
func TestMapToWebhookResponseEntity(t *testing.T) {
tests := []struct {
name string
webhook *gitnesstypes.WebhookCore
setupMocks func(*mocks.SpacePathStore, *mocks.SpaceFinder, *mocks.RegistryRepository)
expectedError string
validate func(*testing.T, *api.Webhook, error)
}{
{
name: "success_case",
webhook: &gitnesstypes.WebhookCore{
Type: gitnessenum.WebhookTypeInternal,
Identifier: "webhook",
DisplayName: "webhook",
URL: "http://example.com",
Enabled: true,
Insecure: false,
Triggers: []gitnessenum.WebhookTrigger{gitnessenum.WebhookTriggerArtifactCreated},
Created: time.Now().Unix(),
Updated: time.Now().Unix(),
Description: "Test webhook",
SecretIdentifier: "secret-id",
SecretSpaceID: 1,
ExtraHeaders: []gitnesstypes.ExtraHeader{{Key: "key", Value: "value"}},
LatestExecutionResult: &[]gitnessenum.WebhookExecutionResult{gitnessenum.WebhookExecutionResultSuccess}[0],
},
setupMocks: func(mockSpacePathStore *mocks.SpacePathStore, _ *mocks.SpaceFinder, _ *mocks.RegistryRepository) {
mockSpacePathStore.On("FindPrimaryBySpaceID", mock.Anything, int64(1)).Return(
&gitnesstypes.SpacePath{Value: "secret/path"}, nil)
},
validate: func(t *testing.T, webhook *api.Webhook, err error) {
assert.NoError(t, err, "should not return error")
assert.NotNil(t, webhook, "webhook should not be nil")
// Basic fields
assert.Equal(t, "webhook", webhook.Identifier, "identifier should match")
assert.Equal(t, "webhook", webhook.Name, "name should match")
assert.Equal(t, "http://example.com", webhook.Url, "URL should match")
assert.True(t, webhook.Enabled, "should be enabled")
assert.False(t, webhook.Insecure, "should not be insecure")
assert.Equal(t, "Test webhook", *webhook.Description, "description should match")
assert.True(t, *webhook.Internal, "should be internal")
// Triggers
assert.Len(t, *webhook.Triggers, 1, "should have 1 trigger")
assert.Equal(t, api.TriggerARTIFACTCREATION, (*webhook.Triggers)[0], "trigger should match")
// Secret fields
assert.Equal(t, "secret-id", *webhook.SecretIdentifier, "secret identifier should match")
assert.Equal(t, "secret/path", *webhook.SecretSpacePath, "secret space path should match")
assert.Equal(t, int64(1), *webhook.SecretSpaceId, "secret space ID should match")
// Extra headers
assert.Len(t, *webhook.ExtraHeaders, 1, "should have 1 extra header")
assert.Equal(t, "key", (*webhook.ExtraHeaders)[0].Key, "header key should match")
assert.Equal(t, "value", (*webhook.ExtraHeaders)[0].Value, "header value should match")
// Latest execution result
assert.Equal(t, api.WebhookExecResultSUCCESS, *webhook.LatestExecutionResult, "latest execution result should match")
},
},
{
name: "find_primary_by_space_id_error",
webhook: &gitnesstypes.WebhookCore{
SecretSpaceID: 1,
},
setupMocks: func(mockSpacePathStore *mocks.SpacePathStore, _ *mocks.SpaceFinder, _ *mocks.RegistryRepository) {
mockSpacePathStore.On("FindPrimaryBySpaceID", mock.Anything, int64(1)).Return(nil, fmt.Errorf("error finding primary by space ID"))
},
expectedError: "failed to get secret space path: error finding primary by space ID",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Create mocks
mockSpacePathStore := new(mocks.SpacePathStore)
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
// Create helper
helper := &GitnessRegistryMetadataHelper{
spacePathStore: mockSpacePathStore,
spaceFinder: mockSpaceFinder,
registryRepository: mockRegistryRepository,
}
// Setup mocks if provided
if tt.setupMocks != nil {
tt.setupMocks(mockSpacePathStore, mockSpaceFinder, mockRegistryRepository)
}
// Execute test
webhook, err := helper.MapToWebhookResponseEntity(context.Background(), tt.webhook)
// Validate results
if tt.expectedError != "" {
assert.Error(t, err, "should return error")
assert.Contains(t, err.Error(), tt.expectedError, "error message should match")
assert.Nil(t, webhook, "webhook should be nil")
} else if tt.validate != nil {
tt.validate(t, webhook, err)
}
// Verify mock expectations
mockSpacePathStore.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockRegistryRepository.AssertExpectations(t)
})
}
}
func TestMapToWebhookResponseEntity_FindByPathError(t *testing.T) {
// GIVEN
mockSpacePathStore := new(mocks.SpacePathStore)
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryDao := new(mocks.RegistryRepository)
helper := NewRegistryMetadataHelper(mockSpacePathStore, mockSpaceFinder, mockRegistryDao)
webhook := &gitnesstypes.WebhookCore{
ID: 1,
ParentID: 1,
Type: gitnessenum.WebhookTypeInternal,
Identifier: "webhook",
DisplayName: "webhook",
URL: "http://example.com",
Enabled: true,
Insecure: false,
SecretSpaceID: 1,
Created: 1234567890,
Updated: 1234567890,
}
mockSpacePathStore.On("FindPrimaryBySpaceID", mock.Anything, int64(1)).Return(nil, fmt.Errorf("space not found"))
// WHEN
result, err := helper.MapToWebhookResponseEntity(context.Background(), webhook)
// THEN
assert.Error(t, err)
assert.Nil(t, result)
mockSpacePathStore.AssertExpectations(t)
}
func TestGetRegistryRequestBaseInfo(t *testing.T) {
tests := []struct {
name string
parentRef string
registryName string
setupMocks func(*mocks.SpacePathStore, *mocks.SpaceFinder, *mocks.RegistryRepository)
expectedError string
validate func(*testing.T, *types.RegistryRequestBaseInfo, error)
}{
{
name: "success_case",
parentRef: "root/parent",
registryName: "reg",
setupMocks: func(_ *mocks.SpacePathStore, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepository *mocks.RegistryRepository) {
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(&gitnesstypes.SpaceCore{ID: 1}, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(&gitnesstypes.SpaceCore{ID: 2}, nil)
mockRegistryRepository.On("GetByParentIDAndName", mock.Anything, int64(2), "reg").Return(&types.Registry{
ID: 3,
Type: api.RegistryTypeVIRTUAL,
}, nil)
},
validate: func(t *testing.T, baseInfo *types.RegistryRequestBaseInfo, err error) {
assert.NoError(t, err, "should not return error")
assert.NotNil(t, baseInfo, "baseInfo should not be nil")
assert.Equal(t, int64(1), baseInfo.RootIdentifierID, "root ID should match")
assert.Equal(t, int64(2), baseInfo.ParentID, "parent ID should match")
assert.Equal(t, int64(3), baseInfo.RegistryID, "registry ID should match")
assert.Equal(t, api.RegistryTypeVIRTUAL, baseInfo.RegistryType, "registry type should match")
},
},
{
name: "empty_parent_ref",
parentRef: "",
registryName: "reg",
expectedError: "parent reference is required",
},
{
name: "invalid_parent_ref",
parentRef: "/",
registryName: "reg",
expectedError: "invalid parent reference",
},
{
name: "root_space_not_found",
parentRef: "root/parent",
registryName: "reg",
setupMocks: func(_ *mocks.SpacePathStore, mockSpaceFinder *mocks.SpaceFinder, _ *mocks.RegistryRepository) {
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(nil, fmt.Errorf("not found"))
},
expectedError: "root space not found",
},
{
name: "parent_space_not_found",
parentRef: "root/parent",
registryName: "reg",
setupMocks: func(_ *mocks.SpacePathStore, mockSpaceFinder *mocks.SpaceFinder, _ *mocks.RegistryRepository) {
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(&gitnesstypes.SpaceCore{ID: 1}, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(nil, fmt.Errorf("not found"))
},
expectedError: "parent space not found",
},
{
name: "registry_not_found",
parentRef: "root/parent",
registryName: "reg",
setupMocks: func(_ *mocks.SpacePathStore, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepository *mocks.RegistryRepository) {
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(&gitnesstypes.SpaceCore{ID: 1}, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(&gitnesstypes.SpaceCore{ID: 2}, nil)
mockRegistryRepository.On("GetByParentIDAndName", mock.Anything, int64(2), "reg").Return(nil, fmt.Errorf("not found"))
},
expectedError: "registry not found",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Create mocks
mockSpacePathStore := new(mocks.SpacePathStore)
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
// Create helper
helper := &GitnessRegistryMetadataHelper{
spacePathStore: mockSpacePathStore,
spaceFinder: mockSpaceFinder,
registryRepository: mockRegistryRepository,
}
// Setup mocks if provided
if tt.setupMocks != nil {
tt.setupMocks(mockSpacePathStore, mockSpaceFinder, mockRegistryRepository)
}
// Execute test
baseInfo, err := helper.GetRegistryRequestBaseInfo(context.Background(), tt.parentRef, tt.registryName)
// Validate results
if tt.expectedError != "" {
assert.Error(t, err, "should return error")
assert.Contains(t, err.Error(), tt.expectedError, "error message should match")
assert.Nil(t, baseInfo, "baseInfo should be nil")
} else if tt.validate != nil {
tt.validate(t, baseInfo, err)
}
// Verify mock expectations
mockSpacePathStore.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockRegistryRepository.AssertExpectations(t)
})
}
}
func TestMapToInternalWebhookTriggers(t *testing.T) {
helper := &GitnessRegistryMetadataHelper{}
tests := []struct {
name string
triggers []api.Trigger
expected []gitnessenum.WebhookTrigger
expectErr bool
}{
{
name: "success_case",
triggers: []api.Trigger{
api.TriggerARTIFACTCREATION,
api.TriggerARTIFACTDELETION,
},
expected: []gitnessenum.WebhookTrigger{
gitnessenum.WebhookTriggerArtifactCreated,
gitnessenum.WebhookTriggerArtifactDeleted,
},
expectErr: false,
},
{
name: "empty_triggers",
triggers: []api.Trigger{},
expected: []gitnessenum.WebhookTrigger{},
expectErr: false,
},
{
name: "invalid_trigger",
triggers: []api.Trigger{"INVALID_TRIGGER"},
expected: nil,
expectErr: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result, err := helper.MapToInternalWebhookTriggers(tt.triggers)
if tt.expectErr {
assert.Error(t, err, "should return error for invalid triggers")
assert.Nil(t, result, "result should be nil on error")
} else {
assert.NoError(t, err, "should not return error")
assert.Equal(t, tt.expected, result, "triggers should match")
}
})
}
}
func TestMapToAPIWebhookTriggers(t *testing.T) {
helper := &GitnessRegistryMetadataHelper{}
tests := []struct {
name string
triggers []gitnessenum.WebhookTrigger
expected []api.Trigger
}{
{
name: "success_case",
triggers: []gitnessenum.WebhookTrigger{
gitnessenum.WebhookTriggerArtifactCreated,
gitnessenum.WebhookTriggerArtifactDeleted,
},
expected: []api.Trigger{
api.TriggerARTIFACTCREATION,
api.TriggerARTIFACTDELETION,
},
},
{
name: "empty_triggers",
triggers: []gitnessenum.WebhookTrigger{},
expected: []api.Trigger{},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := helper.MapToAPIWebhookTriggers(tt.triggers)
assert.Equal(t, tt.expected, result, "triggers should match")
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_webhook_execution.go | registry/app/api/controller/metadata/get_webhook_execution.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
"strconv"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
const getWebhookErrMsg = "failed to get webhook execution for registry: %s, webhook: %s with error: %v"
func (c *APIController) GetWebhookExecution(
ctx context.Context,
r api.GetWebhookExecutionRequestObject,
) (api.GetWebhookExecutionResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return getWebhooksExecutionsInternalErrorResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return getWebhooksExecutionsInternalErrorResponse(err)
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
log.Ctx(ctx).Error().Msgf("permission check failed while get webhook execution for registry: %s, error: %v",
regInfo.RegistryIdentifier, err)
return api.GetWebhookExecution403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
webhookExecutionID, err := strconv.ParseInt(string(r.WebhookExecutionId), 10, 64)
if err != nil || webhookExecutionID <= 0 {
log.Ctx(ctx).Error().Msgf("invalid webhook execution identifier: %s, err: %v", string(r.WebhookExecutionId), err)
return api.GetWebhookExecution400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest,
fmt.Sprintf("invalid webhook execution identifier: %s, err: %v", string(r.WebhookExecutionId), err)),
),
}, nil
}
w, err := c.WebhooksExecutionRepository.Find(ctx, webhookExecutionID)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return api.GetWebhookExecution404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, fmt.Sprintf("webhook execution '%d' not found", webhookExecutionID)),
),
}, nil
}
log.Ctx(ctx).Error().Msgf(getWebhookErrMsg, regInfo.RegistryRef, r.WebhookIdentifier, err)
return getWebhooksExecutionsInternalErrorResponse(fmt.Errorf("failed to find webhook execution: %w", err))
}
webhookExecution, err := MapToWebhookExecutionResponseEntity(*w)
if err != nil {
log.Ctx(ctx).Error().Msgf(getWebhookErrMsg, regInfo.RegistryRef, r.WebhookIdentifier, err)
return getWebhooksExecutionsInternalErrorResponse(err)
}
return api.GetWebhookExecution200JSONResponse{
WebhookExecutionResponseJSONResponse: api.WebhookExecutionResponseJSONResponse{
Data: *webhookExecution,
Status: api.StatusSUCCESS,
},
}, nil
}
//nolint:unparam
func getWebhooksExecutionsInternalErrorResponse(err error) (api.GetWebhookExecution500JSONResponse, error) {
return api.GetWebhookExecution500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_registry_artifacts_test.go | registry/app/api/controller/metadata/get_registry_artifacts_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"testing"
"time"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
registrytypes "github.com/harness/gitness/registry/types"
"github.com/stretchr/testify/assert"
)
func TestGetAllArtifactByRegistryResponse(t *testing.T) {
artifacts := &[]registrytypes.ArtifactMetadata{
{
Name: "test-artifact",
LatestVersion: "1.0.0",
PackageType: api.PackageTypeDOCKER,
ID: 1,
RepoName: "test-registry",
CreatedAt: time.Now(),
ModifiedAt: time.Now(),
DownloadCount: 100,
Labels: []string{"test"},
},
{
Name: "another-artifact",
LatestVersion: "2.0.0",
PackageType: api.PackageTypeGENERIC,
ID: 2,
RepoName: "test-registry",
CreatedAt: time.Now(),
ModifiedAt: time.Now(),
DownloadCount: 50,
Labels: nil,
},
}
response := GetAllArtifactByRegistryResponse(artifacts, 2, 1, 10)
assert.NotNil(t, response)
assert.Equal(t, api.StatusSUCCESS, response.Status)
assert.Equal(t, int64(2), *response.Data.ItemCount)
assert.Equal(t, int64(1), *response.Data.PageCount)
assert.Equal(t, int64(1), *response.Data.PageIndex)
assert.Equal(t, 10, *response.Data.PageSize)
assert.Len(t, response.Data.Artifacts, 2)
// Test first artifact
assert.Equal(t, "test-artifact", response.Data.Artifacts[0].Name)
assert.Equal(t, "1.0.0", response.Data.Artifacts[0].LatestVersion)
assert.Equal(t, api.PackageTypeDOCKER, response.Data.Artifacts[0].PackageType)
assert.NotNil(t, response.Data.Artifacts[0].DownloadsCount)
assert.Equal(t, int64(100), *response.Data.Artifacts[0].DownloadsCount)
assert.NotNil(t, response.Data.Artifacts[0].Labels)
assert.Contains(t, *response.Data.Artifacts[0].Labels, "test")
// Test second artifact
assert.Equal(t, "another-artifact", response.Data.Artifacts[1].Name)
assert.Equal(t, "2.0.0", response.Data.Artifacts[1].LatestVersion)
assert.Equal(t, api.PackageTypeGENERIC, response.Data.Artifacts[1].PackageType)
assert.NotNil(t, response.Data.Artifacts[1].DownloadsCount)
assert.Equal(t, int64(50), *response.Data.Artifacts[1].DownloadsCount)
assert.NotNil(t, response.Data.Artifacts[1].Labels)
assert.Empty(t, *response.Data.Artifacts[1].Labels)
}
func TestGetRegistryArtifactMetadata(t *testing.T) {
artifacts := []registrytypes.ArtifactMetadata{
{
Name: "test-artifact",
LatestVersion: "1.0.0",
PackageType: api.PackageTypeDOCKER,
ID: 1,
RepoName: "test-registry",
CreatedAt: time.Now(),
ModifiedAt: time.Now(),
DownloadCount: 100,
Labels: []string{"test", "artifact"},
},
{
Name: "empty-artifact",
LatestVersion: "0.1.0",
PackageType: api.PackageTypeGENERIC,
ID: 2,
RepoName: "test-registry",
CreatedAt: time.Now(),
ModifiedAt: time.Now(),
DownloadCount: 0,
Labels: nil,
},
}
metadata := GetRegistryArtifactMetadata(artifacts)
assert.Len(t, metadata, 2)
// Test first artifact with data
assert.Equal(t, "test-artifact", metadata[0].Name)
assert.Equal(t, "1.0.0", metadata[0].LatestVersion)
assert.Equal(t, api.PackageTypeDOCKER, metadata[0].PackageType)
assert.NotNil(t, metadata[0].DownloadsCount)
assert.Equal(t, int64(100), *metadata[0].DownloadsCount)
assert.NotNil(t, metadata[0].Labels)
assert.Len(t, *metadata[0].Labels, 2)
assert.Contains(t, *metadata[0].Labels, "test")
assert.Contains(t, *metadata[0].Labels, "artifact")
// Test second artifact with zero/nil values
assert.Equal(t, "empty-artifact", metadata[1].Name)
assert.Equal(t, "0.1.0", metadata[1].LatestVersion)
assert.Equal(t, api.PackageTypeGENERIC, metadata[1].PackageType)
assert.NotNil(t, metadata[1].DownloadsCount)
assert.Equal(t, int64(0), *metadata[1].DownloadsCount)
assert.NotNil(t, metadata[1].Labels)
assert.Empty(t, *metadata[1].Labels)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/delete_registry_test.go | registry/app/api/controller/metadata/delete_registry_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"testing"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
func TestDeleteRegistry(t *testing.T) {
// Create a mock session for testing
principal := coretypes.Principal{
ID: 1,
Type: enum.PrincipalTypeUser,
Email: "test@example.com",
}
mockSession := &auth.Session{
Principal: principal,
}
// Create a context with the mock session
testCtx := request.WithAuthSession(context.Background(), mockSession)
tests := []struct {
name string
setupMocks func(*APIController)
request api.DeleteRegistryRequestObject
expectedResp api.DeleteRegistryResponseObject
expectedError error
}{
{
name: "success_case_virtual_registry",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockImageStore := new(mocks.ImageRepository)
mockTx := new(mocks.Transaction)
mockAuditService := new(mocks.AuditService)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
}
registry := &types.Registry{
ID: 1,
Name: "reg",
ParentID: 2,
Type: "virtual",
PackageType: "pypi",
}
permissionChecks := []coretypes.PermissionCheck{
{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{Type: enum.ResourceTypeRegistry, Identifier: "reg"},
Permission: enum.PermissionRegistryDelete,
},
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo,
nil)
mockRegistryMetadataHelper.On(
"GetPermissionChecks",
space,
"reg",
enum.PermissionRegistryDelete,
).Return(permissionChecks)
mockAuthorizer.On(
"CheckAll",
mock.Anything,
mock.AnythingOfType("*auth.Session"),
permissionChecks[0],
).Return(true, nil)
mockRegistryRepository.On(
"GetByParentIDAndName",
mock.Anything,
regInfo.ParentID,
regInfo.RegistryIdentifier,
).Return(registry, nil)
mockRegistryRepository.On("FetchRegistriesIDByUpstreamProxyID", mock.Anything,
mock.Anything, regInfo.RootIdentifierID).Return([]int64{}, nil)
mockImageStore.On("DeleteDownloadStatByRegistryID", mock.Anything, regInfo.RegistryID).Return(nil)
mockImageStore.On("DeleteBandwidthStatByRegistryID", mock.Anything, regInfo.RegistryID).Return(nil)
mockImageStore.On("DeleteByRegistryID", mock.Anything, regInfo.RegistryID).Return(nil)
mockRegistryRepository.On("Delete", mock.Anything, regInfo.ParentID,
regInfo.RegistryIdentifier).Return(nil)
mockAuditService.On(
"Log",
mock.Anything,
mock.AnythingOfType("*types.PrincipalInfo"),
mock.AnythingOfType("*audit.Resource"),
mock.AnythingOfType("string"),
mock.AnythingOfType("string"),
mock.AnythingOfType("audit.Option"),
).Return(nil)
// Simply return nil for the transaction - we're testing the controller logic, not transaction details
mockTx.On("WithTx", mock.Anything, mock.AnythingOfType("func(context.Context) error")).Return(nil)
c.SpaceFinder = mockSpaceFinder
c.RegistryRepository = mockRegistryRepository
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.ImageStore = mockImageStore
c.tx = mockTx
c.AuditService = mockAuditService
},
request: api.DeleteRegistryRequestObject{
RegistryRef: "reg",
},
expectedResp: api.DeleteRegistry200JSONResponse{
SuccessJSONResponse: api.SuccessJSONResponse{
Status: api.StatusSUCCESS,
},
},
},
{
name: "invalid_registry_reference",
setupMocks: func(c *APIController) {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryMetadataHelper.On(
"GetRegistryRequestBaseInfo",
mock.Anything,
"",
"invalid-reg",
).Return(nil, fmt.Errorf("invalid registry reference"))
c.RegistryMetadataHelper = mockRegistryMetadataHelper
},
request: api.DeleteRegistryRequestObject{
RegistryRef: "invalid-reg",
},
expectedResp: api.DeleteRegistry400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse{
Code: "400",
Message: "invalid registry reference",
},
},
expectedError: nil,
},
{
name: "permission_check_fails",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockAuthorizer := new(mocks.Authorizer)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
}
permissionChecks := []coretypes.PermissionCheck{
{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{Type: enum.ResourceTypeRegistry, Identifier: "reg"},
Permission: enum.PermissionRegistryDelete,
},
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo,
nil)
mockRegistryMetadataHelper.On(
"GetPermissionChecks",
space,
"reg",
enum.PermissionRegistryDelete,
).Return(permissionChecks)
mockAuthorizer.On(
"CheckAll",
mock.Anything,
mock.AnythingOfType("*auth.Session"),
permissionChecks[0],
).Return(false, fmt.Errorf("not authorized"))
c.SpaceFinder = mockSpaceFinder
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.Authorizer = mockAuthorizer
},
request: api.DeleteRegistryRequestObject{
RegistryRef: "reg",
},
expectedResp: api.DeleteRegistry403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse{
Code: "403",
Message: "not authorized",
},
},
expectedError: nil,
},
{
name: "registry_not_found",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
}
permissionChecks := []coretypes.PermissionCheck{
{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{Type: enum.ResourceTypeRegistry, Identifier: "reg"},
Permission: enum.PermissionRegistryDelete,
},
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo,
nil)
mockRegistryMetadataHelper.On(
"GetPermissionChecks",
space,
"reg",
enum.PermissionRegistryDelete,
).Return(permissionChecks)
mockAuthorizer.On(
"CheckAll",
mock.Anything,
mock.AnythingOfType("*auth.Session"),
permissionChecks[0],
).Return(true, nil)
mockRegistryRepository.On(
"GetByParentIDAndName",
mock.Anything,
regInfo.ParentID,
regInfo.RegistryIdentifier,
).Return(nil, fmt.Errorf("registry doesn't exist with this key"))
c.SpaceFinder = mockSpaceFinder
c.RegistryRepository = mockRegistryRepository
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
},
request: api.DeleteRegistryRequestObject{
RegistryRef: "reg",
},
expectedResp: api.DeleteRegistry404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse{
Code: "404",
Message: "registry doesn't exist with this key",
},
},
},
{
name: "success_case_native_registry",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockImageStore := new(mocks.ImageRepository)
mockTx := new(mocks.Transaction)
mockAuditService := new(mocks.AuditService)
mockUpstreamProxyStore := new(mocks.UpstreamProxyStore)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
}
registry := &types.Registry{
ID: 1,
Name: "reg",
ParentID: 2,
Type: "native",
PackageType: "pypi",
}
permissionChecks := []coretypes.PermissionCheck{
{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{Type: enum.ResourceTypeRegistry, Identifier: "reg"},
Permission: enum.PermissionRegistryDelete,
},
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo,
nil)
mockRegistryMetadataHelper.On(
"GetPermissionChecks",
space,
"reg",
enum.PermissionRegistryDelete,
).Return(permissionChecks)
mockAuthorizer.On(
"CheckAll",
mock.Anything,
mock.AnythingOfType("*auth.Session"),
permissionChecks[0],
).Return(true, nil)
mockRegistryRepository.On(
"GetByParentIDAndName",
mock.Anything,
regInfo.ParentID,
regInfo.RegistryIdentifier,
).Return(registry, nil)
mockRegistryRepository.On(
"FetchUpstreamProxyIDs",
mock.Anything,
[]string{regInfo.RegistryIdentifier},
regInfo.ParentID,
).Return([]int64{}, nil)
mockRegistryRepository.On("FetchRegistriesIDByUpstreamProxyID", mock.Anything,
mock.Anything, regInfo.RootIdentifierID).Return([]int64{}, nil)
mockUpstreamProxyStore.On("Delete", mock.Anything, regInfo.ParentID,
regInfo.RegistryIdentifier).Return(nil)
mockImageStore.On("DeleteDownloadStatByRegistryID", mock.Anything, regInfo.RegistryID).Return(nil)
mockImageStore.On("DeleteBandwidthStatByRegistryID", mock.Anything, regInfo.RegistryID).Return(nil)
mockImageStore.On("DeleteByRegistryID", mock.Anything, regInfo.RegistryID).Return(nil)
mockRegistryRepository.On("Delete", mock.Anything, regInfo.ParentID,
regInfo.RegistryIdentifier).Return(nil)
mockAuditService.On(
"Log",
mock.Anything,
mock.AnythingOfType("*types.PrincipalInfo"),
mock.AnythingOfType("*audit.Resource"),
mock.AnythingOfType("string"),
mock.AnythingOfType("string"),
mock.AnythingOfType("audit.Option"),
).Return(nil)
// Simply return nil for the transaction - we're testing the controller logic, not transaction details
mockTx.On("WithTx", mock.Anything, mock.AnythingOfType("func(context.Context) error")).Return(nil)
c.SpaceFinder = mockSpaceFinder
c.RegistryRepository = mockRegistryRepository
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.ImageStore = mockImageStore
c.tx = mockTx
c.AuditService = mockAuditService
c.UpstreamProxyStore = mockUpstreamProxyStore
},
request: api.DeleteRegistryRequestObject{
RegistryRef: "reg",
},
expectedResp: api.DeleteRegistry200JSONResponse{
SuccessJSONResponse: api.SuccessJSONResponse{
Status: api.StatusSUCCESS,
},
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Setup
controller := &APIController{}
tt.setupMocks(controller)
// Execute with the mock session context
resp, err := controller.DeleteRegistry(testCtx, tt.request)
// Verify error only if explicitly expected.
if tt.expectedError != nil {
assert.Error(t, err, "Expected an error but got none")
assert.Equal(t, tt.expectedError.Error(), err.Error(), "Error message should match")
} else if _, ok := tt.expectedResp.(api.DeleteRegistry200JSONResponse); ok {
// Only assert no error for success responses.
assert.NoError(t, err, "Expected no error for success response")
}
// For error response types like 400/404/403, we don't assert err since the response object is what matters.
// Verify response with detailed assertions.
assert.NotNil(t, resp, "Response should not be nil")
// Verify correct response type matching.
switch tt.expectedResp.(type) {
case api.DeleteRegistry200JSONResponse:
_, ok := resp.(api.DeleteRegistry200JSONResponse)
assert.True(t, ok, "Expected 200 success response")
// Not checking Status field as it's hardcoded in test data and doesn't validate behavior.
case api.DeleteRegistry400JSONResponse:
_, ok := resp.(api.DeleteRegistry400JSONResponse)
assert.True(t, ok, "Expected 400 bad request response")
// Not checking fields as they're hardcoded in test data.
case api.DeleteRegistry403JSONResponse:
_, ok := resp.(api.DeleteRegistry403JSONResponse)
assert.True(t, ok, "Expected 403 forbidden response")
// Not checking fields as they're hardcoded in test data.
case api.DeleteRegistry404JSONResponse:
_, ok := resp.(api.DeleteRegistry404JSONResponse)
assert.True(t, ok, "Expected 404 not found response")
// Not checking fields as they're hardcoded in test data.
default:
// Fallback to simple type equality for any other response types.
expectedType := fmt.Sprintf("%T", tt.expectedResp)
actualType := fmt.Sprintf("%T", resp)
assert.Equal(t, expectedType, actualType, "Response type should match.")
}
// Verify only essential mocks since we're not executing transaction functions.
if controller.SpaceFinder != nil {
mockSpaceFinder, ok := controller.SpaceFinder.(*mocks.SpaceFinder)
if !ok {
t.Fatal("Expected spaceFinder to be of type *mocks.spaceFinder")
}
mockSpaceFinder.AssertExpectations(t)
}
// Verify only FindByRef and GetPermissionChecks from RegistryRepository.
if controller.RegistryRepository != nil {
mockRegistryRepo, ok := controller.RegistryRepository.(*mocks.RegistryRepository)
if !ok {
t.Fatal("Expected RegistryRepository to be of type *mocks.RegistryRepository")
}
// We could use AssertCalled for specific methods if needed.
// Only verify GetByParentIDAndName which is called before the transaction.
mockRegistryRepo.AssertCalled(t, "GetByParentIDAndName", mock.Anything, mock.Anything, mock.Anything)
}
if controller.Authorizer != nil {
mockAuthorizer, ok := controller.Authorizer.(*mocks.Authorizer)
if !ok {
t.Fatal("Expected Authorizer to be of type *mocks.Authorizer")
}
mockAuthorizer.AssertExpectations(t)
}
if controller.RegistryMetadataHelper != nil {
mockRegistryMetadataHelper, ok := controller.RegistryMetadataHelper.(*mocks.RegistryMetadataHelper)
if !ok {
t.Fatal("Expected RegistryMetadataHelper to be of type *mocks.RegistryMetadataHelper")
}
mockRegistryMetadataHelper.AssertExpectations(t)
}
// Verify transaction was attempted.
if controller.tx != nil {
mockTx, ok := controller.tx.(*mocks.Transaction)
if !ok {
t.Fatal("Expected tx to be of type *mocks.Transaction")
}
mockTx.AssertCalled(t, "WithTx", mock.Anything, mock.Anything)
}
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/registry_metadata_helper.go | registry/app/api/controller/metadata/registry_metadata_helper.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"strconv"
"github.com/harness/gitness/app/paths"
corestore "github.com/harness/gitness/app/store"
"github.com/harness/gitness/registry/app/api/interfaces"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/pkg/commons"
"github.com/harness/gitness/registry/app/store"
registrytypes "github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
)
var _ interfaces.RegistryMetadataHelper = (*GitnessRegistryMetadataHelper)(nil)
type GitnessRegistryMetadataHelper struct {
spacePathStore corestore.SpacePathStore
spaceFinder interfaces.SpaceFinder
registryRepository store.RegistryRepository
}
func NewRegistryMetadataHelper(
spacePathStore corestore.SpacePathStore,
spaceFinder interfaces.SpaceFinder,
registryRepository store.RegistryRepository,
) interfaces.RegistryMetadataHelper {
gitnessRegistryMetadataHelper := GitnessRegistryMetadataHelper{
spacePathStore: spacePathStore,
spaceFinder: spaceFinder,
registryRepository: registryRepository,
}
return &gitnessRegistryMetadataHelper
}
func (r *GitnessRegistryMetadataHelper) GetSecretSpaceID(
ctx context.Context,
secretSpacePath *string,
) (int64, error) {
if secretSpacePath == nil {
return -1, fmt.Errorf("secret space path is missing")
}
path, err := r.spacePathStore.FindByPath(ctx, *secretSpacePath)
if err != nil {
return -1, fmt.Errorf("failed to get Space Path: %w", err)
}
return path.SpaceID, nil
}
// GetRegistryRequestBaseInfo returns the base info for the registry request
// One of the regRefParam or (parentRefParam + regIdentifierParam) should be provided.
func (r *GitnessRegistryMetadataHelper) GetRegistryRequestBaseInfo(
ctx context.Context,
parentRef string,
regRef string,
) (*registrytypes.RegistryRequestBaseInfo, error) {
// ---------- CHECKS ------------
if commons.IsEmpty(parentRef) && !commons.IsEmpty(regRef) {
parentRef, _, _ = paths.DisectLeaf(regRef)
}
// ---------- PARENT ------------
if commons.IsEmpty(parentRef) {
return nil, fmt.Errorf("parent reference is required")
}
rootIdentifier, _, err := paths.DisectRoot(parentRef)
if err != nil {
return nil, fmt.Errorf("invalid parent reference: %w", err)
}
rootSpace, err := r.spaceFinder.FindByRef(ctx, rootIdentifier)
if err != nil {
return nil, fmt.Errorf("root space not found: %w", err)
}
parentSpace, err := r.spaceFinder.FindByRef(ctx, parentRef)
if err != nil {
return nil, fmt.Errorf("parent space not found: %w", err)
}
rootIdentifierID := rootSpace.ID
parentID := parentSpace.ID
baseInfo := registrytypes.RegistryRequestBaseInfo{
ParentRef: parentRef,
ParentID: parentID,
RootIdentifier: rootIdentifier,
RootIdentifierID: rootIdentifierID,
}
// ---------- REGISTRY ------------
if !commons.IsEmpty(regRef) {
_, regIdentifier, _ := paths.DisectLeaf(regRef)
reg, getRegistryErr := r.registryRepository.GetByParentIDAndName(ctx, parentID, regIdentifier)
if getRegistryErr != nil {
return nil, fmt.Errorf("registry not found: %w", getRegistryErr)
}
baseInfo.RegistryRef = regRef
baseInfo.RegistryIdentifier = regIdentifier
baseInfo.RegistryID = reg.ID
baseInfo.RegistryType = reg.Type
baseInfo.PackageType = reg.PackageType
}
return &baseInfo, nil
}
func (r *GitnessRegistryMetadataHelper) GetPermissionChecks(
space *types.SpaceCore,
registryIdentifier string,
permission enum.Permission,
) []types.PermissionCheck {
var permissionChecks []types.PermissionCheck
permissionCheck := &types.PermissionCheck{
Scope: types.Scope{SpacePath: space.Path},
Resource: types.Resource{Type: enum.ResourceTypeRegistry, Identifier: registryIdentifier},
Permission: permission,
}
permissionChecks = append(permissionChecks, *permissionCheck)
return permissionChecks
}
func (r *GitnessRegistryMetadataHelper) MapToWebhookCore(
ctx context.Context,
webhookRequest api.WebhookRequest,
regInfo *registrytypes.RegistryRequestBaseInfo,
) (*types.WebhookCore, error) {
webhook := &types.WebhookCore{
DisplayName: webhookRequest.Name,
ParentType: enum.WebhookParentRegistry,
ParentID: regInfo.RegistryID,
Scope: webhookScopeRegistry,
Identifier: webhookRequest.Identifier,
URL: webhookRequest.Url,
Enabled: webhookRequest.Enabled,
Insecure: webhookRequest.Insecure,
}
if webhookRequest.Triggers != nil {
triggers, err := r.MapToInternalWebhookTriggers(*webhookRequest.Triggers)
if err != nil {
return nil, fmt.Errorf("failed to map to internal webhook triggers: %w", err)
}
webhook.Triggers = deduplicateTriggers(triggers)
}
if webhookRequest.Description != nil {
webhook.Description = *webhookRequest.Description
}
if webhookRequest.SecretIdentifier != nil {
webhook.SecretIdentifier = *webhookRequest.SecretIdentifier
}
if webhookRequest.SecretSpacePath != nil && len(*webhookRequest.SecretSpacePath) > 0 {
secretSpaceID, err := r.GetSecretSpaceID(ctx, webhookRequest.SecretSpacePath)
if err != nil {
return nil, err
}
webhook.SecretSpaceID = secretSpaceID
} else if webhookRequest.SecretSpaceId != nil {
webhook.SecretSpaceID = *webhookRequest.SecretSpaceId
}
if webhookRequest.ExtraHeaders != nil {
webhook.ExtraHeaders = mapToDTOHeaders(webhookRequest.ExtraHeaders)
}
return webhook, nil
}
func mapToDTOHeaders(extraHeaders *[]api.ExtraHeader) []types.ExtraHeader {
var headers []types.ExtraHeader
for _, h := range *extraHeaders {
masked := false
if h.Masked != nil {
masked = *h.Masked
}
headers = append(headers, types.ExtraHeader{Key: h.Key, Value: h.Value, Masked: masked})
}
return headers
}
func (r *GitnessRegistryMetadataHelper) MapToWebhookResponseEntity(
ctx context.Context,
createdWebhook *types.WebhookCore,
) (*api.Webhook, error) {
createdAt := strconv.FormatInt(createdWebhook.Created, 10)
modifiedAt := strconv.FormatInt(createdWebhook.Updated, 10)
triggers := r.MapToAPIWebhookTriggers(createdWebhook.Triggers)
webhookResponseEntity := &api.Webhook{
Identifier: createdWebhook.Identifier,
Name: createdWebhook.DisplayName,
Description: &createdWebhook.Description,
Url: createdWebhook.URL,
Version: &createdWebhook.Version,
Enabled: createdWebhook.Enabled,
Insecure: createdWebhook.Insecure,
Triggers: &triggers,
CreatedBy: &createdWebhook.CreatedBy,
CreatedAt: &createdAt,
ModifiedAt: &modifiedAt,
}
isInternal := false
if createdWebhook.Type == enum.WebhookTypeInternal {
isInternal = true
} else {
isInternal = false
}
webhookResponseEntity.Internal = &isInternal
if createdWebhook.LatestExecutionResult != nil {
result := r.MapToAPIExecutionResult(*createdWebhook.LatestExecutionResult)
webhookResponseEntity.LatestExecutionResult = &result
}
if createdWebhook.ExtraHeaders != nil {
extraHeaders := r.MapToAPIExtraHeaders(createdWebhook.ExtraHeaders)
webhookResponseEntity.ExtraHeaders = &extraHeaders
}
secretSpacePath := ""
if createdWebhook.SecretSpaceID > 0 {
primary, err := r.spacePathStore.FindPrimaryBySpaceID(ctx, createdWebhook.SecretSpaceID)
if err != nil {
return nil, fmt.Errorf("failed to get secret space path: %w", err)
}
secretSpacePath = primary.Value
}
if createdWebhook.SecretIdentifier != "" {
webhookResponseEntity.SecretIdentifier = &createdWebhook.SecretIdentifier
}
if secretSpacePath != "" {
webhookResponseEntity.SecretSpacePath = &secretSpacePath
}
if createdWebhook.SecretSpaceID > 0 {
webhookResponseEntity.SecretSpaceId = &createdWebhook.SecretSpaceID
}
return webhookResponseEntity, nil
}
func (r *GitnessRegistryMetadataHelper) MapToInternalWebhookTriggers(
triggers []api.Trigger,
) ([]enum.WebhookTrigger, error) {
var webhookTriggers = make([]enum.WebhookTrigger, 0)
var invalidTriggers []string
for _, trigger := range triggers {
switch trigger {
case api.TriggerARTIFACTCREATION:
webhookTriggers = append(webhookTriggers, enum.WebhookTriggerArtifactCreated)
case api.TriggerARTIFACTDELETION:
webhookTriggers = append(webhookTriggers, enum.WebhookTriggerArtifactDeleted)
default:
invalidTriggers = append(invalidTriggers, string(trigger))
}
}
if len(invalidTriggers) > 0 {
return nil, fmt.Errorf("invalid webhook triggers: %v", invalidTriggers)
}
return webhookTriggers, nil
}
func (r *GitnessRegistryMetadataHelper) MapToAPIExecutionResult(
result enum.WebhookExecutionResult,
) api.WebhookExecResult {
switch result {
case enum.WebhookExecutionResultSuccess:
return api.WebhookExecResultSUCCESS
case enum.WebhookExecutionResultRetriableError:
return api.WebhookExecResultRETRIABLEERROR
case enum.WebhookExecutionResultFatalError:
return api.WebhookExecResultFATALERROR
}
return ""
}
func (r *GitnessRegistryMetadataHelper) MapToAPIWebhookTriggers(triggers []enum.WebhookTrigger) []api.Trigger {
var webhookTriggers = make([]api.Trigger, 0)
for _, trigger := range triggers {
//nolint:exhaustive
switch trigger {
case enum.WebhookTriggerArtifactCreated:
webhookTriggers = append(webhookTriggers, api.TriggerARTIFACTCREATION)
case enum.WebhookTriggerArtifactDeleted:
webhookTriggers = append(webhookTriggers, api.TriggerARTIFACTDELETION)
}
}
return webhookTriggers
}
func (r *GitnessRegistryMetadataHelper) MapToAPIExtraHeaders(headers []types.ExtraHeader) []api.ExtraHeader {
apiHeaders := make([]api.ExtraHeader, 0)
for _, h := range headers {
masked := h.Masked
apiHeaders = append(apiHeaders, api.ExtraHeader{Key: h.Key, Value: h.Value, Masked: &masked})
}
return apiHeaders
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/controller.go | registry/app/api/controller/metadata/controller.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
spacecontroller "github.com/harness/gitness/app/api/controller/space"
"github.com/harness/gitness/app/api/usererror"
"github.com/harness/gitness/app/auth/authz"
"github.com/harness/gitness/app/services/publicaccess"
gstore "github.com/harness/gitness/app/store"
urlprovider "github.com/harness/gitness/app/url"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/registry/app/api/interfaces"
storagedriver "github.com/harness/gitness/registry/app/driver"
registryevents "github.com/harness/gitness/registry/app/events/artifact"
registrypostprocessingevents "github.com/harness/gitness/registry/app/events/asyncprocessing"
"github.com/harness/gitness/registry/app/pkg/filemanager"
"github.com/harness/gitness/registry/app/pkg/quarantine"
"github.com/harness/gitness/registry/app/services/refcache"
"github.com/harness/gitness/registry/app/store"
"github.com/harness/gitness/registry/app/utils/cargo"
"github.com/harness/gitness/registry/services/webhook"
"github.com/harness/gitness/store/database/dbtx"
)
var errPublicArtifactRegistryCreationDisabled = usererror.BadRequest("Public artifact registry creation is disabled.")
var errPublicAccessToArtifactRegistriesDisabled = usererror.BadRequest(
"Public access to artifact registries is disabled.",
)
// APIController simple struct.
type APIController struct {
ImageStore store.ImageRepository
fileManager filemanager.FileManager
BlobStore store.BlobRepository
GenericBlobStore store.GenericBlobRepository
RegistryRepository store.RegistryRepository
UpstreamProxyStore store.UpstreamProxyConfigRepository
TagStore store.TagRepository
ManifestStore store.ManifestRepository
CleanupPolicyStore store.CleanupPolicyRepository
SpaceFinder interfaces.SpaceFinder
tx dbtx.Transactor
StorageDriver storagedriver.StorageDriver
URLProvider urlprovider.Provider
Authorizer authz.Authorizer
AuditService audit.Service
ArtifactStore store.ArtifactRepository
WebhooksRepository store.WebhooksRepository
WebhooksExecutionRepository store.WebhooksExecutionRepository
RegistryMetadataHelper interfaces.RegistryMetadataHelper
WebhookService webhook.ServiceInterface
ArtifactEventReporter registryevents.Reporter
DownloadStatRepository store.DownloadStatRepository
SetupDetailsAuthHeaderPrefix string
RegistryBlobStore store.RegistryBlobRepository
RegFinder refcache.RegistryFinder
PostProcessingReporter *registrypostprocessingevents.Reporter
CargoRegistryHelper cargo.RegistryHelper
SpaceController *spacecontroller.Controller
QuarantineArtifactRepository store.QuarantineArtifactRepository
QuarantineFinder quarantine.Finder
SpaceStore gstore.SpaceStore
UntaggedImagesEnabled func(ctx context.Context) bool
PackageWrapper interfaces.PackageWrapper
PublicAccess publicaccess.Service
}
func NewAPIController(
repositoryStore store.RegistryRepository,
fileManager filemanager.FileManager,
blobStore store.BlobRepository,
genericBlobStore store.GenericBlobRepository,
upstreamProxyStore store.UpstreamProxyConfigRepository,
tagStore store.TagRepository,
manifestStore store.ManifestRepository,
cleanupPolicyStore store.CleanupPolicyRepository,
imageStore store.ImageRepository,
driver storagedriver.StorageDriver,
spaceFinder interfaces.SpaceFinder,
tx dbtx.Transactor,
urlProvider urlprovider.Provider,
authorizer authz.Authorizer,
auditService audit.Service,
artifactStore store.ArtifactRepository,
webhooksRepository store.WebhooksRepository,
webhooksExecutionRepository store.WebhooksExecutionRepository,
registryMetadataHelper interfaces.RegistryMetadataHelper,
webhookService webhook.ServiceInterface,
artifactEventReporter registryevents.Reporter,
downloadStatRepository store.DownloadStatRepository,
setupDetailsAuthHeaderPrefix string,
registryBlobStore store.RegistryBlobRepository,
regFinder refcache.RegistryFinder,
postProcessingReporter *registrypostprocessingevents.Reporter,
cargoRegistryHelper cargo.RegistryHelper,
spaceController *spacecontroller.Controller,
quarantineArtifactRepository store.QuarantineArtifactRepository,
quarantineFinder quarantine.Finder,
spaceStore gstore.SpaceStore,
untaggedImagesEnabled func(ctx context.Context) bool,
packageWrapper interfaces.PackageWrapper,
publicAccess publicaccess.Service,
) *APIController {
return &APIController{
fileManager: fileManager,
GenericBlobStore: genericBlobStore,
BlobStore: blobStore,
RegistryRepository: repositoryStore,
UpstreamProxyStore: upstreamProxyStore,
TagStore: tagStore,
ManifestStore: manifestStore,
CleanupPolicyStore: cleanupPolicyStore,
ImageStore: imageStore,
SpaceFinder: spaceFinder,
StorageDriver: driver,
tx: tx,
URLProvider: urlProvider,
Authorizer: authorizer,
AuditService: auditService,
ArtifactStore: artifactStore,
WebhooksRepository: webhooksRepository,
WebhooksExecutionRepository: webhooksExecutionRepository,
RegistryMetadataHelper: registryMetadataHelper,
WebhookService: webhookService,
ArtifactEventReporter: artifactEventReporter,
DownloadStatRepository: downloadStatRepository,
SetupDetailsAuthHeaderPrefix: setupDetailsAuthHeaderPrefix,
RegistryBlobStore: registryBlobStore,
RegFinder: regFinder,
PostProcessingReporter: postProcessingReporter,
CargoRegistryHelper: cargoRegistryHelper,
SpaceController: spaceController,
QuarantineArtifactRepository: quarantineArtifactRepository,
QuarantineFinder: quarantineFinder,
SpaceStore: spaceStore,
UntaggedImagesEnabled: untaggedImagesEnabled,
PackageWrapper: packageWrapper,
PublicAccess: publicAccess,
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/list_webhook_execution_test.go | registry/app/api/controller/metadata/list_webhook_execution_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//nolint:lll,revive // revive:disable:unused-parameter
package metadata
import (
"context"
"fmt"
"testing"
"time"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/registry/utils"
gitnesstypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
func TestListWebhookExecutions(t *testing.T) {
tests := []struct {
name string
request api.ListWebhookExecutionsRequestObject
setupMocks func(*mocks.SpaceFinder, *mocks.RegistryRepository, *mocks.WebhooksRepository,
*mocks.WebhooksExecutionRepository, *mocks.Authorizer, *mocks.RegistryMetadataHelper)
validate func(*testing.T, api.ListWebhookExecutionsResponseObject, error)
verifyMocks func(*testing.T, *mocks.SpaceFinder, *mocks.RegistryRepository, *mocks.WebhooksRepository,
*mocks.WebhooksExecutionRepository, *mocks.Authorizer, *mocks.RegistryMetadataHelper)
}{
{
name: "success_case",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(1),
},
},
setupMocks: func(mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &gitnesstypes.SpaceCore{ID: 2}
var permissionChecks []gitnesstypes.PermissionCheck
// session := &auth.Session{}
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockMetadataHelper.On(
"GetPermissionChecks",
space,
regInfo.RegistryIdentifier,
enum.PermissionRegistryView,
).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "reg").Return(&types.Registry{ID: 3}, nil)
mockWebhooksRepo.On(
"GetByRegistryAndIdentifier",
mock.Anything,
int64(3),
"webhook",
).Return(&gitnesstypes.WebhookCore{ID: 4}, nil)
mockWebhooksExecRepo.On(
"ListForWebhook",
mock.Anything,
int64(4),
10, 1, 10,
).Return([]*gitnesstypes.WebhookExecutionCore{
{
ID: 1,
Created: time.Now().Unix(),
Duration: 100,
Error: "none",
Request: gitnesstypes.WebhookExecutionRequest{Body: "{}", Headers: "headers", URL: "http://example.com"},
Response: gitnesstypes.WebhookExecutionResponse{
Body: "{}",
Headers: "headers",
Status: "200 OK",
StatusCode: 200,
},
RetriggerOf: nil,
Retriggerable: true,
WebhookID: 4,
Result: enum.WebhookExecutionResultSuccess,
TriggerType: enum.WebhookTriggerArtifactCreated,
},
}, nil)
mockWebhooksExecRepo.On("CountForWebhook", mock.Anything, int64(4)).Return(int64(1), nil)
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions200JSONResponse)
assert.True(t, ok, "expected 200 response")
assert.Equal(t, api.StatusSUCCESS, resp.Status)
assert.Len(t, resp.Data.Executions, 1)
exec := resp.Data.Executions[0]
assert.Equal(t, int64(1), *exec.Id)
assert.Equal(t, "none", *exec.Error)
assert.Equal(t, "{}", *exec.Request.Body)
assert.Equal(t, "headers", *exec.Request.Headers)
assert.Equal(t, "http://example.com", *exec.Request.Url)
assert.Equal(t, "{}", *exec.Response.Body)
assert.Equal(t, "headers", *exec.Response.Headers)
assert.Equal(t, "200 OK", *exec.Response.Status)
assert.Equal(t, 200, *exec.Response.StatusCode)
assert.Equal(t, api.WebhookExecResultSUCCESS, *exec.Result)
assert.Equal(t, api.TriggerARTIFACTCREATION, *exec.TriggerType)
assert.Equal(t, int64(1), *resp.Data.ItemCount)
assert.Equal(t, 1, *resp.Data.PageSize)
assert.Equal(t, int64(1), *resp.Data.PageIndex)
assert.Equal(t, int64(1), *resp.Data.PageCount)
},
verifyMocks: func(t *testing.T, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
mockRegistryRepo.AssertExpectations(t)
mockWebhooksRepo.AssertExpectations(t)
mockWebhooksExecRepo.AssertExpectations(t)
},
},
{
name: "get_registry_request_base_info_error",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(11),
},
},
setupMocks: func(_ *mocks.SpaceFinder, _ *mocks.RegistryRepository,
_ *mocks.WebhooksRepository, _ *mocks.WebhooksExecutionRepository,
_ *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(nil, fmt.Errorf("error"))
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions500JSONResponse)
assert.True(t, ok, "expected 500 response")
assert.Equal(t, "error", resp.Message)
},
verifyMocks: func(t *testing.T, _ *mocks.SpaceFinder, _ *mocks.RegistryRepository,
_ *mocks.WebhooksRepository, _ *mocks.WebhooksExecutionRepository,
_ *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
// Other mocks should not have any expectations
},
},
{
name: "find_by_ref_error",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(11),
},
},
setupMocks: func(mockSpaceFinder *mocks.SpaceFinder, _ *mocks.RegistryRepository,
_ *mocks.WebhooksRepository, _ *mocks.WebhooksExecutionRepository,
_ *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(nil, fmt.Errorf("error"))
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions500JSONResponse)
assert.True(t, ok, "expected 500 response")
assert.Equal(t, "error", resp.Message)
},
verifyMocks: func(t *testing.T, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
// Other mocks should not have any expectations
mockAuthorizer.AssertNotCalled(t, mock.Anything)
mockRegistryRepo.AssertNotCalled(t, mock.Anything)
mockWebhooksRepo.AssertNotCalled(t, mock.Anything)
mockWebhooksExecRepo.AssertNotCalled(t, mock.Anything)
},
},
{
name: "check_permissions_fails",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(11),
},
},
setupMocks: func(mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &gitnesstypes.SpaceCore{ID: 2}
var permissionChecks []gitnesstypes.PermissionCheck
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockMetadataHelper.On(
"GetPermissionChecks",
space,
regInfo.RegistryIdentifier,
enum.PermissionRegistryView,
).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(false, nil)
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions403JSONResponse)
assert.True(t, ok, "expected 403 response")
assert.Equal(t, "forbidden", resp.Message)
},
verifyMocks: func(t *testing.T, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
// Other mocks should not have any expectations
mockRegistryRepo.AssertNotCalled(t, mock.Anything)
mockWebhooksRepo.AssertNotCalled(t, mock.Anything)
mockWebhooksExecRepo.AssertNotCalled(t, mock.Anything)
},
},
{
name: "failed_to_get_registry",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(1),
},
},
setupMocks: func(mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &gitnesstypes.SpaceCore{ID: 2}
var permissionChecks []gitnesstypes.PermissionCheck
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockMetadataHelper.On(
"GetPermissionChecks",
space,
regInfo.RegistryIdentifier,
enum.PermissionRegistryView,
).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "reg").Return(nil, fmt.Errorf("error"))
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions500JSONResponse)
assert.True(t, ok, "expected 500 response")
assert.Equal(t, "failed to find registry: error", resp.Message)
},
verifyMocks: func(t *testing.T, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
mockRegistryRepo.AssertExpectations(t)
// Other mocks should not have any expectations
mockWebhooksRepo.AssertNotCalled(t, mock.Anything)
mockWebhooksExecRepo.AssertNotCalled(t, mock.Anything)
},
},
{
name: "failed_to_get_webhook",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(1),
},
},
setupMocks: func(mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &gitnesstypes.SpaceCore{ID: 2}
var permissionChecks []gitnesstypes.PermissionCheck
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockMetadataHelper.On(
"GetPermissionChecks",
space,
regInfo.RegistryIdentifier,
enum.PermissionRegistryView,
).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "reg").Return(&types.Registry{ID: 3}, nil)
mockWebhooksRepo.On("GetByRegistryAndIdentifier", mock.Anything, int64(3), "webhook").Return(nil, fmt.Errorf("error"))
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions500JSONResponse)
assert.True(t, ok, "expected 500 response")
assert.Equal(t, "failed to find webhook [webhook] : error", resp.Message)
},
verifyMocks: func(t *testing.T, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
mockRegistryRepo.AssertExpectations(t)
mockWebhooksRepo.AssertExpectations(t)
// Other mocks should not have any expectations
mockWebhooksExecRepo.AssertNotCalled(t, mock.Anything)
},
},
{
name: "failed_to_list_webhook_executions",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(1),
},
},
setupMocks: func(mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &gitnesstypes.SpaceCore{ID: 2}
var permissionChecks []gitnesstypes.PermissionCheck
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockMetadataHelper.On(
"GetPermissionChecks",
space,
regInfo.RegistryIdentifier,
enum.PermissionRegistryView,
).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "reg").Return(&types.Registry{ID: 3}, nil)
mockWebhooksRepo.On(
"GetByRegistryAndIdentifier",
mock.Anything,
int64(3),
"webhook",
).Return(&gitnesstypes.WebhookCore{ID: 4}, nil)
mockWebhooksExecRepo.On("ListForWebhook", mock.Anything, int64(4), 10, 1, 10).Return(nil, fmt.Errorf("error"))
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions500JSONResponse)
assert.True(t, ok, "expected 500 response")
assert.Equal(t, "failed to list webhook executions: error", resp.Message)
},
verifyMocks: func(t *testing.T, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
mockRegistryRepo.AssertExpectations(t)
mockWebhooksRepo.AssertExpectations(t)
mockWebhooksExecRepo.AssertExpectations(t)
},
},
{
name: "failed_to_get_webhook_executions_count",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(1),
},
},
setupMocks: func(mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &gitnesstypes.SpaceCore{ID: 2}
var permissionChecks []gitnesstypes.PermissionCheck
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockMetadataHelper.On(
"GetPermissionChecks",
space,
regInfo.RegistryIdentifier,
enum.PermissionRegistryView,
).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "reg").Return(&types.Registry{ID: 3}, nil)
mockWebhooksRepo.On(
"GetByRegistryAndIdentifier",
mock.Anything,
int64(3),
"webhook",
).Return(&gitnesstypes.WebhookCore{ID: 4}, nil)
mockWebhooksExecRepo.On(
"ListForWebhook",
mock.Anything,
int64(4),
10, 1, 10,
).Return([]*gitnesstypes.WebhookExecutionCore{
{
ID: 1,
Created: time.Now().Unix(),
Duration: 100,
Error: "none",
Request: gitnesstypes.WebhookExecutionRequest{Body: "{}", Headers: "headers", URL: "http://example.com"},
Response: gitnesstypes.WebhookExecutionResponse{
Body: "{}",
Headers: "headers",
Status: "200 OK",
StatusCode: 200,
},
RetriggerOf: nil,
Retriggerable: true,
WebhookID: 4,
Result: enum.WebhookExecutionResultSuccess,
TriggerType: enum.WebhookTriggerArtifactCreated,
},
}, nil)
mockWebhooksExecRepo.On("CountForWebhook", mock.Anything, int64(4)).Return(int64(0), fmt.Errorf("error"))
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions500JSONResponse)
assert.True(t, ok, "expected 500 response")
assert.Equal(t, "failed to get webhook executions count: error", resp.Message)
},
verifyMocks: func(t *testing.T, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
mockRegistryRepo.AssertExpectations(t)
mockWebhooksRepo.AssertExpectations(t)
mockWebhooksExecRepo.AssertExpectations(t)
},
},
{
name: "success_case",
request: api.ListWebhookExecutionsRequestObject{
RegistryRef: "reg",
WebhookIdentifier: "webhook",
Params: api.ListWebhookExecutionsParams{
Size: utils.PageSizePtr(10),
Page: utils.PageNumberPtr(1),
},
},
setupMocks: func(mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentRef: "root/parent",
}
space := &gitnesstypes.SpaceCore{ID: 2}
var permissionChecks []gitnesstypes.PermissionCheck
mockMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockMetadataHelper.On(
"GetPermissionChecks",
space,
regInfo.RegistryIdentifier,
enum.PermissionRegistryView,
).Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).Return(true, nil)
mockRegistryRepo.On("GetByParentIDAndName", mock.Anything, int64(2), "reg").Return(&types.Registry{ID: 3}, nil)
mockWebhooksRepo.On(
"GetByRegistryAndIdentifier",
mock.Anything,
int64(3),
"webhook",
).Return(&gitnesstypes.WebhookCore{ID: 4}, nil)
mockWebhooksExecRepo.On(
"ListForWebhook",
mock.Anything,
int64(4),
10, 1, 10,
).Return([]*gitnesstypes.WebhookExecutionCore{
{
ID: 1,
Created: time.Now().Unix(),
Duration: 100,
Error: "none",
Request: gitnesstypes.WebhookExecutionRequest{Body: "{}", Headers: "headers", URL: "http://example.com"},
Response: gitnesstypes.WebhookExecutionResponse{
Body: "{}",
Headers: "headers",
Status: "200 OK",
StatusCode: 200,
},
RetriggerOf: nil,
Retriggerable: true,
WebhookID: 4,
Result: enum.WebhookExecutionResultSuccess,
TriggerType: enum.WebhookTriggerArtifactCreated,
},
}, nil)
mockWebhooksExecRepo.On("CountForWebhook", mock.Anything, int64(4)).Return(int64(1), nil)
},
validate: func(t *testing.T, response api.ListWebhookExecutionsResponseObject, err error) {
assert.NoError(t, err)
assert.NotNil(t, response)
resp, ok := response.(api.ListWebhookExecutions200JSONResponse)
assert.True(t, ok, "expected 200 response")
assert.Equal(t, api.StatusSUCCESS, resp.Status)
assert.Len(t, resp.Data.Executions, 1)
exec := resp.Data.Executions[0]
assert.Equal(t, int64(1), *exec.Id)
assert.Equal(t, "none", *exec.Error)
assert.Equal(t, "{}", *exec.Request.Body)
assert.Equal(t, "headers", *exec.Request.Headers)
assert.Equal(t, "http://example.com", *exec.Request.Url)
assert.Equal(t, "{}", *exec.Response.Body)
assert.Equal(t, "headers", *exec.Response.Headers)
assert.Equal(t, "200 OK", *exec.Response.Status)
assert.Equal(t, 200, *exec.Response.StatusCode)
assert.Equal(t, api.WebhookExecResultSUCCESS, *exec.Result)
assert.Equal(t, api.TriggerARTIFACTCREATION, *exec.TriggerType)
assert.Equal(t, int64(1), *resp.Data.ItemCount)
assert.Equal(t, 1, *resp.Data.PageSize)
assert.Equal(t, int64(1), *resp.Data.PageIndex)
assert.Equal(t, int64(1), *resp.Data.PageCount)
},
verifyMocks: func(t *testing.T, mockSpaceFinder *mocks.SpaceFinder, mockRegistryRepo *mocks.RegistryRepository,
mockWebhooksRepo *mocks.WebhooksRepository, mockWebhooksExecRepo *mocks.WebhooksExecutionRepository,
mockAuthorizer *mocks.Authorizer, mockMetadataHelper *mocks.RegistryMetadataHelper) {
mockMetadataHelper.AssertExpectations(t)
mockSpaceFinder.AssertExpectations(t)
mockAuthorizer.AssertExpectations(t)
mockRegistryRepo.AssertExpectations(t)
mockWebhooksRepo.AssertExpectations(t)
mockWebhooksExecRepo.AssertExpectations(t)
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Create mocks
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepo := new(mocks.RegistryRepository)
mockWebhooksRepo := new(mocks.WebhooksRepository)
mockWebhooksExecRepo := new(mocks.WebhooksExecutionRepository)
mockAuthorizer := new(mocks.Authorizer)
mockMetadataHelper := new(mocks.RegistryMetadataHelper)
// Create controller
controller := &APIController{
SpaceFinder: mockSpaceFinder,
RegistryRepository: mockRegistryRepo,
WebhooksRepository: mockWebhooksRepo,
WebhooksExecutionRepository: mockWebhooksExecRepo,
Authorizer: mockAuthorizer,
RegistryMetadataHelper: mockMetadataHelper,
}
// Setup mocks
tt.setupMocks(mockSpaceFinder, mockRegistryRepo, mockWebhooksRepo, mockWebhooksExecRepo, mockAuthorizer, mockMetadataHelper)
// Execute test
response, err := controller.ListWebhookExecutions(context.Background(), tt.request)
// Validate results
tt.validate(t, response, err)
// Verify mock expectations
tt.verifyMocks(t, mockSpaceFinder, mockRegistryRepo, mockWebhooksRepo, mockWebhooksExecRepo, mockAuthorizer, mockMetadataHelper)
})
}
}
func TestMapToWebhookExecutionResponseEntity_Table(t *testing.T) {
tests := []struct {
name string
input gitnesstypes.WebhookExecutionCore
expected *api.WebhookExecution
}{
{
name: "success_case",
input: gitnesstypes.WebhookExecutionCore{
Created: 1234567890,
Duration: 100,
ID: 1,
Error: "none",
Request: gitnesstypes.WebhookExecutionRequest{Body: "{}", Headers: "headers", URL: "http://example.com"},
Response: gitnesstypes.WebhookExecutionResponse{Body: "{}", Headers: "headers", Status: "200 OK", StatusCode: 200},
RetriggerOf: nil,
Retriggerable: true,
WebhookID: 4,
Result: enum.WebhookExecutionResultSuccess,
TriggerType: enum.WebhookTriggerArtifactCreated,
},
expected: &api.WebhookExecution{
Created: utils.Int64Ptr(1234567890),
Duration: utils.Int64Ptr(100),
Id: utils.Int64Ptr(1),
Error: utils.StringPtr("none"),
Request: &api.WebhookExecRequest{
Body: utils.StringPtr("{}"),
Headers: utils.StringPtr("headers"),
Url: utils.StringPtr("http://example.com"),
},
Response: &api.WebhookExecResponse{
Body: utils.StringPtr("{}"),
Headers: utils.StringPtr("headers"),
Status: utils.StringPtr("200 OK"),
StatusCode: utils.IntPtr(200),
},
RetriggerOf: nil,
Retriggerable: utils.BoolPtr(true),
WebhookId: utils.Int64Ptr(4),
Result: utils.WebhookExecResultPtr(api.WebhookExecResultSUCCESS),
TriggerType: utils.WebhookTriggerPtr(api.TriggerARTIFACTCREATION),
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result, err := createTestWebhookExecution(tt.input)
assert.NoError(t, err)
assert.Equal(t, tt.expected, result)
})
}
}
// Helper functions for testing.
//
//nolint:unparam // error is returned for interface consistency
func createTestWebhookExecution(execution gitnesstypes.WebhookExecutionCore) (*api.WebhookExecution, error) {
result := api.WebhookExecResultSUCCESS
triggerType := api.TriggerARTIFACTCREATION
return &api.WebhookExecution{
Created: utils.Int64Ptr(execution.Created),
Duration: utils.Int64Ptr(execution.Duration),
Id: utils.Int64Ptr(execution.ID),
Error: utils.StringPtr(execution.Error),
Request: &api.WebhookExecRequest{
Body: utils.StringPtr(execution.Request.Body),
Headers: utils.StringPtr(execution.Request.Headers),
Url: utils.StringPtr(execution.Request.URL),
},
Response: &api.WebhookExecResponse{
Body: utils.StringPtr(execution.Response.Body),
Headers: utils.StringPtr(execution.Response.Headers),
Status: utils.StringPtr(execution.Response.Status),
StatusCode: utils.IntPtr(execution.Response.StatusCode),
},
RetriggerOf: execution.RetriggerOf,
Retriggerable: utils.BoolPtr(execution.Retriggerable),
WebhookId: utils.Int64Ptr(execution.WebhookID),
Result: &result,
TriggerType: &triggerType,
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/create_quarantine_file_path.go | registry/app/api/controller/metadata/create_quarantine_file_path.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"net/http"
"path"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/api/utils"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
func (c *APIController) QuarantineFilePath(
ctx context.Context,
r artifact.QuarantineFilePathRequestObject,
) (artifact.QuarantineFilePathResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.QuarantineFilePath400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.QuarantineFilePath400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryEdit)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return artifact.QuarantineFilePath401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return artifact.QuarantineFilePath403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
artifactName := r.Body.Artifact
version := r.Body.Version
filePath := ""
if r.Body.FilePath != nil {
filePath = *r.Body.FilePath
}
reason := r.Body.Reason
var artifactType *artifact.ArtifactType
if r.Body.ArtifactType != nil {
at := artifact.ArtifactType(*r.Body.ArtifactType)
artifactType = &at
}
img, err := c.ImageStore.GetByNameAndType(ctx, regInfo.RegistryID, artifactName, artifactType)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.QuarantineFilePath400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusNotFound, "image not found"),
),
}, nil
}
return artifact.QuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var versionID int64
var rootPath string
if version != nil { //nolint:nestif
if regInfo.PackageType == artifact.PackageTypeDOCKER || regInfo.PackageType == artifact.PackageTypeHELM {
parsedDigest, err := digest.Parse(*version)
if err != nil {
log.Ctx(ctx).Err(err).Msg("failed to parse digest for create quarantine file path")
return artifact.QuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
typesDigest, err := types.NewDigest(parsedDigest)
if err != nil {
log.Ctx(ctx).Err(err).Msg("failed to create types digest for create quarantine file path")
return artifact.QuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
digestVal := typesDigest.String()
version = &digestVal
}
art, err := c.ArtifactStore.GetByName(ctx, img.ID, *version)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.QuarantineFilePath400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusNotFound, "version not found"),
),
}, nil
}
}
if err != nil {
return artifact.QuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
versionID = art.ID
}
var nodeID *string
if filePath != "" {
if version == nil {
return artifact.QuarantineFilePath400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "version not provided"),
),
}, nil
}
rootPath, err = utils.GetFilePath(regInfo.PackageType, artifactName, *version)
if err != nil {
return artifact.QuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
filePath = path.Join(rootPath, filePath)
node, err := c.fileManager.GetNode(ctx, regInfo.RegistryID, filePath)
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.QuarantineFilePath400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusNotFound, "file not found"),
),
}, nil
}
if err != nil {
return artifact.QuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
nodeID = &node.ID
}
quarantineArtifact := &types.QuarantineArtifact{
NodeID: nodeID,
Reason: reason,
RegistryID: regInfo.RegistryID,
ArtifactID: versionID,
ImageID: img.ID,
}
err = c.QuarantineArtifactRepository.Create(ctx, quarantineArtifact)
if err != nil {
return artifact.QuarantineFilePath500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
// Evict cache after creating quarantine entry
if version != nil {
c.QuarantineFinder.EvictCache(ctx, regInfo.RegistryID, artifactName, *version, artifactType)
}
return artifact.QuarantineFilePath200JSONResponse{
QuarantinePathResponseJSONResponse: *GetQuarantinePathJSONResponse(
quarantineArtifact.ID, regInfo.RegistryID,
img.ID, versionID, quarantineArtifact.Reason, filePath),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_registries.go | registry/app/api/controller/metadata/get_registries.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"net/http"
"path"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/url"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/pkg/commons"
"github.com/harness/gitness/registry/app/store"
"github.com/harness/gitness/types/enum"
"github.com/gotidy/ptr"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetAllRegistries(
ctx context.Context,
r artifact.GetAllRegistriesRequestObject,
) (artifact.GetAllRegistriesResponseObject, error) {
registryRequestParams := &RegistryRequestParams{
packageTypesParam: r.Params.PackageType,
page: r.Params.Page,
size: r.Params.Size,
search: r.Params.SearchTerm,
Resource: RepositoryResource,
ParentRef: string(r.SpaceRef),
RegRef: "",
labelsParam: nil,
sortOrder: r.Params.SortOrder,
sortField: r.Params.SortField,
registryIDsParam: nil,
recursive: r.Params.Recursive,
scope: r.Params.Scope,
}
regInfo, err := c.GetRegistryRequestInfo(ctx, *registryRequestParams)
if err != nil {
return artifact.GetAllRegistries400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetAllRegistries400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
if err = apiauth.CheckSpaceScope(
ctx,
c.Authorizer,
session,
space,
enum.ResourceTypeRegistry,
enum.PermissionRegistryView,
); err != nil {
return artifact.GetAllRegistries403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
var repos *[]store.RegistryMetadata
repoType := ""
if r.Params.Type != nil {
repoType = string(*r.Params.Type)
}
// Validate pagination parameters
if regInfo.limit < 0 || regInfo.offset < 0 {
return artifact.GetAllRegistries400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "page and size must be non-negative"),
),
}, nil
}
ok := c.PackageWrapper.IsValidPackageTypes(regInfo.packageTypes)
if !ok {
return artifact.GetAllRegistries400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "invalid package type"),
),
}, nil
}
e := ValidateScope(regInfo.scope)
if e != nil {
return artifact.GetAllRegistries400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, e.Error()),
),
}, nil
}
ok = c.PackageWrapper.IsValidRepoType(repoType)
if !ok {
return artifact.GetAllRegistries400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "invalid repository type"),
),
}, nil
}
parentIDs := []int64{regInfo.ParentID}
if regInfo.recursive || regInfo.scope == string(artifact.Ancestors) {
parentIDs, err = c.SpaceStore.GetAncestorIDs(ctx, regInfo.ParentID)
if err != nil {
return artifact.GetAllRegistries500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
}
if regInfo.scope == string(artifact.Descendants) {
parentIDs, err = c.SpaceStore.GetDescendantsIDs(ctx, regInfo.ParentID)
if err != nil {
return artifact.GetAllRegistries500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
}
var count int64
repos, err = c.RegistryRepository.GetAll(
ctx,
parentIDs,
regInfo.packageTypes,
regInfo.sortByField,
regInfo.sortByOrder,
regInfo.limit,
regInfo.offset,
regInfo.searchTerm,
repoType,
)
count, _ = c.RegistryRepository.CountAll(
ctx,
parentIDs,
regInfo.packageTypes,
regInfo.searchTerm,
repoType,
)
if err != nil {
return artifact.GetAllRegistries500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
listRegistriesResponse, err := c.GetAllRegistryResponse(ctx,
repos, count, regInfo.pageNumber,
regInfo.limit, regInfo.RootIdentifier, c.URLProvider,
)
if err != nil {
return artifact.GetAllRegistries500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.GetAllRegistries200JSONResponse{
ListRegistryResponseJSONResponse: *listRegistriesResponse,
}, nil
}
func (c *APIController) GetAllRegistryResponse(
ctx context.Context,
repos *[]store.RegistryMetadata,
count int64,
pageNumber int64,
pageSize int,
rootIdentifier string,
urlProvider url.Provider,
) (*artifact.ListRegistryResponseJSONResponse, error) {
repoMetadataList, err := c.GetRegistryMetadata(ctx, repos, rootIdentifier, urlProvider)
if err != nil {
return nil, err
}
pageCount := GetPageCount(count, pageSize)
listRepository := &artifact.ListRegistry{
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &pageNumber,
PageSize: &pageSize,
Registries: repoMetadataList,
}
response := &artifact.ListRegistryResponseJSONResponse{
Data: *listRepository,
Status: artifact.StatusSUCCESS,
}
return response, nil
}
func (c *APIController) GetRegistryMetadata(
ctx context.Context,
registryMetadatas *[]store.RegistryMetadata,
rootIdentifier string,
urlProvider url.Provider,
) ([]artifact.RegistryMetadata, error) {
repoMetadataList := []artifact.RegistryMetadata{}
for _, reg := range *registryMetadatas {
modifiedAt := GetTimeInMs(reg.LastModified)
var labels *[]string
if !commons.IsEmpty(reg.Labels) {
temp := []string(reg.Labels)
labels = &temp
}
var description string
if !commons.IsEmpty(reg.Description) {
description = reg.Description
}
var artifactCount *int64
if reg.ArtifactCount != 0 {
artifactCount = ptr.Int64(reg.ArtifactCount)
}
var downloadCount *int64
if reg.DownloadCount != 0 {
downloadCount = ptr.Int64(reg.DownloadCount)
}
regURL := urlProvider.RegistryURL(ctx, rootIdentifier, reg.RegIdentifier)
if reg.PackageType == artifact.PackageTypeGENERIC {
regURL = urlProvider.RegistryURL(ctx, rootIdentifier, "generic", reg.RegIdentifier)
}
path := c.GetRegistryPath(ctx, reg.ParentID, reg.RegIdentifier)
// fix: refactor it
size := GetSize(reg.Size)
isPublic, err := c.PublicAccess.Get(ctx, enum.PublicResourceTypeRegistry, path)
if err != nil {
log.Ctx(ctx).Error().Msgf("error in fetching public access for registry %s: %v", path, err)
}
repoMetadata := artifact.RegistryMetadata{
Uuid: reg.RegUUID,
Identifier: reg.RegIdentifier,
Description: &description,
PackageType: reg.PackageType,
Type: reg.Type,
LastModified: &modifiedAt,
Url: regURL,
ArtifactsCount: artifactCount,
DownloadsCount: downloadCount,
RegistrySize: &size,
Labels: labels,
Path: &path,
IsPublic: isPublic,
}
repoMetadataList = append(repoMetadataList, repoMetadata)
}
return repoMetadataList, nil
}
func (c *APIController) GetRegistryPath(ctx context.Context, parentID int64, regIdentifier string) string {
if parentID != 0 {
space, err := c.SpaceFinder.FindByID(ctx, parentID)
if err != nil {
log.Ctx(ctx).Error().Msgf("Failed to find space by id %d: %s", parentID, err.Error())
return ""
}
if space != nil {
return path.Join(space.Path, regIdentifier)
}
}
return ""
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifact_files.go | registry/app/api/controller/metadata/get_artifact_files.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/api/utils"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetArtifactFiles(
ctx context.Context,
r artifact.GetArtifactFilesRequestObject,
) (artifact.GetArtifactFilesResponseObject, error) {
reqInfo, err := c.GetArtifactFilesRequestInfo(ctx, r)
if err != nil {
return artifact.GetArtifactFiles400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, reqInfo.ParentRef)
if err != nil {
return artifact.GetArtifactFiles400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
reqInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
if errors.Is(err, apiauth.ErrUnauthorized) {
return artifact.GetArtifactFiles401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, err.Error()),
),
}, nil
}
return artifact.GetArtifactFiles403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
image := string(r.Artifact)
version := string(r.Version)
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, reqInfo.ParentID, reqInfo.RegistryIdentifier)
if err != nil {
return artifact.GetArtifactFiles500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var artifactType *artifact.ArtifactType
if r.Params.ArtifactType != nil {
artifactType, err = ValidateAndGetArtifactType(registry.PackageType, string(*r.Params.ArtifactType))
if err != nil {
return artifact.GetArtifactFiles400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
}
img, err := c.ImageStore.GetByNameAndType(ctx, reqInfo.RegistryID, image, artifactType)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetArtifactFiles404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "Artifact not found"),
),
}, nil
}
return artifact.GetArtifactFiles500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
art, err := c.ArtifactStore.GetByName(ctx, img.ID, version)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetArtifactFiles404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "Artifact version not found"),
),
}, nil
}
return artifact.GetArtifactFiles500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var registryURL string
switch registry.PackageType { //nolint:exhaustive
case artifact.PackageTypeGENERIC:
registryURL = c.URLProvider.PackageURL(ctx, reqInfo.RootIdentifier+"/"+reqInfo.RegistryIdentifier, "files")
case artifact.PackageTypePYTHON:
registryURL = c.URLProvider.PackageURL(ctx, reqInfo.RootIdentifier+"/"+reqInfo.RegistryIdentifier, "python")
case artifact.PackageTypeNPM:
registryURL = c.URLProvider.PackageURL(ctx, reqInfo.RootIdentifier+"/"+reqInfo.RegistryIdentifier, "npm")
case artifact.PackageTypeRPM:
registryURL = c.URLProvider.PackageURL(ctx, reqInfo.RootIdentifier+"/"+reqInfo.RegistryIdentifier, "rpm")
case artifact.PackageTypeGO:
registryURL = c.URLProvider.PackageURL(ctx, reqInfo.RootIdentifier+"/"+reqInfo.RegistryIdentifier, "go")
case artifact.PackageTypeHUGGINGFACE:
registryURL = c.URLProvider.PackageURL(ctx, reqInfo.RootIdentifier+"/"+reqInfo.RegistryIdentifier,
"huggingface")
case artifact.PackageTypeMAVEN:
registryURL = c.URLProvider.PackageURL(ctx, reqInfo.RootIdentifier+"/"+reqInfo.RegistryIdentifier,
"maven")
default:
registryURL, err = c.PackageWrapper.GetPackageURL(ctx, reqInfo.RootIdentifier, reqInfo.RegistryIdentifier,
string(registry.PackageType))
if registryURL == "" || err != nil {
registryURL = c.URLProvider.RegistryURL(ctx,
reqInfo.RootIdentifier, strings.ToLower(string(registry.PackageType)), reqInfo.RegistryIdentifier)
}
}
var filePathPrefix string
var err2 error
switch registry.PackageType { //nolint:exhaustive
case artifact.PackageTypeHUGGINGFACE:
filePathPrefix, err2 = utils.GetFilePathWithArtifactType(registry.PackageType,
img.Name, art.Version, artifactType)
default:
filePathPrefix, err = c.PackageWrapper.GetFilePath(string(registry.PackageType), img.Name, art.Version)
if filePathPrefix == "" || err != nil {
filePathPrefix, err2 = utils.GetFilePath(registry.PackageType, img.Name, art.Version)
}
}
if err2 != nil {
return failedToFetchFilesResponse(ctx, err2, art)
}
filePathPattern := filePathPrefix + "/%"
fileMetadataList, err := c.fileManager.GetFilesMetadata(ctx, filePathPattern, img.RegistryID,
reqInfo.sortByField, reqInfo.sortByOrder, reqInfo.limit, reqInfo.offset, reqInfo.searchTerm)
if err != nil {
return failedToFetchFilesResponse(ctx, err, art)
}
count, err := c.fileManager.CountFilesByPath(ctx, filePathPattern, img.RegistryID)
if err != nil {
log.Ctx(ctx).Error().Msgf("Failed to count files for artifact, err: %v", err.Error())
return artifact.GetArtifactFiles500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError,
fmt.Sprintf("Failed to count files for artifact with name: [%s]", art.Version)),
),
}, nil
}
//nolint:exhaustive
switch registry.PackageType {
case artifact.PackageTypeGENERIC, artifact.PackageTypeMAVEN, artifact.PackageTypePYTHON,
artifact.PackageTypeNPM, artifact.PackageTypeRPM, artifact.PackageTypeNUGET,
artifact.PackageTypeGO, artifact.PackageTypeHUGGINGFACE:
return artifact.GetArtifactFiles200JSONResponse{
FileDetailResponseJSONResponse: *GetAllArtifactFilesResponse(ctx, fileMetadataList, count, reqInfo.pageNumber,
reqInfo.limit, registryURL, img.Name, art.Version, registry.PackageType,
c.SetupDetailsAuthHeaderPrefix, artifactType, auth.IsAnonymousSession(session),
reqInfo.RootIdentifier, reqInfo.RegistryIdentifier, c.PackageWrapper),
}, nil
default:
isValidPackageType := c.PackageWrapper.IsValidPackageType(string(registry.PackageType))
if !isValidPackageType {
return artifact.GetArtifactFiles400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, "Invalid package type"),
),
}, nil
}
return artifact.GetArtifactFiles200JSONResponse{
FileDetailResponseJSONResponse: *GetAllArtifactFilesResponse(ctx, fileMetadataList, count, reqInfo.pageNumber,
reqInfo.limit, registryURL, img.Name, art.Version, registry.PackageType,
c.SetupDetailsAuthHeaderPrefix, artifactType, auth.IsAnonymousSession(session),
reqInfo.RootIdentifier, reqInfo.RegistryIdentifier, c.PackageWrapper),
}, nil
}
}
func failedToFetchFilesResponse(
ctx context.Context,
err error,
art *types.Artifact,
) (artifact.GetArtifactFilesResponseObject, error) {
log.Ctx(ctx).Error().Msgf("Failed to fetch files for artifact, err: %v", err.Error())
return artifact.GetArtifactFiles500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError,
fmt.Sprintf("Failed to fetch files for artifact with name: [%s]", art.Version)),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/delete_artifacts_version.go | registry/app/api/controller/metadata/delete_artifacts_version.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/app/api/utils"
"github.com/harness/gitness/registry/app/manifest/manifestlist"
"github.com/harness/gitness/registry/services/webhook"
registryTypes "github.com/harness/gitness/registry/types"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
v1 "github.com/opencontainers/image-spec/specs-go/v1"
"github.com/rs/zerolog/log"
)
func (c *APIController) DeleteArtifactVersion(ctx context.Context, r artifact.DeleteArtifactVersionRequestObject) (
artifact.DeleteArtifactVersionResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.DeleteArtifactVersion400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, err
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.DeleteArtifactVersion400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, err
}
session, _ := request.AuthSessionFrom(ctx)
if err = apiauth.CheckSpaceScope(
ctx,
c.Authorizer,
session,
space,
enum.ResourceTypeRegistry,
enum.PermissionArtifactsDelete,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return artifact.DeleteArtifactVersion401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return artifact.DeleteArtifactVersion403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
repoEntity, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
//nolint:nilerr
return artifact.DeleteArtifactVersion404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "registry doesn't exist with this key"),
),
}, nil
}
artifactName := string(r.Artifact)
versionName := string(r.Version)
registryName := repoEntity.Name
imageInfo, err := c.ImageStore.GetByName(ctx, regInfo.RegistryID, artifactName)
if err != nil {
//nolint:nilerr
return artifact.DeleteArtifactVersion404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "image doesn't exist with this key"),
),
}, nil
}
//nolint: exhaustive
switch regInfo.PackageType {
case artifact.PackageTypeDOCKER:
err = c.deleteOciVersionWithAudit(ctx, regInfo, registryName, session.Principal, artifactName,
versionName)
case artifact.PackageTypeHELM:
err = c.deleteOciVersionWithAudit(ctx, regInfo, registryName, session.Principal, artifactName,
versionName)
case artifact.PackageTypeNPM:
err = c.deleteVersion(ctx, regInfo, imageInfo, artifactName, versionName)
case artifact.PackageTypeMAVEN:
err = c.deleteVersion(ctx, regInfo, imageInfo, artifactName, versionName)
case artifact.PackageTypePYTHON:
err = c.deleteVersion(ctx, regInfo, imageInfo, artifactName, versionName)
case artifact.PackageTypeGENERIC:
err = c.deleteVersion(ctx, regInfo, imageInfo, artifactName, versionName)
case artifact.PackageTypeNUGET:
err = c.deleteVersion(ctx, regInfo, imageInfo, artifactName, versionName)
case artifact.PackageTypeRPM:
err = c.deleteVersion(ctx, regInfo, imageInfo, artifactName, versionName)
if err != nil {
break
}
c.PostProcessingReporter.BuildRegistryIndex(ctx, regInfo.RegistryID, make([]registryTypes.SourceRef, 0))
case artifact.PackageTypeGO:
err = c.deleteVersion(ctx, regInfo, imageInfo, artifactName, versionName)
if err != nil {
break
}
c.sendArtifactDeletedWebhookEvent(
ctx, session.Principal.ID, regInfo.RegistryID, regInfo.PackageType,
artifactName, versionName,
)
c.PostProcessingReporter.BuildPackageIndex(ctx, regInfo.RegistryID, artifactName)
default:
err = c.PackageWrapper.DeleteArtifactVersion(ctx, regInfo, imageInfo, artifactName, versionName)
}
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.DeleteArtifactVersion404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(
http.StatusNotFound,
fmt.Sprintf("artifact version '%s' not found for artifact '%s'", versionName, artifactName),
),
),
}, nil
}
return throwDeleteArtifactVersion500Error(err), nil
}
auditErr := c.AuditService.Log(
ctx,
session.Principal,
audit.NewResource(audit.ResourceTypeRegistry, artifactName),
audit.ActionDeleted,
regInfo.ParentRef,
audit.WithData("registry name", registryName),
audit.WithData("artifact name", artifactName),
audit.WithData("version name", versionName),
)
if auditErr != nil {
log.Ctx(ctx).Warn().Msgf("failed to insert audit log for delete artifact operation: %s", auditErr)
}
return artifact.DeleteArtifactVersion200JSONResponse{
SuccessJSONResponse: artifact.SuccessJSONResponse(*GetSuccessResponse()),
}, nil
}
func (c *APIController) deleteOciVersionWithAudit(
ctx context.Context, regInfo *registryTypes.RegistryRequestBaseInfo,
registryName string, principal types.Principal, artifactName string, versionName string,
) error {
var existingDigest digest.Digest
//nolint:nestif
if c.UntaggedImagesEnabled(ctx) {
err := c.tx.WithTx(
ctx, func(ctx context.Context) error {
d := digest.Digest(versionName)
dgst, _ := registryTypes.NewDigest(d)
existingManifest, err := c.ManifestStore.FindManifestByDigest(
ctx, regInfo.RegistryID, artifactName, dgst,
)
if err != nil {
return fmt.Errorf("failed to fing existing manifest for: %s, err: %w", versionName, err)
}
if existingManifest.MediaType == v1.MediaTypeImageIndex ||
existingManifest.MediaType == manifestlist.MediaTypeManifestList {
manifests, err := c.ManifestStore.References(ctx, existingManifest)
if err != nil {
return fmt.Errorf("failed to fing existing manifests referenced by: %s, err: %w",
versionName, err)
}
if len(manifests) > 0 {
return fmt.Errorf("cannot delete manifest: %s, as it references other manifests",
versionName)
}
}
err = c.ManifestStore.Delete(ctx, regInfo.RegistryID, existingManifest.ID)
if err != nil {
return err
}
existingDigest = d
_, err = c.TagStore.DeleteTagByManifestID(ctx, regInfo.RegistryID, existingManifest.ID)
if err != nil {
return fmt.Errorf("failed to delete tags for: %s, err: %w", versionName, err)
}
err = c.ArtifactStore.DeleteByVersionAndImageName(ctx, artifactName, versionName, regInfo.RegistryID)
if err != nil {
return err
}
count, err := c.ManifestStore.CountByImageName(ctx, regInfo.RegistryID, artifactName)
if err != nil {
return err
}
if count < 1 {
err = c.ImageStore.DeleteByImageNameAndRegID(
ctx, regInfo.RegistryID, artifactName,
)
if err != nil {
return err
}
}
return nil
})
if err != nil {
return fmt.Errorf("failed to delete artifact version: %w", err)
}
} else {
existingDigest = c.getTagDigest(ctx, regInfo.RegistryID, artifactName, versionName)
err := c.TagStore.DeleteTag(ctx, regInfo.RegistryID, artifactName, versionName)
if err != nil {
return err
}
}
if existingDigest != "" {
payload := webhook.GetArtifactDeletedPayload(ctx, principal.ID, regInfo.RegistryID,
registryName, versionName, existingDigest.String(), regInfo.RootIdentifier,
regInfo.PackageType, artifactName, c.URLProvider, c.UntaggedImagesEnabled(ctx))
c.ArtifactEventReporter.ArtifactDeleted(ctx, &payload)
}
return nil
}
func (c *APIController) deleteVersion(
ctx context.Context,
regInfo *registryTypes.RegistryRequestBaseInfo,
imageInfo *registryTypes.Image,
artifactName string,
versionName string,
) error {
_, err := c.ArtifactStore.GetByName(ctx, imageInfo.ID, versionName)
if err != nil {
return fmt.Errorf("version doesn't exist with for image %v: %w", imageInfo.Name, err)
}
// get the file path based on package type
filePath, err := utils.GetFilePath(regInfo.PackageType, artifactName, versionName)
if err != nil {
return fmt.Errorf("failed to get file path: %w", err)
}
err = c.tx.WithTx(
ctx,
func(ctx context.Context) error {
// delete nodes from nodes store
err = c.fileManager.DeleteNode(ctx, regInfo.RegistryID, filePath)
if err != nil {
return err
}
// delete artifacts from artifacts store
err = c.ArtifactStore.DeleteByVersionAndImageName(ctx, artifactName, versionName, regInfo.RegistryID)
if err != nil {
return fmt.Errorf("failed to delete version: %w", err)
}
// delete image if no other artifacts linked
err = c.ImageStore.DeleteByImageNameIfNoLinkedArtifacts(ctx, regInfo.RegistryID, artifactName)
if err != nil {
return fmt.Errorf("failed to delete image: %w", err)
}
return nil
},
)
if err != nil {
return err
}
return nil
}
func (c *APIController) sendArtifactDeletedWebhookEvent(
ctx context.Context, principalID int64,
registryID int64, packageType artifact.PackageType,
artifact string, version string,
) {
payload := webhook.GetArtifactDeletedPayloadForCommonArtifacts(
principalID,
registryID,
packageType,
artifact,
version,
)
c.ArtifactEventReporter.ArtifactDeleted(ctx, &payload)
}
func throwDeleteArtifactVersion500Error(err error) artifact.DeleteArtifactVersion500JSONResponse {
return artifact.DeleteArtifactVersion500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}
}
func (c *APIController) getTagDigest(
ctx context.Context,
registryID int64,
imageName string,
tag string,
) digest.Digest {
existingTag, findTagErr := c.TagStore.FindTag(ctx, registryID, imageName, tag)
if findTagErr == nil && existingTag != nil {
existingTaggedManifest, getManifestErr := c.ManifestStore.Get(ctx, existingTag.ManifestID)
if getManifestErr == nil {
return existingTaggedManifest.Digest
}
}
return ""
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/delete_webhook.go | registry/app/api/controller/metadata/delete_webhook.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) DeleteWebhook(
ctx context.Context,
r api.DeleteWebhookRequestObject,
) (api.DeleteWebhookResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return deleteWebhookInternalErrorResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return deleteWebhookInternalErrorResponse(err)
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryEdit)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
return api.DeleteWebhook401JSONResponse{
UnauthenticatedJSONResponse: api.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
return api.DeleteWebhook403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
webhookIdentifier := string(r.WebhookIdentifier)
existingWebhook, err := c.WebhooksRepository.GetByRegistryAndIdentifier(ctx, regInfo.RegistryID, webhookIdentifier)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return api.DeleteWebhook404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, fmt.Sprintf("webhook '%s' not found", webhookIdentifier)),
),
}, nil
}
log.Ctx(ctx).Error().Msgf("failed to get existing webhook: %s with error: %v",
webhookIdentifier, err)
return deleteWebhookInternalErrorResponse(fmt.Errorf("failed to get existing webhook"))
}
if existingWebhook.Type == enum.WebhookTypeInternal {
return deleteWebhookBadRequestErrorResponse(fmt.Errorf("cannot delete internal webhook: %s", webhookIdentifier))
}
err = c.WebhooksRepository.DeleteByRegistryAndIdentifier(ctx, regInfo.RegistryID, webhookIdentifier)
if err != nil {
return deleteWebhookInternalErrorResponse(err)
}
return api.DeleteWebhook200JSONResponse{
SuccessJSONResponse: api.SuccessJSONResponse(*GetSuccessResponse()),
}, nil
}
func deleteWebhookInternalErrorResponse(err error) (api.DeleteWebhookResponseObject, error) {
return api.DeleteWebhook500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
func deleteWebhookBadRequestErrorResponse(err error) (api.DeleteWebhookResponseObject, error) {
return api.DeleteWebhook400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_docker_manifests.go | registry/app/api/controller/metadata/get_artifacts_docker_manifests.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"database/sql"
"errors"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
ml "github.com/harness/gitness/registry/app/manifest/manifestlist"
"github.com/harness/gitness/registry/app/manifest/ocischema"
"github.com/harness/gitness/registry/app/manifest/schema2"
"github.com/harness/gitness/registry/app/pkg/docker"
"github.com/harness/gitness/registry/types"
store2 "github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetDockerArtifactManifests(
ctx context.Context,
r artifact.GetDockerArtifactManifestsRequestObject,
) (artifact.GetDockerArtifactManifestsResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.GetDockerArtifactManifests400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
var byTag bool
if r.Params.VersionType != nil && *r.Params.VersionType == artifact.GetDockerArtifactManifestsParamsVersionTypeTAG {
byTag = true
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetDockerArtifactManifests400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetDockerArtifactManifests403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
image := string(r.Artifact)
version := string(r.Version)
manifestDetailsList, err := c.ProcessManifest(ctx, regInfo, image, version, byTag)
if err != nil {
return artifactManifestsErrorRs(err), nil
}
return artifact.GetDockerArtifactManifests200JSONResponse{
DockerManifestsResponseJSONResponse: artifact.DockerManifestsResponseJSONResponse{
Data: artifact.DockerManifests{
ImageName: image,
Version: version,
Manifests: &manifestDetailsList,
},
Status: artifact.StatusSUCCESS,
},
}, nil
}
func (c *APIController) getManifestList(
ctx context.Context, reqManifest *ml.DeserializedManifestList,
registry *types.Registry, image string, regInfo *types.RegistryRequestBaseInfo,
) (
[]artifact.DockerManifestDetails, error) {
manifestDetailsList := []artifact.DockerManifestDetails{}
for _, manifestEntry := range reqManifest.Manifests {
dgst, err := types.NewDigest(manifestEntry.Digest)
if err != nil {
return nil, err
}
referencedManifest, err := c.ManifestStore.FindManifestByDigest(ctx, registry.ID, image, dgst)
if err != nil {
if errors.Is(err, store2.ErrResourceNotFound) {
if registry.Type == artifact.RegistryTypeUPSTREAM {
continue
}
return nil, fmt.Errorf("manifest: %s not found", dgst.String())
}
return nil, err
}
mConfig, err := getManifestConfig(
ctx, referencedManifest.Configuration.Digest,
regInfo.RootIdentifier, c.StorageDriver,
)
if err != nil {
return nil, err
}
md, err := c.getManifestDetails(ctx, referencedManifest, mConfig)
if err != nil {
return nil, err
}
manifestDetailsList = append(manifestDetailsList, md)
}
return manifestDetailsList, nil
}
func artifactManifestsErrorRs(err error) artifact.GetDockerArtifactManifestsResponseObject {
return artifact.GetDockerArtifactManifests500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}
}
func (c *APIController) getManifestDetails(
ctx context.Context,
m *types.Manifest, mConfig *manifestConfig,
) (artifact.DockerManifestDetails, error) {
createdAt := GetTimeInMs(m.CreatedAt)
size := GetSize(m.TotalSize)
dgst, _ := types.NewDigest(m.Digest)
image, err := c.ImageStore.GetByName(ctx, m.RegistryID, m.ImageName)
if err != nil {
return artifact.DockerManifestDetails{}, err
}
manifestDetails := artifact.DockerManifestDetails{
Digest: m.Digest.String(),
CreatedAt: &createdAt,
Size: &size,
}
downloadCountMap, err := c.DownloadStatRepository.GetTotalDownloadsForManifests(ctx, []string{string(dgst)}, image.ID)
if err == nil && len(downloadCountMap) > 0 {
downloadCount := downloadCountMap[string(dgst)]
manifestDetails.DownloadsCount = &downloadCount
}
if mConfig != nil {
manifestDetails.OsArch = fmt.Sprintf("%s/%s", mConfig.Os, mConfig.Arch)
}
quarantinedArtifacts, err := c.QuarantineArtifactRepository.GetByFilePath(ctx, "",
m.RegistryID, image.Name, dgst.String(), nil)
if err != nil {
return artifact.DockerManifestDetails{}, err
}
if len(quarantinedArtifacts) > 0 {
isQuarantined := true
manifestDetails.IsQuarantined = &isQuarantined
manifestDetails.QuarantineReason = &quarantinedArtifacts[0].Reason
} else {
isQuarantined := false
manifestDetails.IsQuarantined = &isQuarantined
}
return manifestDetails, nil
}
// ProcessManifest processes a Docker artifact manifest by retrieving the manifest details from the database,
// converting it to the appropriate format, and extracting the necessary information based on the manifest type.
// It handles different types of manifests, including schema2, OCI schema, and manifest lists, and returns a list
// of Docker manifest details.
func (c *APIController) ProcessManifest(
ctx context.Context,
regInfo *types.RegistryRequestBaseInfo,
image, version string, byTag bool,
) ([]artifact.DockerManifestDetails, error) {
registry, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return nil, err
}
var m *types.Manifest
//nolint:nestif
if c.UntaggedImagesEnabled(ctx) && !byTag {
dgst, err := types.NewDigest(digest.Digest(version))
if err != nil {
return nil, err
}
m, err = c.ManifestStore.FindManifestByDigest(ctx, registry.ID, image, dgst)
if err != nil {
return nil, err
}
} else {
t, err := c.TagStore.FindTag(ctx, registry.ID, image, version)
if err != nil && !errors.Is(err, sql.ErrNoRows) {
return nil, err
}
m, err = c.ManifestStore.Get(ctx, t.ManifestID)
if err != nil {
return nil, err
}
}
manifest, err := docker.DBManifestToManifest(m)
if err != nil {
return nil, err
}
manifestDetailsList := []artifact.DockerManifestDetails{}
switch reqManifest := manifest.(type) {
case *schema2.DeserializedManifest:
mConfig, err := getManifestConfig(ctx, reqManifest.Config().Digest, regInfo.RootIdentifier, c.StorageDriver)
if err != nil {
return nil, err
}
md, err := c.getManifestDetails(ctx, m, mConfig)
if err != nil {
return nil, err
}
manifestDetailsList = append(manifestDetailsList, md)
case *ocischema.DeserializedManifest:
mConfig, err := getManifestConfig(ctx, reqManifest.Config().Digest, regInfo.RootIdentifier, c.StorageDriver)
if err != nil {
return nil, err
}
md, err := c.getManifestDetails(ctx, m, mConfig)
if err != nil {
return nil, err
}
manifestDetailsList = append(manifestDetailsList, md)
case *ml.DeserializedManifestList:
manifestDetailsList, err = c.getManifestList(ctx, reqManifest, registry, image, regInfo)
if err != nil {
return nil, err
}
default:
log.Ctx(ctx).Error().Stack().Err(err).Msgf("Unknown manifest type: %T", manifest)
}
return manifestDetailsList, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/delete_registry.go | registry/app/api/controller/metadata/delete_registry.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"net/http"
"strconv"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
registrytypes "github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) DeleteRegistry(
ctx context.Context,
r artifact.DeleteRegistryRequestObject,
) (artifact.DeleteRegistryResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
//nolint:nilerr
return artifact.DeleteRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
//nolint:nilerr
return artifact.DeleteRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryDelete)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
statusCode, message := HandleAuthError(err)
if statusCode == http.StatusUnauthorized {
//nolint:nilerr
return artifact.DeleteRegistry401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, message),
),
}, nil
}
//nolint:nilerr
return artifact.DeleteRegistry403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, message),
),
}, nil
}
repoEntity, err := c.RegistryRepository.GetByParentIDAndName(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
//nolint:nilerr
return artifact.DeleteRegistry404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "registry doesn't exist with this key"),
),
}, nil
}
err = c.checkIfRegistryUsedAsUpstream(
ctx, regInfo, repoEntity.Name, repoEntity.ID,
)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to delete upstream proxies for registry: %s with error: %s",
regInfo.RegistryIdentifier, err)
//nolint:nilerr
return artifact.DeleteRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
err = c.tx.WithTx(
ctx, func(ctx context.Context) error {
err = c.deleteRegistryWithAudit(ctx, regInfo, repoEntity, session.Principal, regInfo.ParentRef)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to delete registry: %s with error: %s",
regInfo.RegistryIdentifier, err)
return fmt.Errorf("failed to delete registry: %w", err)
}
return nil
},
)
if err != nil {
if strings.Contains(err.Error(), "delete query failed") {
msg := "Internal Error"
err = fmt.Errorf("failed to delete registry: %s", msg)
}
//nolint:nilerr
return throwDeleteRegistry500Error(err), nil
}
return artifact.DeleteRegistry200JSONResponse{
SuccessJSONResponse: artifact.SuccessJSONResponse(*GetSuccessResponse()),
}, nil
}
func (c *APIController) checkIfRegistryUsedAsUpstream(
ctx context.Context,
regInfo *registrytypes.RegistryRequestBaseInfo,
registryName string,
registryID int64,
) error {
registryIDs, err := c.RegistryRepository.FetchRegistriesIDByUpstreamProxyID(
ctx, strconv.FormatInt(registryID, 10), regInfo.RootIdentifierID)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to fetch registryIDs: %s", err)
return fmt.Errorf("failed to fetch registryIDs IDs: %w", err)
}
if len(registryIDs) > 0 {
registries, err := c.RegistryRepository.GetByIDIn(ctx, registryIDs)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to fetch registries: %s", err)
return fmt.Errorf("failed to fetch registries: %w", err)
}
var registryScopeMappings []string
for _, registry := range *registries {
name := registry.Name
space, err := c.SpaceFinder.FindByID(ctx, registry.ParentID)
if err != nil {
log.Ctx(ctx).Error().Msgf("failed to fetch space details: %s", err)
continue
}
path := space.Path
registryScopeMappings = append(registryScopeMappings, name+" ("+path+")")
}
return fmt.Errorf(
"upstream Proxy: [%s] is being used inside Registry: [%s]",
registryName, strings.Join(registryScopeMappings, ", "),
)
}
return nil
}
func (c *APIController) deleteRegistryWithAudit(
ctx context.Context, regInfo *registrytypes.RegistryRequestBaseInfo,
registry *registrytypes.Registry, principal types.Principal, parentRef string,
) error {
err := c.PublicAccess.Delete(ctx, enum.PublicResourceTypeRepo, parentRef+"/"+registry.Name)
if err != nil {
return fmt.Errorf("failed to delete public access for repo: %w", err)
}
err = c.RegFinder.Delete(ctx, regInfo.ParentID, regInfo.RegistryIdentifier)
if err != nil {
return err
}
typeRegistry := audit.ResourceTypeRegistry
if registry.Type == artifact.RegistryTypeUPSTREAM {
typeRegistry = audit.ResourceTypeRegistryUpstreamProxy
}
auditErr := c.AuditService.Log(
ctx,
principal,
audit.NewResource(typeRegistry, registry.Name),
audit.ActionDeleted,
parentRef,
audit.WithOldObject(
audit.RegistryObject{
Registry: *registry,
},
),
audit.WithData("registry name", registry.Name),
)
if auditErr != nil {
log.Ctx(ctx).Warn().Msgf("failed to insert audit log for delete registry operation: %s", auditErr)
}
return err
}
func throwDeleteRegistry500Error(err error) artifact.DeleteRegistry500JSONResponse {
return artifact.DeleteRegistry500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/create_webhook_test.go | registry/app/api/controller/metadata/create_webhook_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//nolint:lll,revive // revive:disable:unused-parameter
package metadata_test
import (
"context"
"fmt"
"testing"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
registrytypes "github.com/harness/gitness/registry/types"
"github.com/harness/gitness/registry/utils"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
const (
testWebhookIdentifier = "test-webhook"
testWebhookURL = "http://example.com"
)
func TestCreateWebhook(t *testing.T) {
tests := []struct {
name string
setupMocks func(*metadata.APIController)
request api.CreateWebhookRequestObject
expectedResp any
expectedError error
}{
{
name: "success_case",
setupMocks: func(c *metadata.APIController) {
// Mock registry metadata helper
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockSpaceFinder := new(mocks.SpaceFinder)
mockWebhooksRepository := new(mocks.WebhooksRepository)
mockAuthorizer := new(mocks.Authorizer)
regInfo := ®istrytypes.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
RegistryType: api.RegistryTypeVIRTUAL,
}
space := &coretypes.SpaceCore{
Path: "root/parent",
}
permissionChecks := []coretypes.PermissionCheck{
{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{
Type: enum.ResourceTypeRegistry,
Identifier: "reg",
},
Permission: enum.PermissionRegistryEdit,
},
}
webhook := &coretypes.WebhookCore{
ID: 1,
DisplayName: testWebhookIdentifier,
Identifier: testWebhookIdentifier,
URL: "http://example.com",
Enabled: true,
Insecure: false,
ParentID: regInfo.RegistryID,
Type: enum.WebhookTypeExternal,
}
webhookResponseEntity := &api.Webhook{
Identifier: "test-webhook",
Name: testWebhookIdentifier,
Url: "http://example.com",
Enabled: true,
Insecure: false,
CreatedAt: utils.StringPtr("2023-01-01T00:00:00Z"),
ModifiedAt: utils.StringPtr("2023-01-01T00:00:00Z"),
}
// Set up expectations.
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").Return(regInfo,
nil)
mockRegistryMetadataHelper.On(
"GetPermissionChecks",
mock.Anything,
"reg",
enum.PermissionRegistryEdit,
).Return(permissionChecks)
// Set up authorizer to expect a session with Principal ID 123 for success case
mockSession := &auth.Session{Principal: coretypes.Principal{ID: 123}}
mockAuthorizer.On("CheckAll", mock.Anything, mockSession, permissionChecks[0]).Return(true, nil)
mockRegistryMetadataHelper.On(
"MapToWebhookCore",
mock.Anything,
mock.MatchedBy(func(req api.WebhookRequest) bool {
return req.Identifier == testWebhookIdentifier &&
req.Name == testWebhookIdentifier &&
req.Url == testWebhookURL &&
req.Enabled == true &&
req.Insecure == false
}),
regInfo,
).Return(webhook, nil)
mockWebhooksRepository.On("Create", mock.Anything, webhook).Return(nil)
mockWebhooksRepository.On(
"GetByRegistryAndIdentifier",
mock.Anything,
regInfo.RegistryID,
"test-webhook",
).Return(webhook, nil)
mockRegistryMetadataHelper.On(
"MapToWebhookResponseEntity",
mock.Anything,
webhook,
).Return(webhookResponseEntity, nil)
// Assign mocks to controller
c.SpaceFinder = mockSpaceFinder
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.Authorizer = mockAuthorizer
c.WebhooksRepository = mockWebhooksRepository
},
request: api.CreateWebhookRequestObject{
RegistryRef: "reg",
Body: &api.CreateWebhookJSONRequestBody{
Name: testWebhookIdentifier,
Identifier: testWebhookIdentifier,
Url: "http://example.com",
Enabled: true,
Insecure: false,
},
},
expectedResp: api.CreateWebhook201JSONResponse{
WebhookResponseJSONResponse: api.WebhookResponseJSONResponse{
Data: api.Webhook{
Name: "test-webhook",
Identifier: "test-webhook",
Url: "http://example.com",
Enabled: true,
Insecure: false,
},
Status: api.StatusSUCCESS,
},
},
},
{
name: "reserved_identifier",
setupMocks: func(c *metadata.APIController) {
// 1. Mock registry metadata helper for GetRegistryRequestBaseInfo
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
regInfo := ®istrytypes.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
RegistryType: api.RegistryTypeVIRTUAL,
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").
Return(regInfo, nil)
c.RegistryMetadataHelper = mockRegistryMetadataHelper
// 2. Mock spaceFinder
mockSpaceFinder := new(mocks.SpaceFinder)
space := &coretypes.SpaceCore{
Path: "root/parent",
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
c.SpaceFinder = mockSpaceFinder
// 3. Mock GetPermissionChecks
permissionCheck := coretypes.PermissionCheck{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{
Type: enum.ResourceTypeRegistry,
Identifier: "reg",
},
Permission: enum.PermissionRegistryEdit,
}
mockRegistryMetadataHelper.On("GetPermissionChecks", mock.Anything, "reg", enum.PermissionRegistryEdit).
Return([]coretypes.PermissionCheck{permissionCheck})
// 4. Mock Authorizer
mockAuthorizer := new(mocks.Authorizer)
mockAuthorizer.On("CheckAll", mock.Anything, (*auth.Session)(nil), permissionCheck).Return(true, nil)
c.Authorizer = mockAuthorizer
// 5. Mock MapToWebhookCore
mockRegistryMetadataHelper.On("MapToWebhookCore", mock.Anything,
mock.MatchedBy(func(req api.WebhookRequest) bool {
return req.Identifier == "internal-webhook" &&
req.Name == "internal-webhook" &&
req.Url == testWebhookURL &&
req.Enabled == true &&
req.Insecure == false
}), regInfo).Return(nil, fmt.Errorf("webhook identifier internal-webhook is reserved"))
},
request: api.CreateWebhookRequestObject{
RegistryRef: "reg",
Body: &api.CreateWebhookJSONRequestBody{
Name: "internal-webhook",
Identifier: "internal-webhook",
Url: "http://example.com",
Enabled: true,
Insecure: false,
},
},
expectedResp: api.CreateWebhook400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse{
Code: "400",
Message: "failed to store webhook webhook identifier internal-webhook is reserved",
},
},
},
{
name: "invalid_registry_reference",
setupMocks: func(c *metadata.APIController) {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "invalid-reg").
Return(nil, fmt.Errorf("invalid registry reference"))
c.RegistryMetadataHelper = mockRegistryMetadataHelper
},
request: api.CreateWebhookRequestObject{
RegistryRef: "invalid-reg",
Body: &api.CreateWebhookJSONRequestBody{
Name: "test-webhook",
Identifier: "test-webhook",
Url: "http://example.com",
Enabled: true,
Insecure: false,
},
},
expectedResp: api.CreateWebhook400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse{
Code: "400",
Message: "invalid registry reference",
},
},
},
{
name: "permission_check_fails",
setupMocks: func(c *metadata.APIController) {
// 1. Mock registry metadata helper for GetRegistryRequestBaseInfo
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
regInfo := ®istrytypes.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
RegistryType: api.RegistryTypeVIRTUAL,
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").
Return(regInfo, nil)
// 2. Mock spaceFinder
mockSpaceFinder := new(mocks.SpaceFinder)
space := &coretypes.SpaceCore{
Path: "root/parent",
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
c.SpaceFinder = mockSpaceFinder
// 3. Mock GetPermissionChecks
permissionCheck := coretypes.PermissionCheck{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{
Type: enum.ResourceTypeRegistry,
Identifier: "reg",
},
Permission: enum.PermissionRegistryEdit,
}
mockRegistryMetadataHelper.On("GetPermissionChecks", mock.Anything, "reg", enum.PermissionRegistryEdit).
Return([]coretypes.PermissionCheck{permissionCheck})
c.RegistryMetadataHelper = mockRegistryMetadataHelper
// Mock authorizer with manual response
mockAuthorizer := new(mocks.Authorizer)
mockAuthorizer.On("CheckAll", mock.Anything, (*auth.Session)(nil), permissionCheck).Return(false,
apiauth.ErrForbidden)
c.Authorizer = mockAuthorizer
},
request: api.CreateWebhookRequestObject{
RegistryRef: "reg",
Body: &api.CreateWebhookJSONRequestBody{
Name: testWebhookIdentifier,
Identifier: testWebhookIdentifier,
Url: "http://example.com",
Enabled: true,
Insecure: false,
},
},
expectedResp: api.CreateWebhook403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse{
Code: "403",
Message: "forbidden",
},
},
},
{
name: "non_virtual_registry",
setupMocks: func(c *metadata.APIController) {
// 1. Mock registry metadata helper for GetRegistryRequestBaseInfo
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
regInfo := ®istrytypes.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
RegistryType: api.RegistryTypeUPSTREAM,
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").
Return(regInfo, nil)
c.RegistryMetadataHelper = mockRegistryMetadataHelper
},
request: api.CreateWebhookRequestObject{
RegistryRef: "reg",
Body: &api.CreateWebhookJSONRequestBody{
Name: testWebhookIdentifier,
Identifier: testWebhookIdentifier,
Url: "http://example.com",
Enabled: true,
Insecure: false,
},
},
expectedResp: api.CreateWebhook400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse{
Code: "400",
Message: "not allowed to create webhook for UPSTREAM registry",
},
},
},
{
name: "permission_check_fails",
setupMocks: func(c *metadata.APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockAuthorizer := new(mocks.Authorizer)
space := &coretypes.SpaceCore{ID: 2}
regInfo := ®istrytypes.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
RegistryType: api.RegistryTypeVIRTUAL,
}
permissionChecks := []coretypes.PermissionCheck{
{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{Type: enum.ResourceTypeRegistry, Identifier: "reg"},
Permission: enum.PermissionRegistryEdit,
},
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").
Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").
Return(regInfo, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "reg", enum.PermissionRegistryEdit).
Return(permissionChecks)
mockAuthorizer.On("CheckAll", mock.Anything, (*auth.Session)(nil), permissionChecks[0]).
Return(false, apiauth.ErrForbidden)
c.SpaceFinder = mockSpaceFinder
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.Authorizer = mockAuthorizer
},
request: api.CreateWebhookRequestObject{
RegistryRef: "reg",
Body: &api.CreateWebhookJSONRequestBody{
Name: testWebhookIdentifier,
Identifier: testWebhookIdentifier,
Url: "http://example.com",
Enabled: true,
Insecure: false,
},
},
expectedResp: api.CreateWebhook403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse{
Code: "403",
Message: "forbidden",
},
},
},
{
name: "duplicate_webhook_identifier",
setupMocks: func(c *metadata.APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockAuthorizer := new(mocks.Authorizer)
mockWebhooksRepository := new(mocks.WebhooksRepository)
space := &coretypes.SpaceCore{ID: 2}
regInfo := ®istrytypes.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
RegistryType: api.RegistryTypeVIRTUAL,
}
permissionChecks := []coretypes.PermissionCheck{
{
Scope: coretypes.Scope{SpacePath: "root/parent"},
Resource: coretypes.Resource{Type: enum.ResourceTypeRegistry, Identifier: "reg"},
Permission: enum.PermissionRegistryEdit,
},
}
webhook := &coretypes.WebhookCore{
ID: 1,
Type: enum.WebhookTypeExternal,
CreatedBy: 0,
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").
Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "", "reg").
Return(regInfo, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "reg", enum.PermissionRegistryEdit).
Return(permissionChecks)
// Set up authorizer to expect a session with Principal ID 123 for this test case
mockSession := &auth.Session{Principal: coretypes.Principal{ID: 123}}
mockAuthorizer.On("CheckAll", mock.Anything, mockSession, permissionChecks[0]).
Return(true, nil)
mockRegistryMetadataHelper.On("MapToWebhookCore", mock.Anything,
mock.MatchedBy(func(req api.WebhookRequest) bool {
return req.Identifier == testWebhookIdentifier &&
req.Name == testWebhookIdentifier &&
req.Url == testWebhookURL &&
req.Enabled == true &&
req.Insecure == false
}), regInfo).
Return(webhook, nil)
mockWebhooksRepository.On("Create", mock.Anything, webhook).
Return(fmt.Errorf("resource is a duplicate"))
c.SpaceFinder = mockSpaceFinder
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.Authorizer = mockAuthorizer
c.WebhooksRepository = mockWebhooksRepository
},
request: api.CreateWebhookRequestObject{
RegistryRef: "reg",
Body: &api.CreateWebhookJSONRequestBody{
Name: testWebhookIdentifier,
Identifier: testWebhookIdentifier,
Url: "http://example.com",
Enabled: true,
Insecure: false,
},
},
expectedResp: api.CreateWebhook400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse{
Code: "400",
Message: "failed to store webhook, Webhook with identifier test-webhook already exists",
},
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Create controller and setup mocks.
controller := &metadata.APIController{}
tt.setupMocks(controller)
// Create a context with auth session for success case
localCtx := context.Background()
// Add auth session for tests that need it to set CreatedBy field
if tt.name == "success_case" || tt.name == "duplicate_webhook_identifier" {
mockPrincipal := coretypes.Principal{ID: 123}
mockSession := &auth.Session{Principal: mockPrincipal}
localCtx = request.WithAuthSession(localCtx, mockSession)
}
// Execute.
resp, err := controller.CreateWebhook(localCtx, tt.request)
// Verify response matches expected type and content.
switch expected := tt.expectedResp.(type) {
case api.CreateWebhook201JSONResponse:
assert.NoError(t, err, "Expected no error but got one")
actualResp, ok := resp.(api.CreateWebhook201JSONResponse)
assert.True(t, ok, "Expected 201 response")
// Verify webhook data fields individually.
assert.Equal(t, expected.Data.Identifier, actualResp.Data.Identifier, "Webhook identifier should match")
assert.Equal(t, expected.Data.Name, actualResp.Data.Name, "Webhook name should match")
assert.Equal(t, expected.Data.Url, actualResp.Data.Url, "Webhook URL should match")
assert.Equal(t, expected.Data.Enabled, actualResp.Data.Enabled, "Enabled status should match")
assert.Equal(t, expected.Data.Insecure, actualResp.Data.Insecure, "Insecure status should match")
assert.NotEmpty(t, actualResp.Data.CreatedAt, "CreatedAt should not be empty")
assert.NotEmpty(t, actualResp.Data.ModifiedAt, "ModifiedAt should not be empty")
assert.Equal(t, api.StatusSUCCESS, actualResp.Status, "Status should be SUCCESS")
case api.CreateWebhook400JSONResponse:
// For error responses, we don't need to check the err value since responses with error codes are still valid responses
actualResp, ok := resp.(api.CreateWebhook400JSONResponse)
assert.True(t, ok, "Expected 400 response")
assert.Equal(t, expected.Code, actualResp.Code, "Error code should match")
assert.Equal(t, expected.Message, actualResp.Message, "Error message should match")
case api.CreateWebhook403JSONResponse:
// For error responses, we don't need to check the err value since responses with error codes are still valid responses
actualResp, ok := resp.(api.CreateWebhook403JSONResponse)
assert.True(t, ok, "Expected 403 response")
assert.Equal(t, expected.Code, actualResp.Code, "Error code should match")
assert.Equal(t, expected.Message, actualResp.Message, "Error message should match")
default:
t.Fatalf("Unexpected response type: %T", tt.expectedResp)
}
// Verify mock expectations
if mockSpaceFinder, ok := controller.SpaceFinder.(*mocks.SpaceFinder); ok {
mockSpaceFinder.AssertExpectations(t)
}
if mockMetadataHelper, ok := controller.RegistryMetadataHelper.(*mocks.RegistryMetadataHelper); ok {
mockMetadataHelper.AssertExpectations(t)
}
if mockWebhooksRepo, ok := controller.WebhooksRepository.(*mocks.WebhooksRepository); ok {
mockWebhooksRepo.AssertExpectations(t)
}
if mockAuditService, ok := controller.AuditService.(*mocks.AuditService); ok {
mockAuditService.AssertExpectations(t)
}
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifact_stats.go | registry/app/api/controller/metadata/get_artifact_stats.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/types/enum"
)
//nolint:nilnil
func (c *APIController) GetArtifactStats(
_ context.Context,
_ artifact.GetArtifactStatsRequestObject,
) (artifact.GetArtifactStatsResponseObject, error) {
return nil, nil
}
//nolint:nilnil
func (c *APIController) GetArtifactStatsForSpace(
ctx context.Context,
r artifact.GetArtifactStatsForSpaceRequestObject,
) (artifact.GetArtifactStatsForSpaceResponseObject, error) {
parentRef := r.SpaceRef
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, string(parentRef), "")
if err != nil {
return artifact.GetArtifactStatsForSpace400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetArtifactStatsForSpace400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetArtifactStatsForSpace403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
return nil, nil
}
//nolint:nilnil
func (c *APIController) GetArtifactStatsForRegistry(
ctx context.Context,
r artifact.GetArtifactStatsForRegistryRequestObject,
) (artifact.GetArtifactStatsForRegistryResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.GetArtifactStatsForRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetArtifactStatsForRegistry400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
if err = apiauth.CheckSpaceScope(
ctx,
c.Authorizer,
session,
space,
enum.ResourceTypeRegistry,
enum.PermissionRegistryView,
); err != nil {
return artifact.GetArtifactStatsForRegistry403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
return nil, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_test.go | registry/app/api/controller/metadata/get_artifacts_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata_test
import (
"context"
"encoding/json"
"fmt"
"net/http"
"os"
"path/filepath"
"testing"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/registry/app/api/controller/metadata"
"github.com/harness/gitness/registry/app/api/controller/mocks"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
"github.com/stretchr/testify/require"
)
// TestGetAllArtifacts tests the GetAllArtifacts endpoint for various scenarios.
//
// Note: This endpoint requires TagRepository which has complex mock signatures.
// Testing basic functionality and error scenarios.
func TestGetAllArtifacts(t *testing.T) {
tests := []struct {
name string
setupMocks func() *metadata.APIController
expectedResp any
}{
{
name: errorTypeSpaceNotFound,
setupMocks: func() *metadata.APIController {
return setupArtifactsControllerWithError(t, errorTypeSpaceNotFound)
},
expectedResp: artifact.GetAllArtifacts400JSONResponse{},
},
{
name: "unauthorized_access",
setupMocks: func() *metadata.APIController {
return setupArtifactsControllerWithError(t, errorTypeUnauthorized)
},
expectedResp: artifact.GetAllArtifacts403JSONResponse{},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := tt.setupMocks()
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
req := artifact.GetAllArtifactsRequestObject{
SpaceRef: artifact.SpaceRefPathParam("root"),
Params: artifact.GetAllArtifactsParams{},
}
resp, err := controller.GetAllArtifacts(ctx, req)
assert.NoError(t, err)
assert.NotNil(t, resp)
// Verify response type matches expected
switch tt.expectedResp.(type) {
case artifact.GetAllArtifacts200JSONResponse:
_, ok := resp.(artifact.GetAllArtifacts200JSONResponse)
assert.True(t, ok, "Expected 200 response")
case artifact.GetAllArtifacts400JSONResponse:
_, ok := resp.(artifact.GetAllArtifacts400JSONResponse)
assert.True(t, ok, "Expected 400 response")
case artifact.GetAllArtifacts403JSONResponse:
_, ok := resp.(artifact.GetAllArtifacts403JSONResponse)
assert.True(t, ok, "Expected 403 response")
case artifact.GetAllArtifacts500JSONResponse:
_, ok := resp.(artifact.GetAllArtifacts500JSONResponse)
assert.True(t, ok, "Expected 500 response")
}
})
}
}
// TestGetAllArtifactsSnapshot tests that the generated artifacts list responses
// match the expected snapshots. This ensures consistency across runs.
func TestGetAllArtifactsSnapshot(t *testing.T) {
tests := []struct {
name string
includeQuarantine bool
untaggedImagesEnabled bool
packageTypes []artifact.PackageType
}{
{
name: "all_artifacts",
includeQuarantine: false,
untaggedImagesEnabled: false,
packageTypes: []artifact.PackageType{artifact.PackageTypeMAVEN, artifact.PackageTypeGENERIC},
},
{
name: "all_artifacts_with_quarantine",
includeQuarantine: true,
untaggedImagesEnabled: false,
packageTypes: []artifact.PackageType{artifact.PackageTypeMAVEN},
},
{
name: "all_artifacts_untagged_images",
includeQuarantine: false,
untaggedImagesEnabled: true,
packageTypes: []artifact.PackageType{artifact.PackageTypeMAVEN, artifact.PackageTypeGENERIC},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
controller := setupArtifactsSnapshotController(t, tt.includeQuarantine, tt.untaggedImagesEnabled, tt.packageTypes)
ctx := context.Background()
session := &auth.Session{
Principal: coretypes.Principal{
ID: 1,
UID: "test-user",
Email: "test@example.com",
Type: enum.PrincipalTypeUser,
},
}
ctx = request.WithAuthSession(ctx, session)
req := artifact.GetAllArtifactsRequestObject{
SpaceRef: artifact.SpaceRefPathParam("root"),
Params: artifact.GetAllArtifactsParams{},
}
resp, err := controller.GetAllArtifacts(ctx, req)
require.NoError(t, err)
actualResp, ok := resp.(artifact.GetAllArtifacts200JSONResponse)
if !ok {
t.Logf("Response type: %T", resp)
if errResp, isErr := resp.(artifact.GetAllArtifacts500JSONResponse); isErr {
t.Logf("Error message: %v", errResp.Message)
}
}
require.True(t, ok, "Expected 200 response")
require.Equal(t, artifact.Status("SUCCESS"), actualResp.Status)
// Verify snapshot
verifyArtifactsSnapshot(t, tt.name, actualResp.ListArtifactResponseJSONResponse)
})
}
}
// Helper functions
func setupArtifactsControllerWithError(_ *testing.T, errorType string) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
regInfo := &metadata.RegistryRequestInfo{
RegistryRequestBaseInfo: &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
},
}
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "root", "").
Return(regInfo.RegistryRequestBaseInfo, nil)
switch errorType {
case errorTypeSpaceNotFound:
mockRegistryMetadataHelper.On("GetRegistryRequestInfo", mock.Anything, mock.Anything).
Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").
Return(nil, http.ErrNotSupported)
case errorTypeUnauthorized:
mockRegistryMetadataHelper.On("GetRegistryRequestInfo", mock.Anything, mock.Anything).
Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(false, http.ErrNotSupported)
}
eventReporter := createEventReporter()
fileManager := createFileManager()
return metadata.NewAPIController(
nil, fileManager, nil, nil, nil, nil, nil, nil, nil, nil,
mockSpaceFinder, nil, nil, mockAuthorizer, nil, nil, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return false },
nil, nil,
)
}
func setupArtifactsSnapshotController(
_ *testing.T, includeQuarantine bool, untaggedImagesEnabled bool, _ []artifact.PackageType,
) *metadata.APIController {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryRepo := new(mocks.RegistryRepository)
mockSpaceFinder := new(mocks.SpaceFinder)
mockAuthorizer := new(mocks.Authorizer)
mockTagStore := new(mocks.MockTagRepository)
mockURLProvider := new(mocks.Provider)
mockPackageWrapper := new(mocks.MockPackageWrapper)
space := &coretypes.SpaceCore{
ID: 1,
Path: "root",
}
regInfo := &metadata.RegistryRequestInfo{
RegistryRequestBaseInfo: &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "test-registry",
ParentRef: "root",
ParentID: 2,
RootIdentifier: "root",
},
}
// Create sample artifacts for all package types
allPackageTypes := []artifact.PackageType{
artifact.PackageTypeDOCKER,
artifact.PackageTypeHELM,
artifact.PackageTypeMAVEN,
artifact.PackageTypeGENERIC,
artifact.PackageTypePYTHON,
artifact.PackageTypeNPM,
artifact.PackageTypeRPM,
artifact.PackageTypeNUGET,
artifact.PackageTypeGO,
artifact.PackageTypeHUGGINGFACE,
}
artifacts := &[]types.ArtifactMetadata{}
for i, pkgType := range allPackageTypes {
// For untagged images, Docker and Helm need digest format (sha256:64hexchars)
version := fmt.Sprintf("v%d.0.0", i+1)
var tags []string
if untaggedImagesEnabled && (pkgType == artifact.PackageTypeDOCKER || pkgType == artifact.PackageTypeHELM) {
// Create a valid 64-character hex digest
version = fmt.Sprintf("sha256:%064d", i+1)
// Add tags array for untagged images - these are the tags that point to this digest
tags = []string{fmt.Sprintf("v%d.0.0", i+1), "latest"}
}
art := types.ArtifactMetadata{
Name: fmt.Sprintf("test-artifact-%d", i+1),
Version: version,
PackageType: pkgType,
RepoName: "test-registry",
Tags: tags,
}
// HuggingFace requires artifact type
if pkgType == artifact.PackageTypeHUGGINGFACE {
modelType := artifact.ArtifactTypeModel
art.ArtifactType = &modelType
}
*artifacts = append(*artifacts, art)
}
// Add quarantine info if requested
quarantineMap := make(map[types.ArtifactIdentifier]*types.QuarantineInfo)
if includeQuarantine {
reason := "Security vulnerability detected"
quarantineMap[types.ArtifactIdentifier{
Name: "test-artifact-1",
Version: "v1.0.0",
RegistryName: "test-registry",
}] = &types.QuarantineInfo{
Reason: reason,
}
}
// Mock GetRegistryRequestBaseInfo which is called by GetRegistryRequestInfo
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo", mock.Anything, "root", "").
Return(regInfo.RegistryRequestBaseInfo, nil)
// Mock GetRegistryRequestInfo to return properly configured regInfo
mockRegistryMetadataHelper.On("GetRegistryRequestInfo", mock.Anything, mock.Anything).
Return(regInfo, nil)
mockSpaceFinder.On("FindByRef", mock.Anything, "root").Return(space, nil)
mockRegistryMetadataHelper.On("GetPermissionChecks", space, "test-registry", enum.PermissionRegistryView).
Return([]coretypes.PermissionCheck{})
mockAuthorizer.On("CheckAll", mock.Anything, mock.Anything, mock.Anything).
Return(true, nil)
// Mock TagStore methods - use mock.Anything for fields set by GetRegistryRequestInfo
// GetAllArtifactsByParentID: ctx, parentID, registryIDs, sortByField,
// sortByOrder, limit, offset, search, latestVersion, packageTypes
mockTagStore.On("GetAllArtifactsByParentID",
mock.Anything, int64(2), mock.Anything, mock.Anything, mock.Anything,
mock.Anything, mock.Anything, mock.Anything, mock.Anything, mock.Anything).
Return(artifacts, nil)
// GetAllArtifactsByParentIDUntagged: ctx, parentID, registryIDs, sortByField,
// sortByOrder, limit, offset, search, packageTypes (no latestVersion)
mockTagStore.On("GetAllArtifactsByParentIDUntagged",
mock.Anything, int64(2), mock.Anything, mock.Anything, mock.Anything,
mock.Anything, mock.Anything, mock.Anything, mock.Anything).
Return(artifacts, nil)
// CountAllArtifactsByParentID: ctx, parentID, registryIDs, search,
// latestVersion, packageTypes, untaggedImagesEnabled
mockTagStore.On("CountAllArtifactsByParentID",
mock.Anything, int64(2), mock.Anything, mock.Anything,
mock.Anything, mock.Anything, mock.Anything).
Return(int64(len(*artifacts)), nil)
mockTagStore.On("GetQuarantineInfoForArtifacts", mock.Anything, mock.Anything, int64(2)).
Return(quarantineMap, nil)
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything, mock.Anything).
Return("https://registry.example.com/root/test-registry")
mockURLProvider.On("RegistryURL", mock.Anything, mock.Anything, mock.Anything, mock.Anything).
Return("https://registry.example.com/root/test-registry")
// Mock PackageWrapper
mockPackageWrapper.On("GetArtifactMetadata", mock.Anything).
Return((*artifact.ArtifactMetadata)(nil))
eventReporter := createEventReporter()
fileManager := createFileManager()
return metadata.NewAPIController(
mockRegistryRepo, fileManager, nil, nil, nil, mockTagStore, nil, nil, nil, nil,
mockSpaceFinder, nil, mockURLProvider, mockAuthorizer, nil, nil, nil, nil,
mockRegistryMetadataHelper, nil, eventReporter, nil, "",
nil, nil, nil, nil, nil, nil, nil, nil,
func(_ context.Context) bool { return untaggedImagesEnabled },
mockPackageWrapper, nil,
)
}
// verifyArtifactsSnapshot compares the actual artifacts list data with a stored snapshot.
func verifyArtifactsSnapshot(t *testing.T, name string, actual artifact.ListArtifactResponseJSONResponse) {
t.Helper()
snapshotDir := filepath.Join("testdata", "snapshots", "artifacts")
snapshotFile := filepath.Join(snapshotDir, name+".json")
// Marshal actual data to JSON
actualJSON, err := json.MarshalIndent(actual, "", " ")
require.NoError(t, err, "Failed to marshal actual data")
// Check if UPDATE_SNAPSHOTS environment variable is set
if os.Getenv(envUpdateSnapshots) == envValueTrue {
// Create directory if it doesn't exist
err := os.MkdirAll(snapshotDir, 0755)
require.NoError(t, err, "Failed to create snapshot directory")
// Write snapshot
err = os.WriteFile(snapshotFile, actualJSON, snapshotFilePermissions)
require.NoError(t, err, "Failed to write snapshot file")
t.Logf("Updated snapshot: %s", snapshotFile)
return
}
// Read existing snapshot
expectedJSON, err := os.ReadFile(snapshotFile)
if os.IsNotExist(err) {
t.Fatalf("Snapshot file does not exist: %s\nRun tests with UPDATE_SNAPSHOTS=true to create it", snapshotFile)
}
require.NoError(t, err, "Failed to read snapshot file")
// Compare JSON
var expected, actualParsed any
require.NoError(t, json.Unmarshal(expectedJSON, &expected), "Failed to unmarshal expected JSON")
require.NoError(t, json.Unmarshal(actualJSON, &actualParsed), "Failed to unmarshal actual JSON")
assert.Equal(t, expected, actualParsed,
"Snapshot mismatch for %s.\nExpected:\n%s\n\nActual:\n%s\n\nRun tests with UPDATE_SNAPSHOTS=true to update snapshots",
name, string(expectedJSON), string(actualJSON))
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_docker_manifest.go | registry/app/api/controller/metadata/get_artifacts_docker_manifest.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
)
func (c *APIController) GetDockerArtifactManifest(
ctx context.Context,
r artifact.GetDockerArtifactManifestRequestObject,
) (artifact.GetDockerArtifactManifestResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.GetDockerArtifactManifest400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetDockerArtifactManifest400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space,
regInfo.RegistryIdentifier, enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetDockerArtifactManifest403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
imageName := string(r.Artifact)
dgst := string(r.Params.Digest)
manifestDigest, err := types.NewDigest(digest.Digest(dgst))
if err != nil {
return getArtifactManifestErrorResponse(err)
}
manifestPayload, err := c.ManifestStore.GetManifestPayload(
ctx,
regInfo.ParentID,
regInfo.RegistryIdentifier,
imageName,
manifestDigest,
)
if err != nil {
return getArtifactManifestErrorResponse(err)
}
payload := *manifestPayload
return artifact.GetDockerArtifactManifest200JSONResponse{
DockerArtifactManifestResponseJSONResponse: artifact.DockerArtifactManifestResponseJSONResponse{
Data: artifact.DockerArtifactManifest{
Manifest: string(payload),
},
Status: artifact.StatusSUCCESS,
},
}, nil
}
func getArtifactManifestErrorResponse(err error) (artifact.GetDockerArtifactManifestResponseObject, error) {
return artifact.GetDockerArtifactManifest500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/retrigger_webhook_execution.go | registry/app/api/controller/metadata/retrigger_webhook_execution.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
"strconv"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) ReTriggerWebhookExecution(
ctx context.Context,
r api.ReTriggerWebhookExecutionRequestObject,
) (api.ReTriggerWebhookExecutionResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return getReTriggerWebhooksExecutionsInternalErrorResponse(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return getReTriggerWebhooksExecutionsInternalErrorResponse(err)
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryEdit)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
log.Ctx(ctx).Error().Msgf("permission check failed while retrigger webhook execution for registry: %s, error: %v",
regInfo.RegistryIdentifier, err)
return api.ReTriggerWebhookExecution403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
webhookExecutionID, err := strconv.ParseInt(string(r.WebhookExecutionId), 10, 64)
if err != nil || webhookExecutionID <= 0 {
log.Ctx(ctx).Error().Msgf("invalid webhook execution identifier: %s, err: %v", string(r.WebhookExecutionId), err)
return api.ReTriggerWebhookExecution400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest,
fmt.Sprintf("invalid webhook execution identifier: %s, err: %v", string(r.WebhookExecutionId), err)),
),
}, nil
}
result, err := c.WebhookService.ReTriggerWebhookExecution(ctx, webhookExecutionID)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return api.ReTriggerWebhookExecution404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, fmt.Sprintf("webhook execution '%d' not found", webhookExecutionID)),
),
}, nil
}
return getReTriggerWebhooksExecutionsInternalErrorResponse(fmt.Errorf("failed to re-trigger execution: %w", err))
}
webhookExecution, err := MapToWebhookExecutionResponseEntity(*result.Execution)
if err != nil {
log.Ctx(ctx).Error().Msgf(getWebhookErrMsg, regInfo.RegistryRef, r.WebhookIdentifier, err)
return getReTriggerWebhooksExecutionsInternalErrorResponse(err)
}
return api.ReTriggerWebhookExecution200JSONResponse{
WebhookExecutionResponseJSONResponse: api.WebhookExecutionResponseJSONResponse{
Data: *webhookExecution,
Status: api.StatusSUCCESS,
},
}, nil
}
//nolint:unparam
func getReTriggerWebhooksExecutionsInternalErrorResponse(
err error,
) (api.ReTriggerWebhookExecution500JSONResponse, error) {
return api.ReTriggerWebhookExecution500JSONResponse{
InternalServerErrorJSONResponse: api.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_summary.go | registry/app/api/controller/metadata/get_artifacts_summary.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
)
func (c *APIController) GetArtifactSummary(
ctx context.Context,
r artifact.GetArtifactSummaryRequestObject,
) (artifact.GetArtifactSummaryResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return artifact.GetArtifactSummary400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetArtifactSummary400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
if errors.Is(err, apiauth.ErrUnauthorized) {
return artifact.GetArtifactSummary401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, err.Error()),
),
}, nil
}
return artifact.GetArtifactSummary403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
image := string(r.Artifact)
registry, err := c.RegistryRepository.Get(ctx, regInfo.RegistryID)
if err != nil {
return artifact.GetArtifactSummary500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
var artifactType *artifact.ArtifactType
if r.Params.ArtifactType != nil {
artifactType, err = ValidateAndGetArtifactType(registry.PackageType, string(*r.Params.ArtifactType))
if err != nil {
return artifact.GetArtifactSummary400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
}
metadata, err := c.getImageMetadata(ctx, registry, image, artifactType)
if err != nil {
if errors.Is(err, store.ErrResourceNotFound) {
return artifact.GetArtifactSummary404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusNotFound, "Artifact not found"),
),
}, nil
}
return artifact.GetArtifactSummary500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.GetArtifactSummary200JSONResponse{
ArtifactSummaryResponseJSONResponse: *GetArtifactSummary(*metadata),
}, nil
}
func (c *APIController) getImageMetadata(
ctx context.Context, registry *types.Registry, image string,
artifactType *artifact.ArtifactType,
) (*types.ImageMetadata, error) {
img, err := c.ImageStore.GetByNameAndType(ctx, registry.ID, image, artifactType)
if err != nil {
return nil, err
}
downloadCount, err := c.DownloadStatRepository.GetTotalDownloadsForImage(ctx, img.ID)
if err != nil {
return nil, err
}
imgMetadata := &types.ImageMetadata{
Name: image,
RegistryUUID: registry.UUID,
UUID: img.UUID,
DownloadCount: downloadCount,
RepoName: registry.Name,
PackageType: registry.PackageType,
CreatedAt: img.CreatedAt,
ArtifactType: img.ArtifactType,
}
//nolint:nestif
if registry.PackageType == artifact.PackageTypeDOCKER || registry.PackageType == artifact.PackageTypeHELM {
if c.UntaggedImagesEnabled(ctx) {
latestManifest, err := c.ManifestStore.GetLatestManifest(ctx, registry.ID, image)
if err != nil {
return nil, err
}
imgMetadata.LatestVersion = latestManifest.Digest.String()
imgMetadata.ModifiedAt = latestManifest.CreatedAt
} else {
latestTag, err := c.TagStore.GetLatestTag(ctx, registry.ID, image)
if err != nil {
return nil, err
}
imgMetadata.LatestVersion = latestTag.Name
imgMetadata.ModifiedAt = latestTag.UpdatedAt
}
} else {
latestArtifact, err := c.ArtifactStore.GetLatestByImageID(ctx, img.ID)
if err != nil {
return nil, err
}
imgMetadata.LatestVersion = latestArtifact.Version
imgMetadata.ModifiedAt = latestArtifact.UpdatedAt
}
return imgMetadata, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_oci_artifacts_tags.go | registry/app/api/controller/metadata/get_oci_artifacts_tags.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetOciArtifactTags(
ctx context.Context,
r artifact.GetOciArtifactTagsRequestObject,
) (artifact.GetOciArtifactTagsResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return c.getOciArtifactTagsBadRequestResponse(
fmt.Errorf("failed to get registry request base info: %w", err)), nil
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return c.getOciArtifactTagsBadRequestResponse(err), nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetOciArtifactTags403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
image := string(r.Artifact)
_, err = c.ImageStore.GetByName(ctx, regInfo.RegistryID, image)
if err != nil {
return getOCIArtifacts404Error(ctx, fmt.Errorf("failed to get image by name: [%s], error: %w", image, err))
}
offset := GetOffset(r.Params.Size, r.Params.Page)
limit := GetPageLimit(r.Params.Size)
page := GetPageNumber(r.Params.Page)
searchTerm := ""
if r.Params.SearchTerm != nil {
searchTerm = string(*r.Params.SearchTerm)
}
tagsInfo, err := c.TagStore.GetOciTagsInfo(ctx, regInfo.RegistryID, image, limit, offset, searchTerm)
if err != nil {
return getOCIArtifacts500Error(ctx, err)
}
var count int64
count, err = c.TagStore.CountAllTagsByRepoAndImage(
ctx, regInfo.ParentID, regInfo.RegistryIdentifier,
image, searchTerm,
)
if err != nil {
return getOCIArtifacts500Error(ctx, err)
}
pageCount := GetPageCount(count, limit)
var tags []artifact.OciArtifactTag
for _, t := range *tagsInfo {
tags = append(tags, artifact.OciArtifactTag{
Name: t.Name,
Digest: t.Digest,
})
}
return artifact.GetOciArtifactTags200JSONResponse{
ListOciArtifactTagsResponseJSONResponse: artifact.ListOciArtifactTagsResponseJSONResponse{
Data: artifact.ListOciArtifactTags{
ItemCount: &count,
PageCount: &pageCount,
PageIndex: &page,
PageSize: &limit,
OciArtifactTags: tags,
},
Status: artifact.StatusSUCCESS,
},
}, nil
}
func (c *APIController) getOciArtifactTagsBadRequestResponse(err error) artifact.GetOciArtifactTagsResponseObject {
return artifact.GetOciArtifactTags400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}
}
func getOCIArtifacts500Error(ctx context.Context, err error) (artifact.GetOciArtifactTagsResponseObject, error) {
wrappedErr := fmt.Errorf("internal server error: %w", err)
log.Error().Ctx(ctx).Msgf("error while getting artifact tags details: %v", wrappedErr)
return artifact.GetOciArtifactTags500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, wrappedErr.Error()),
),
}, nil
}
func getOCIArtifacts404Error(ctx context.Context, err error) (artifact.GetOciArtifactTagsResponseObject, error) {
log.Error().Ctx(ctx).Msgf("error while getting artifact tags details: %v", err)
return artifact.GetOciArtifactTags404JSONResponse{
NotFoundJSONResponse: artifact.NotFoundJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_helm_manifest.go | registry/app/api/controller/metadata/get_artifacts_helm_manifest.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"net/http"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
store2 "github.com/harness/gitness/store"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
)
func (c *APIController) GetHelmArtifactManifest(
ctx context.Context,
r artifact.GetHelmArtifactManifestRequestObject,
) (artifact.GetHelmArtifactManifestResponseObject, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return c.get400Error(err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return artifact.GetHelmArtifactManifest400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return artifact.GetHelmArtifactManifest403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
imageName := string(r.Artifact)
version := string(r.Version)
var manifestPayload *types.Payload
if c.UntaggedImagesEnabled(ctx) {
manifestDigest, err2 := types.NewDigest(digest.Digest(version))
if err2 != nil {
return artifact.GetHelmArtifactManifest400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err2.Error()),
),
}, nil
}
manifestPayload, err = c.ManifestStore.GetManifestPayload(
ctx,
regInfo.ParentID,
regInfo.RegistryIdentifier,
imageName,
manifestDigest,
)
} else {
manifestPayload, err = c.ManifestStore.FindManifestPayloadByTagName(
ctx,
regInfo.ParentID,
regInfo.RegistryIdentifier,
imageName,
version,
)
}
if err != nil {
if errors.Is(err, store2.ErrResourceNotFound) {
return artifact.GetHelmArtifactManifest400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
return artifact.GetHelmArtifactManifest500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
payload := *manifestPayload
return artifact.GetHelmArtifactManifest200JSONResponse{
HelmArtifactManifestResponseJSONResponse: artifact.HelmArtifactManifestResponseJSONResponse{
Data: artifact.HelmArtifactManifest{
Manifest: string(payload),
},
Status: artifact.StatusSUCCESS,
},
}, nil
}
func (c *APIController) get400Error(err error) (artifact.GetHelmArtifactManifestResponseObject, error) {
return artifact.GetHelmArtifactManifest400JSONResponse{
BadRequestJSONResponse: artifact.BadRequestJSONResponse(
*GetErrorResponse(http.StatusBadRequest, err.Error()),
),
}, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/get_artifacts_version_summary.go | registry/app/api/controller/metadata/get_artifacts_version_summary.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"errors"
"fmt"
"net/http"
"strings"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/types/enum"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
func (c *APIController) GetArtifactVersionSummary(
ctx context.Context,
r artifact.GetArtifactVersionSummaryRequestObject,
) (artifact.GetArtifactVersionSummaryResponseObject, error) {
image, version, pkgType, isQuarantined, quarantineReason,
artifactType, artifactUUID, registryUUID, err := c.FetchArtifactSummary(ctx, r)
if err != nil {
if errors.Is(err, apiauth.ErrUnauthorized) {
return artifact.GetArtifactVersionSummary401JSONResponse{
UnauthenticatedJSONResponse: artifact.UnauthenticatedJSONResponse(
*GetErrorResponse(http.StatusUnauthorized, err.Error()),
),
}, nil
}
if errors.Is(err, apiauth.ErrForbidden) {
return artifact.GetArtifactVersionSummary403JSONResponse{
UnauthorizedJSONResponse: artifact.UnauthorizedJSONResponse(
*GetErrorResponse(http.StatusForbidden, err.Error()),
),
}, nil
}
return artifact.GetArtifactVersionSummary500JSONResponse{
InternalServerErrorJSONResponse: artifact.InternalServerErrorJSONResponse(
*GetErrorResponse(http.StatusInternalServerError, err.Error()),
),
}, nil
}
return artifact.GetArtifactVersionSummary200JSONResponse{
ArtifactVersionSummaryResponseJSONResponse: *GetArtifactVersionSummary(image,
pkgType, version, isQuarantined, quarantineReason, artifactType, artifactUUID, registryUUID),
}, nil
}
// FetchArtifactSummary helper function for common logic.
func (c *APIController) FetchArtifactSummary(
ctx context.Context,
r artifact.GetArtifactVersionSummaryRequestObject,
) (string, string, artifact.PackageType, bool, string, *artifact.ArtifactType, string, string, error) {
regInfo, err := c.RegistryMetadataHelper.GetRegistryRequestBaseInfo(ctx, "", string(r.RegistryRef))
if err != nil {
return "", "", "", false, "", nil, "", "", fmt.Errorf("failed to get registry request base info: %w", err)
}
space, err := c.SpaceFinder.FindByRef(ctx, regInfo.ParentRef)
if err != nil {
return "", "", "", false, "", nil, "", "", err
}
session, _ := request.AuthSessionFrom(ctx)
permissionChecks := c.RegistryMetadataHelper.GetPermissionChecks(space, regInfo.RegistryIdentifier,
enum.PermissionRegistryView)
if err = apiauth.CheckRegistry(
ctx,
c.Authorizer,
session,
permissionChecks...,
); err != nil {
return "", "", "", false, "", nil, "", "", err
}
image := string(r.Artifact)
version := string(r.Version)
artifactVersion := version
if r.Params.Digest != nil && strings.TrimSpace(string(*r.Params.Digest)) != "" {
parsedDigest, err := types.NewDigest(digest.Digest(*r.Params.Digest))
if err != nil {
log.Ctx(ctx).Err(err).Msg("Failed to parse digest")
}
artifactVersion = parsedDigest.String()
}
registry, err := c.RegistryRepository.Get(ctx, regInfo.RegistryID)
if err != nil {
return "", "", "", false, "", nil, "", "", err
}
var artifactType *artifact.ArtifactType
if r.Params.ArtifactType != nil {
artifactType, err = ValidateAndGetArtifactType(registry.PackageType, string(*r.Params.ArtifactType))
if err != nil {
return "", "", "", false, "", nil, "", "", err
}
}
quarantinePath, err := c.QuarantineArtifactRepository.GetByFilePath(ctx,
"", regInfo.RegistryID, image, artifactVersion, artifactType)
if err != nil {
log.Ctx(ctx).Err(err).Msg("failed to get quarantine path")
}
var quarantineReason string
var isQuarantined bool
if len(quarantinePath) > 0 {
isQuarantined = true
quarantineReason = quarantinePath[0].Reason
}
//nolint:nestif
if registry.PackageType == artifact.PackageTypeDOCKER || registry.PackageType == artifact.PackageTypeHELM {
var ociVersion *types.OciVersionMetadata
if c.UntaggedImagesEnabled(ctx) {
ociVersion, err = c.TagStore.GetOCIVersionMetadata(ctx, regInfo.ParentID, regInfo.RegistryIdentifier, image, version)
if err != nil {
return "", "", "", false, "", nil, "", "", err
}
} else {
ociVersion, err = c.TagStore.GetTagMetadata(ctx, regInfo.ParentID, regInfo.RegistryIdentifier, image, version)
if err != nil {
return "", "", "", false, "", nil, "", "", err
}
}
return image, ociVersion.Name, ociVersion.PackageType, isQuarantined, quarantineReason, nil, "", "", nil
}
art, err := c.ArtifactStore.GetArtifactMetadata(ctx, regInfo.ParentID, regInfo.RegistryIdentifier, image,
version, artifactType)
if err != nil {
return "", "", "", false, "", nil, "", "", err
}
return image, art.Name, art.PackageType, isQuarantined, quarantineReason,
art.ArtifactType, art.UUID, registry.UUID, nil
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/controller/metadata/delete_artifact_test.go | registry/app/api/controller/metadata/delete_artifact_test.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package metadata
import (
"context"
"fmt"
"testing"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/registry/app/api/controller/mocks"
api "github.com/harness/gitness/registry/app/api/openapi/contracts/artifact"
"github.com/harness/gitness/registry/types"
coretypes "github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
func TestDeleteArtifact(t *testing.T) {
// Create a mock session for testing
principal := coretypes.Principal{
ID: 1,
Type: enum.PrincipalTypeUser,
Email: "test@example.com",
}
mockSession := &auth.Session{
Principal: principal,
}
// Create a context with the mock session
testCtx := request.WithAuthSession(context.Background(), mockSession)
tests := []struct {
name string
setupMocks func(*APIController)
request api.DeleteArtifactRequestObject
expectedResp api.DeleteArtifactResponseObject
expectedError error
}{
{
name: "success_case",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockImageStore := new(mocks.ImageRepository)
mockTx := new(mocks.Transaction)
mockAuditService := new(mocks.AuditService)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
PackageType: api.PackageTypePYTHON,
}
registry := &types.Registry{
ID: 1,
Name: "reg",
ParentID: 2,
Type: "native",
PackageType: "pypi",
}
artifact := &types.Image{
ID: 1,
Name: "test-artifact",
Enabled: true,
RegistryID: regInfo.RegistryID,
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo",
mock.Anything, "", "reg").Return(regInfo, nil)
mockAuthorizer.On(
"Check",
mock.Anything,
mock.AnythingOfType("*auth.Session"),
mock.AnythingOfType("*types.Scope"),
mock.AnythingOfType("*types.Resource"),
enum.PermissionArtifactsDelete,
).Return(true, nil)
mockRegistryRepository.On(
"GetByParentIDAndName",
mock.Anything,
int64(2),
"reg",
).Return(registry, nil)
mockImageStore.On(
"GetByName",
mock.Anything,
int64(1),
"test-artifact",
).Return(artifact, nil)
mockTx.On("WithTx", mock.Anything, mock.AnythingOfType("func(context.Context) error")).Return(nil)
mockAuditService.On(
"Log",
mock.Anything,
mock.AnythingOfType("types.Principal"),
mock.AnythingOfType("audit.Resource"),
audit.ActionDeleted,
"root/parent",
mock.Anything,
mock.Anything,
).Return(nil)
c.SpaceFinder = mockSpaceFinder
c.RegistryRepository = mockRegistryRepository
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.ImageStore = mockImageStore
c.tx = mockTx
c.AuditService = mockAuditService
},
request: api.DeleteArtifactRequestObject{
RegistryRef: "reg",
Artifact: "test-artifact",
},
expectedResp: api.DeleteArtifact200JSONResponse{
SuccessJSONResponse: api.SuccessJSONResponse{
Status: api.StatusSUCCESS,
},
},
},
{
name: "invalid_registry_reference",
setupMocks: func(c *APIController) {
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo",
mock.Anything, "", "invalid-reg").Return(nil, fmt.Errorf("invalid registry reference"))
c.RegistryMetadataHelper = mockRegistryMetadataHelper
},
request: api.DeleteArtifactRequestObject{
RegistryRef: "invalid-reg",
Artifact: "test-artifact",
},
expectedResp: api.DeleteArtifact400JSONResponse{
BadRequestJSONResponse: api.BadRequestJSONResponse{
Code: "400",
Message: "invalid registry reference",
},
},
expectedError: nil,
},
{
name: "permission_check_fails",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockAuthorizer := new(mocks.Authorizer)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
PackageType: api.PackageTypePYTHON,
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo",
mock.Anything, "", "reg").Return(regInfo, nil)
mockAuthorizer.On("Check", mock.Anything, mock.AnythingOfType("*auth.Session"),
mock.AnythingOfType("*types.Scope"),
mock.AnythingOfType("*types.Resource"),
enum.PermissionArtifactsDelete).Return(false, fmt.Errorf("not authorized"))
c.SpaceFinder = mockSpaceFinder
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.Authorizer = mockAuthorizer
},
request: api.DeleteArtifactRequestObject{
RegistryRef: "reg",
Artifact: "test-artifact",
},
expectedResp: api.DeleteArtifact403JSONResponse{
UnauthorizedJSONResponse: api.UnauthorizedJSONResponse{
Code: "403",
Message: "not authorized",
},
},
expectedError: nil,
},
{
name: "registry_not_found",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
PackageType: api.PackageTypePYTHON,
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo",
mock.Anything, "", "reg").Return(regInfo, nil)
mockAuthorizer.On(
"Check",
mock.Anything,
mock.AnythingOfType("*auth.Session"),
mock.AnythingOfType("*types.Scope"),
mock.AnythingOfType("*types.Resource"),
enum.PermissionArtifactsDelete,
).Return(true, nil)
mockRegistryRepository.On(
"GetByParentIDAndName",
mock.Anything,
int64(2),
"reg",
).Return(nil, fmt.Errorf("registry doesn't exist with this key"))
c.SpaceFinder = mockSpaceFinder
c.RegistryRepository = mockRegistryRepository
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
},
request: api.DeleteArtifactRequestObject{
RegistryRef: "reg",
Artifact: "test-artifact",
},
expectedResp: api.DeleteArtifact404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse{
Code: "404",
Message: "registry doesn't exist with this key",
},
},
},
{
name: "artifact_not_found",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockImageStore := new(mocks.ImageRepository)
mockAuditService := new(mocks.AuditService)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
PackageType: api.PackageTypePYTHON,
}
registry := &types.Registry{
ID: 1,
Name: "reg",
ParentID: 2,
Type: "native",
PackageType: "pypi",
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo",
mock.Anything, "", "reg").Return(regInfo, nil)
mockAuthorizer.On(
"Check",
mock.Anything,
mock.AnythingOfType("*auth.Session"),
mock.AnythingOfType("*types.Scope"),
mock.AnythingOfType("*types.Resource"),
enum.PermissionArtifactsDelete,
).Return(true, nil)
mockRegistryRepository.On(
"GetByParentIDAndName",
mock.Anything,
int64(2),
"reg",
).Return(registry, nil)
mockImageStore.On(
"GetByName",
mock.Anything,
int64(1),
"non-existent-artifact",
).Return(nil, fmt.Errorf("artifact doesn't exist with this key"))
c.SpaceFinder = mockSpaceFinder
c.RegistryRepository = mockRegistryRepository
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.ImageStore = mockImageStore
c.AuditService = mockAuditService
},
request: api.DeleteArtifactRequestObject{
RegistryRef: "reg",
Artifact: "non-existent-artifact",
},
expectedResp: api.DeleteArtifact404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse{
Code: "404",
Message: "artifact doesn't exist with this key",
},
},
},
{
name: "artifact_already_deleted",
setupMocks: func(c *APIController) {
mockSpaceFinder := new(mocks.SpaceFinder)
mockRegistryRepository := new(mocks.RegistryRepository)
mockAuthorizer := new(mocks.Authorizer)
mockRegistryMetadataHelper := new(mocks.RegistryMetadataHelper)
mockImageStore := new(mocks.ImageRepository)
mockAuditService := new(mocks.AuditService)
space := &coretypes.SpaceCore{ID: 2}
regInfo := &types.RegistryRequestBaseInfo{
RegistryID: 1,
RegistryIdentifier: "reg",
ParentID: 2,
ParentRef: "root/parent",
PackageType: api.PackageTypePYTHON,
}
registry := &types.Registry{
ID: 1,
Name: "reg",
ParentID: 2,
Type: "native",
PackageType: "pypi",
}
mockSpaceFinder.On("FindByRef", mock.Anything, "root/parent").Return(space, nil)
mockRegistryMetadataHelper.On("GetRegistryRequestBaseInfo",
mock.Anything, "", "reg").Return(regInfo, nil)
mockAuthorizer.On(
"Check",
mock.Anything,
mock.AnythingOfType("*auth.Session"),
mock.AnythingOfType("*types.Scope"),
mock.AnythingOfType("*types.Resource"),
enum.PermissionArtifactsDelete,
).Return(true, nil)
mockRegistryRepository.On(
"GetByParentIDAndName",
mock.Anything,
int64(2),
"reg",
).Return(registry, nil)
mockImageStore.On(
"GetByName",
mock.Anything,
int64(1),
"deleted-artifact",
).Return(nil, fmt.Errorf("artifact is already deleted"))
c.SpaceFinder = mockSpaceFinder
c.RegistryRepository = mockRegistryRepository
c.Authorizer = mockAuthorizer
c.RegistryMetadataHelper = mockRegistryMetadataHelper
c.ImageStore = mockImageStore
c.AuditService = mockAuditService
},
request: api.DeleteArtifactRequestObject{
RegistryRef: "reg",
Artifact: "deleted-artifact",
},
expectedResp: api.DeleteArtifact404JSONResponse{
NotFoundJSONResponse: api.NotFoundJSONResponse{
Code: "404",
Message: "artifact doesn't exist with this key",
},
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
c := &APIController{}
tt.setupMocks(c)
// Use the test context with the mock session
resp, err := c.DeleteArtifact(testCtx, tt.request)
if tt.expectedError != nil {
assert.Error(t, err, "Expected an error")
assert.Equal(t, tt.expectedError.Error(), err.Error(), "Error message should match")
} else {
assert.NoError(t, err, "Expected no error")
}
// Check response type
switch expected := tt.expectedResp.(type) {
case api.DeleteArtifact200JSONResponse:
actual, ok := resp.(api.DeleteArtifact200JSONResponse)
assert.True(t, ok, "Expected 200 success response")
assert.Equal(t, expected.Status, actual.Status, "Response status should match")
case api.DeleteArtifact400JSONResponse:
actual, ok := resp.(api.DeleteArtifact400JSONResponse)
assert.True(t, ok, "Expected 400 bad request response")
assert.Equal(t, expected.Message, actual.Message, "Error message should match")
case api.DeleteArtifact403JSONResponse:
actual, ok := resp.(api.DeleteArtifact403JSONResponse)
assert.True(t, ok, "Expected 403 forbidden response")
assert.Equal(t, expected.Message, actual.Message, "Error message should match")
case api.DeleteArtifact404JSONResponse:
actual, ok := resp.(api.DeleteArtifact404JSONResponse)
assert.True(t, ok, "Expected 404 not found response")
assert.Equal(t, expected.Message, actual.Message, "Error message should match")
}
// Full response should match expected value
assert.Equal(t, tt.expectedResp, resp, "Full response should match expected value")
// Verify all expectations were met
// Only verify mocks that were actually set up in this test case
if c.SpaceFinder != nil {
mock.AssertExpectationsForObjects(t, c.SpaceFinder)
}
if c.RegistryRepository != nil {
mock.AssertExpectationsForObjects(t, c.RegistryRepository)
}
if c.Authorizer != nil {
mock.AssertExpectationsForObjects(t, c.Authorizer)
}
if c.RegistryMetadataHelper != nil {
mock.AssertExpectationsForObjects(t, c.RegistryMetadataHelper)
}
if c.ImageStore != nil {
mock.AssertExpectationsForObjects(t, c.ImageStore)
}
if c.tx != nil {
mock.AssertExpectationsForObjects(t, c.tx)
}
if c.AuditService != nil {
mock.AssertExpectationsForObjects(t, c.AuditService)
}
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/middleware/artifact_info.go | registry/app/api/middleware/artifact_info.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package middleware
import (
"net/http"
"github.com/harness/gitness/app/api/render"
"github.com/harness/gitness/registry/app/pkg"
"github.com/harness/gitness/registry/request"
)
// StoreArtifactInfo stores the Base Artifact Info for any package type.
func StoreArtifactInfo(
provider pkg.ArtifactInfoProvider,
) func(next http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
packageInfo, err := provider.GetPackageArtifactInfo(r)
if err != nil {
render.TranslatedUserError(r.Context(), w, err)
return
}
// Store the base artifact info in the context
ctx := request.WithArtifactInfo(r.Context(), packageInfo)
next.ServeHTTP(w, r.WithContext(ctx))
})
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/middleware/download_stats.go | registry/app/api/middleware/download_stats.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package middleware
import (
"context"
"errors"
"net/http"
generic2 "github.com/harness/gitness/registry/app/api/controller/pkg/generic"
"github.com/harness/gitness/registry/app/api/handler/generic"
"github.com/harness/gitness/registry/app/api/handler/maven"
"github.com/harness/gitness/registry/app/api/handler/oci"
"github.com/harness/gitness/registry/app/api/handler/packages"
"github.com/harness/gitness/registry/app/api/router/utils"
"github.com/harness/gitness/registry/app/dist_temp/errcode"
"github.com/harness/gitness/registry/app/pkg"
"github.com/harness/gitness/registry/app/pkg/commons"
"github.com/harness/gitness/registry/app/pkg/docker"
gopackageutils "github.com/harness/gitness/registry/app/pkg/gopackage/utils"
maven2 "github.com/harness/gitness/registry/app/pkg/maven"
mavenutils "github.com/harness/gitness/registry/app/pkg/maven/utils"
"github.com/harness/gitness/registry/request"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/store"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
func TrackDownloadStat(h *oci.Handler) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
path := r.URL.Path
methodType := r.Method
requestType := utils.GetRouteTypeV2(path)
sw := &StatusWriter{ResponseWriter: w}
if utils.Manifests == requestType && http.MethodGet == methodType {
next.ServeHTTP(sw, r)
} else {
next.ServeHTTP(w, r)
return
}
if sw.StatusCode != http.StatusOK {
return
}
ctx := r.Context()
info, err := h.GetRegistryInfo(r, true)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackDownloadStat").Err(err).Msgf("error while putting download stat of artifact, %v",
err)
return
}
err = dbDownloadStat(ctx, h.Controller, info)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackDownloadStat").Err(err).Msgf("error while putting download stat of artifact, %v",
err)
return
}
},
)
}
}
func dbDownloadStat(
ctx context.Context,
c *docker.Controller,
info pkg.RegistryInfo,
) error {
registry := info.Registry
image, err := c.DBStore.ImageDao.GetByName(ctx, registry.ID, info.Image)
if errors.Is(err, store.ErrResourceNotFound) {
image, err = getImageFromUpstreamProxy(ctx, c, info)
}
if err != nil {
return err
}
dgst, err := types.NewDigest(digest.Digest(info.Digest))
if err != nil {
return err
}
artifact, err := c.DBStore.ArtifactDao.GetByName(ctx, image.ID, dgst.String())
if err != nil {
return err
}
downloadStat := &types.DownloadStat{
ArtifactID: artifact.ID,
}
if err := c.DBStore.DownloadStatDao.Create(ctx, downloadStat); err != nil {
return err
}
return nil
}
func TrackDownloadStatForGenericArtifact(h *generic.Handler) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
methodType := r.Method
ctx := r.Context()
sw := &StatusWriter{ResponseWriter: w}
if http.MethodGet == methodType {
next.ServeHTTP(sw, r)
} else {
next.ServeHTTP(w, r)
return
}
if sw.StatusCode != http.StatusOK && sw.StatusCode != http.StatusTemporaryRedirect {
return
}
info, err := h.GetGenericArtifactInfo(r)
if !commons.IsEmptyError(err) {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackDownloadStat").Err(err).Msgf("error while putting download stat of artifact, %v",
err)
return
}
err = dbDownloadStatForGenericArtifact(ctx, h.Controller, info)
if !commons.IsEmptyError(err) {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackDownloadStat").Err(err).Msgf("error while putting download stat of artifact, %v",
err)
return
}
},
)
}
}
func TrackDownloadStatForMavenArtifact(h *maven.Handler) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
methodType := r.Method
ctx := r.Context()
sw := &StatusWriter{ResponseWriter: w}
if http.MethodGet == methodType {
next.ServeHTTP(sw, r)
} else {
next.ServeHTTP(w, r)
return
}
if sw.StatusCode != http.StatusOK && sw.StatusCode != http.StatusTemporaryRedirect {
return
}
info, err := h.GetArtifactInfo(r, true)
if !commons.IsEmpty(err) {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackDownloadStat").Err(err).Msgf("error while putting download stat of artifact, %v",
err)
return
}
if !mavenutils.IsMainArtifactFile(info) {
return
}
err2 := dbDownloadStatForMavenArtifact(ctx, h.Controller, info)
if !commons.IsEmptyError(err2) {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackDownloadStat").Err(err).Msgf("error while putting download stat of artifact, %v",
err)
return
}
},
)
}
}
func dbDownloadStatForGenericArtifact(
ctx context.Context,
c *generic2.Controller,
info pkg.GenericArtifactInfo,
) errcode.Error {
registry, err := c.DBStore.RegistryDao.GetByParentIDAndName(ctx, info.ParentID, info.RegIdentifier)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
image, err := c.DBStore.ImageDao.GetByName(ctx, registry.ID, info.Image)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
artifact, err := c.DBStore.ArtifactDao.GetByName(ctx, image.ID, info.Version)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
downloadStat := &types.DownloadStat{
ArtifactID: artifact.ID,
}
if err := c.DBStore.DownloadStatDao.Create(ctx, downloadStat); err != nil {
return errcode.ErrCodeNameUnknown.WithDetail(err)
}
return errcode.Error{}
}
func dbDownloadStatForMavenArtifact(
ctx context.Context,
c *maven2.Controller,
info pkg.MavenArtifactInfo,
) errcode.Error {
imageName := info.GroupID + ":" + info.ArtifactID
registry, err := c.DBStore.RegistryDao.GetByParentIDAndName(ctx, info.ParentID, info.RegIdentifier)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
image, err := c.DBStore.ImageDao.GetByName(ctx, registry.ID, imageName)
if errors.Is(err, store.ErrResourceNotFound) {
image, err = getMavenArtifactFromUpstreamProxy(ctx, c, info)
}
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
artifact, err := c.DBStore.ArtifactDao.GetByName(ctx, image.ID, info.Version)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
downloadStat := &types.DownloadStat{
ArtifactID: artifact.ID,
}
if err := c.DBStore.DownloadStatDao.Create(ctx, downloadStat); err != nil {
return errcode.ErrCodeNameUnknown.WithDetail(err)
}
return errcode.Error{}
}
func TrackDownloadStatsForGoPackage(
h packages.Handler,
) func(next http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
ctx := context.WithoutCancel(r.Context())
sw := &StatusWriter{ResponseWriter: w}
next.ServeHTTP(sw, r)
if sw.StatusCode != http.StatusOK && sw.StatusCode != http.StatusTemporaryRedirect {
return
}
info := request.ArtifactInfoFrom(r.Context()) //nolint:contextcheck
if info == nil || !gopackageutils.IsMainArtifactFile(info.GetFileName()) {
return
}
err := h.TrackDownloadStats(ctx, r)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackDownloadStatsForGoPackage").Err(err).Msg("error while putting download stat of go artifact")
return
}
},
)
}
}
func TrackDownloadStats(
packageHandler packages.Handler,
) func(next http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
ctx := context.WithoutCancel(r.Context())
sw := &StatusWriter{ResponseWriter: w}
next.ServeHTTP(sw, r)
if sw.StatusCode != http.StatusOK &&
sw.StatusCode != http.StatusTemporaryRedirect &&
sw.StatusCode != http.StatusFound {
return
}
err := packageHandler.TrackDownloadStats(ctx, r)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackDownloadStat").Err(err).Msgf("error while putting download stat of artifact, %v",
err)
return
}
},
)
}
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/middleware/original_url.go | registry/app/api/middleware/original_url.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package middleware
import (
"net/http"
"github.com/harness/gitness/registry/request"
)
// StoreOriginalPath stores the original URL path in the context.
func StoreOriginalPath(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
ctx := request.WithOriginalPath(r.Context(), r.URL.Path)
next.ServeHTTP(w, r.WithContext(ctx))
})
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/middleware/bandwidth_stats.go | registry/app/api/middleware/bandwidth_stats.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package middleware
import (
"context"
"encoding/json"
"errors"
"net/http"
generic2 "github.com/harness/gitness/registry/app/api/controller/pkg/generic"
"github.com/harness/gitness/registry/app/api/handler/generic"
"github.com/harness/gitness/registry/app/api/handler/maven"
"github.com/harness/gitness/registry/app/api/handler/oci"
"github.com/harness/gitness/registry/app/api/router/utils"
"github.com/harness/gitness/registry/app/dist_temp/errcode"
"github.com/harness/gitness/registry/app/metadata"
"github.com/harness/gitness/registry/app/pkg"
"github.com/harness/gitness/registry/app/pkg/commons"
"github.com/harness/gitness/registry/app/pkg/docker"
maven2 "github.com/harness/gitness/registry/app/pkg/maven"
"github.com/harness/gitness/registry/types"
"github.com/harness/gitness/store"
"github.com/opencontainers/go-digest"
"github.com/rs/zerolog/log"
)
type StatusWriter struct {
http.ResponseWriter
StatusCode int
}
func (w *StatusWriter) WriteHeader(code int) {
w.StatusCode = code
w.ResponseWriter.WriteHeader(code)
}
func (w *StatusWriter) Write(p []byte) (n int, err error) {
n, err = w.ResponseWriter.Write(p)
if w.StatusCode == 0 {
w.StatusCode = http.StatusOK
}
return
}
func TrackBandwidthStat(h *oci.Handler) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
path := r.URL.Path
methodType := r.Method
requestType := utils.GetRouteTypeV2(path)
sw := &StatusWriter{ResponseWriter: w}
bandwidthType := types.BandwidthTypeUPLOAD
//nolint:gocritic
if utils.Blobs == requestType && http.MethodGet == methodType {
next.ServeHTTP(sw, r)
bandwidthType = types.BandwidthTypeDOWNLOAD
} else if utils.BlobsUploadsSession == requestType && http.MethodPut == methodType {
next.ServeHTTP(sw, r)
} else {
next.ServeHTTP(w, r)
return
}
if types.BandwidthTypeUPLOAD == bandwidthType && sw.StatusCode != http.StatusCreated {
return
} else if types.BandwidthTypeDOWNLOAD == bandwidthType && sw.StatusCode != http.StatusOK {
return
}
ctx := r.Context()
info, err := h.GetRegistryInfo(r, true)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackBandwidthStat").Err(err).Msgf("error while putting bandwidth stat for artifact, %v",
err)
return
}
err = dbBandwidthStat(ctx, h.Controller, info, bandwidthType)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackBandwidthStat").Err(err).Msgf("error while putting bandwidth stat for artifact [%s:%s], %v",
info.RegIdentifier, info.Image, err)
return
}
},
)
}
}
func TrackBandwidthStatForGenericArtifacts(h *generic.Handler) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
methodType := r.Method
sw := &StatusWriter{ResponseWriter: w}
var bandwidthType types.BandwidthType
//nolint:gocritic
if http.MethodGet == methodType {
next.ServeHTTP(sw, r)
bandwidthType = types.BandwidthTypeDOWNLOAD
} else if http.MethodPut == methodType {
bandwidthType = types.BandwidthTypeUPLOAD
next.ServeHTTP(sw, r)
} else {
next.ServeHTTP(w, r)
return
}
if types.BandwidthTypeUPLOAD == bandwidthType && sw.StatusCode != http.StatusCreated {
return
} else if types.BandwidthTypeDOWNLOAD == bandwidthType && sw.StatusCode != http.StatusOK &&
sw.StatusCode != http.StatusTemporaryRedirect {
return
}
ctx := r.Context()
info, err := h.GetGenericArtifactInfo(r)
if !commons.IsEmptyError(err) {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackBandwidthStat").Err(err).Msgf("error while putting bandwidth stat for artifact, %v",
err)
return
}
err2 := dbBandwidthStatForGenericArtifact(ctx, h.Controller, info, bandwidthType)
if !commons.IsEmptyError(err2) {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackBandwidthStat").Err(err).Msgf("error while putting bandwidth stat for artifact [%s:%s], %v",
info.RegIdentifier, info.Image, err)
return
}
},
)
}
}
func TrackBandwidthStatForMavenArtifacts(h *maven.Handler) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
methodType := r.Method
sw := &StatusWriter{ResponseWriter: w}
var bandwidthType types.BandwidthType
//nolint:gocritic
if http.MethodGet == methodType {
next.ServeHTTP(sw, r)
bandwidthType = types.BandwidthTypeDOWNLOAD
} else if http.MethodPut == methodType {
bandwidthType = types.BandwidthTypeUPLOAD
next.ServeHTTP(sw, r)
} else {
next.ServeHTTP(w, r)
return
}
if types.BandwidthTypeUPLOAD == bandwidthType && sw.StatusCode != http.StatusCreated {
return
} else if types.BandwidthTypeDOWNLOAD == bandwidthType && sw.StatusCode != http.StatusOK &&
sw.StatusCode != http.StatusTemporaryRedirect {
return
}
ctx := r.Context()
info, err := h.GetArtifactInfo(r, true)
if !commons.IsEmpty(err) {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackBandwidthStat").Err(err).Msgf("error while putting bandwidth stat for artifact, %v",
err)
return
}
err2 := dbBandwidthStatForMavenArtifact(ctx, h.Controller, info, bandwidthType)
if !commons.IsEmptyError(err2) {
log.Ctx(ctx).Error().Stack().Str("middleware",
"TrackBandwidthStat").Err(err).Msgf("error while putting bandwidth stat for artifact [%s:%s], %v",
info.RegIdentifier, info.GroupID+":"+info.ArtifactID, err)
return
}
},
)
}
}
func dbBandwidthStatForGenericArtifact(
ctx context.Context,
c *generic2.Controller,
info pkg.GenericArtifactInfo,
bandwidthType types.BandwidthType,
) errcode.Error {
registry, err := c.DBStore.RegistryDao.GetByParentIDAndName(ctx, info.ParentID, info.RegIdentifier)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
image, err := c.DBStore.ImageDao.GetByName(ctx, registry.ID, info.Image)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
art, err := c.DBStore.ArtifactDao.GetByName(ctx, image.ID, info.Version)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
var metadata metadata.GenericMetadata
err = json.Unmarshal(art.Metadata, &metadata)
if err != nil {
return errcode.ErrCodeNameUnknown.WithDetail(err)
}
var size int64
for _, files := range metadata.Files {
size += files.Size
}
bandwidthStat := &types.BandwidthStat{
ImageID: image.ID,
Type: bandwidthType,
Bytes: size,
}
if err := c.DBStore.BandwidthStatDao.Create(ctx, bandwidthStat); err != nil {
return errcode.ErrCodeNameUnknown.WithDetail(err)
}
return errcode.Error{}
}
func dbBandwidthStatForMavenArtifact(
ctx context.Context,
c *maven2.Controller,
info pkg.MavenArtifactInfo,
bandwidthType types.BandwidthType,
) errcode.Error {
imageName := info.GroupID + ":" + info.ArtifactID
registry, err := c.DBStore.RegistryDao.GetByParentIDAndName(ctx, info.ParentID, info.RegIdentifier)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
image, err := c.DBStore.ImageDao.GetByName(ctx, registry.ID, imageName)
if errors.Is(err, store.ErrResourceNotFound) {
image, err = getMavenArtifactFromUpstreamProxy(ctx, c, info)
}
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
art, err := c.DBStore.ArtifactDao.GetByName(ctx, image.ID, info.Version)
if err != nil {
return errcode.ErrCodeInvalidRequest.WithDetail(err)
}
var metadata metadata.MavenMetadata
err = json.Unmarshal(art.Metadata, &metadata)
if err != nil {
return errcode.ErrCodeNameUnknown.WithDetail(err)
}
var size int64
for _, file := range metadata.Files {
if file.Filename == info.FileName {
size = file.Size
break
}
}
bandwidthStat := &types.BandwidthStat{
ImageID: image.ID,
Type: bandwidthType,
Bytes: size,
}
if err := c.DBStore.BandwidthStatDao.Create(ctx, bandwidthStat); err != nil {
return errcode.ErrCodeNameUnknown.WithDetail(err)
}
return errcode.Error{}
}
func dbBandwidthStat(
ctx context.Context,
c *docker.Controller,
info pkg.RegistryInfo,
bandwidthType types.BandwidthType,
) error {
dgst := digest.Digest(info.Digest)
registry := info.Registry
blob, err := c.DBStore.BlobRepo.FindByDigestAndRootParentID(ctx, dgst, info.RootParentID)
if err != nil {
return err
}
image, err := c.DBStore.ImageDao.GetByName(ctx, registry.ID, info.Image)
if errors.Is(err, store.ErrResourceNotFound) {
image, err = getImageFromUpstreamProxy(ctx, c, info)
}
if err != nil {
return err
}
bandwidthStat := &types.BandwidthStat{
ImageID: image.ID,
Type: bandwidthType,
Bytes: blob.Size,
}
if err := c.DBStore.BandwidthStatDao.Create(ctx, bandwidthStat); err != nil {
return err
}
return nil
}
func getImageFromUpstreamProxy(ctx context.Context, c *docker.Controller, info pkg.RegistryInfo) (*types.Image, error) {
repos, err := c.GetOrderedRepos(ctx, info)
if err != nil {
return nil, err
}
for _, registry := range repos {
log.Ctx(ctx).Info().Msgf("Using Repository: %s, Type: %s", registry.Name, registry.Type)
image, err := c.DBStore.ImageDao.GetByName(ctx, registry.ID, info.Image)
if err == nil && image != nil {
return image, nil
}
}
return nil, errors.New("image not found in upstream proxy")
}
func getMavenArtifactFromUpstreamProxy(
ctx context.Context,
c *maven2.Controller,
info pkg.MavenArtifactInfo,
) (*types.Image, error) {
repos, err := c.GetOrderedRepos(ctx, info.RegIdentifier, *info.BaseInfo)
if err != nil {
return nil, err
}
for _, registry := range repos {
log.Ctx(ctx).Info().Msgf("Using Repository: %s, Type: %s", registry.Name, registry.Type)
image, err := c.DBStore.ImageDao.GetByName(ctx, registry.ID, info.GroupID+":"+info.ArtifactID)
if err == nil && image != nil {
return image, nil
}
}
return nil, errors.New("artifact not found in upstream proxy")
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
harness/harness | https://github.com/harness/harness/blob/a087eef054a8fc8317f4fda02d3c7ee599b71fec/registry/app/api/middleware/auth.go | registry/app/api/middleware/auth.go | // Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package middleware
import (
"context"
"fmt"
"net/http"
"strings"
"github.com/harness/gitness/app/api/render"
"github.com/harness/gitness/app/api/request"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/app/jwt"
"github.com/harness/gitness/app/services/publicaccess"
"github.com/harness/gitness/app/services/refcache"
"github.com/harness/gitness/app/url"
"github.com/harness/gitness/registry/app/api/handler/oci"
registryauth "github.com/harness/gitness/registry/app/auth"
"github.com/harness/gitness/registry/app/common"
"github.com/harness/gitness/registry/app/pkg"
gitnessenum "github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
func OciCheckAuth(h *oci.Handler) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
ctx := r.Context()
session, _ := request.AuthSessionFrom(ctx)
//nolint:nestif
if auth.IsAnonymousSession(session) {
url := common.GenerateOciTokenURL(h.URLProvider.RegistryURL(ctx))
info, err := h.GetRegistryInfo(r, true)
scope := getScope(r)
if strings.Contains(scope, ":push,") ||
strings.HasSuffix(scope, ",push") ||
strings.HasSuffix(r.RequestURI, "/v2/") ||
r.Header.Get("Authorization") == "" {
returnUnauthorised(ctx, w, url, scope)
return
}
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"OciCheckAuth").Err(err).Msgf("error while fetching the artifact info: %v",
err)
returnUnauthorised(ctx, w, url, scope)
return
}
space, err := h.SpaceFinder.FindByID(ctx, info.ParentID)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"OciCheckAuth").Err(err).Msgf("error while fetching the space with ID: %d err: %v", info.ParentID,
err)
returnUnauthorised(ctx, w, url, scope)
return
}
isPublic, err := h.PublicAccessService.Get(ctx,
gitnessenum.PublicResourceTypeRegistry, space.Path+"/"+info.RegIdentifier)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"OciCheckAuth").Err(err).Msgf("failed to check if public access is supported err: %v",
err)
returnUnauthorised(ctx, w, url, scope)
return
}
if !isPublic {
returnUnauthorised(ctx, w, url, scope)
return
}
}
next.ServeHTTP(w, r)
},
)
}
}
// BlockNonOciSourceToken blocks any request that doesn't have AccessPermissionMetadata.
func BlockNonOciSourceToken(urlProvider url.Provider) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
ctx := r.Context()
if session, oks := request.AuthSessionFrom(ctx); oks && !auth.IsAnonymousSession(session) {
if metadata, okt := session.Metadata.(*auth.AccessPermissionMetadata); !okt ||
metadata.AccessPermissions.Source != jwt.OciSource {
log.Ctx(ctx).Warn().
Msg("blocking request - non OCI source tokens are not allowed for usage with oci endpoints")
scope := getScope(r)
url := common.GenerateOciTokenURL(urlProvider.RegistryURL(ctx))
returnUnauthorised(ctx, w, url, scope)
return
}
}
next.ServeHTTP(w, r)
},
)
}
}
func CheckSig() func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
// Check if the sig query parameter exists
if token := r.URL.Query().Get("sig"); token != "" {
// Set the token as a Bearer token in the Authorization header
token = strings.TrimPrefix(token, "Bearer ")
token = strings.TrimPrefix(token, "Basic ")
r.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token))
}
next.ServeHTTP(w, r)
},
)
}
}
func CheckAuthWithChallenge(
p pkg.ArtifactInfoProvider,
spaceFinder refcache.SpaceFinder,
publicAccessService publicaccess.Service,
) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
ctx := r.Context()
session, _ := request.AuthSessionFrom(ctx)
if auth.IsAnonymousSession(session) {
info, err := p.GetPackageArtifactInfo(r)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"CheckAuthWithChallenge").Err(err).Msgf("error while fetching the artifact info: %v",
err)
setAuthenticateHeader(w)
render.Unauthorized(ctx, w)
return
}
space, err := spaceFinder.FindByID(ctx, info.BaseArtifactInfo().ParentID)
if err != nil {
log.Ctx(ctx).Error().Stack().Str("middleware",
"CheckAuthWithChallenge").Err(err).
Msgf("error while fetching the space with ID: %d err: %v",
info.BaseArtifactInfo().ParentID,
err)
setAuthenticateHeader(w)
render.Unauthorized(ctx, w)
return
}
isPublic, err := publicAccessService.Get(ctx,
gitnessenum.PublicResourceTypeRegistry, space.Path+"/"+info.BaseArtifactInfo().RegIdentifier)
if !isPublic || err != nil {
setAuthenticateHeader(w)
render.Unauthorized(ctx, w)
return
}
}
next.ServeHTTP(w, r)
},
)
}
}
func CheckAuthHeader() func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
apiKeyHeader := r.Header.Get("x-api-key")
if apiKeyHeader != "" {
r.Header.Set("Authorization", apiKeyHeader)
}
next.ServeHTTP(w, r)
},
)
}
}
func CheckNugetAPIKey() func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(
func(w http.ResponseWriter, r *http.Request) {
apiKeyHeader := r.Header.Get("x-nuget-apikey")
if apiKeyHeader != "" {
r.Header.Set("Authorization", apiKeyHeader)
}
next.ServeHTTP(w, r)
},
)
}
}
func setNugetAuthChallenge(method string, w http.ResponseWriter) {
if method == http.MethodPut || method == http.MethodDelete {
w.Header().Set("WWW-Authenticate", "ApiKey realm=\"Harness Registry\"")
} else {
w.Header().Set("WWW-Authenticate", "Basic realm=\"Harness Registry\"")
}
}
func setAuthenticateHeader(w http.ResponseWriter) {
w.Header().Set("WWW-Authenticate", "Basic realm=\"Harness Registry\"")
}
func getRefsFromName(name string) (spaceRef, repoRef string) {
name = strings.Trim(name, "/")
refs := strings.Split(name, "/")
spaceRef = refs[0]
repoRef = refs[1]
return
}
func getScope(r *http.Request) string {
var scope string
path := r.URL.Path
if path != "/v2/" && path != "/v2/token" {
paramMap := common.ExtractFirstQueryParams(r.URL.Query())
rootIdentifier, registryIdentifier, _, _, _, _ := oci.ExtractPathVars(r.Context(), path, paramMap)
var access []registryauth.Access
access = registryauth.AppendAccess(access, r.Method, rootIdentifier+"/"+registryIdentifier)
if fromRepo := r.FormValue("from"); fromRepo != "" {
space, repoName := getRefsFromName(fromRepo)
access = registryauth.AppendAccess(access, http.MethodGet, space+"/"+repoName)
}
scope = registryauth.NewAccessSet(access...).ScopeParam()
}
return scope
}
func returnUnauthorised(ctx context.Context, w http.ResponseWriter, url string, scope string) {
header := fmt.Sprintf(`Bearer realm="%s",service="gitness-registry"`, url)
if scope != "" {
header = fmt.Sprintf(`%s,scope="%s"`, header, scope)
}
w.Header().Set("WWW-Authenticate", header)
render.Unauthorized(ctx, w)
}
| go | Apache-2.0 | a087eef054a8fc8317f4fda02d3c7ee599b71fec | 2026-01-07T08:36:08.091982Z | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.