summaryrefslogtreecommitdiffstatshomepage
path: root/tests/t0107-snapshot.sh
blob: c164d3e2572c4400962f1e14940381fed2d23eaa (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
#!/bin/sh

test_description='Verify snapshot'
. ./setup.sh

test_expect_success 'get foo/snapshot/master.tar.gz' '
	cgit_url "foo/snapshot/master.tar.gz" >tmp
'

test_expect_success 'check html headers' '
	head -n 1 tmp |
	grep "Content-Type: application/x-gzip" &&

	head -n 2 tmp |
	grep "Content-Disposition: inline; filename=.master.tar.gz."
'

test_expect_success 'strip off the header lines' '
	strip_headers <tmp >master.tar.gz
'

test_expect_success 'verify gzip format' '
	gunzip --test master.tar.gz
'

test_expect_success 'untar' '
	rm -rf master &&
	tar -xzf master.tar.gz
'

test_expect_success 'count files' '
	ls master/ >output &&
	test_line_count = 5 output
'

test_expect_success 'verify untarred file-5' '
	grep "^5$" master/file-5 &&
	test_line_count = 1 master/file-5
'

if test -n "$(which lzip 2>/dev/null)"; then
	test_set_prereq LZIP
else
	say 'Skipping LZIP validation tests: lzip not found'
fi

test_expect_success LZIP 'get foo/snapshot/master.tar.lz' '
	cgit_url "foo/snapshot/master.tar.lz" >tmp
'

test_expect_success LZIP 'check html headers' '
	head -n 1 tmp |
	grep "Content-Type: application/x-lzip" &&

	head -n 2 tmp |
	grep "Content-Disposition: inline; filename=.master.tar.lz."
'

test_expect_success LZIP 'strip off the header lines' '
	strip_headers <tmp >master.tar.lz
'

test_expect_success LZIP 'verify lzip format' '
	lzip --test master.tar.lz &&
	cp master.tar.lz /tmp/.
'

test_expect_success LZIP 'untar' '
	rm -rf master &&
	tar --lzip -xf master.tar.lz
'

test_expect_success LZIP 'count files' '
	ls master/ >output &&
	test_line_count = 5 output
'

test_expect_success LZIP 'verify untarred file-5' '
	grep "^5$" master/file-5 &&
	test_line_count = 1 master/file-5
'

if test -n "$(which xz 2>/dev/null)"; then
	test_set_prereq XZ
else
	say 'Skipping XZ validation tests: xz not found'
fi

test_expect_success XZ 'get foo/snapshot/master.tar.xz' '
	cgit_url "foo/snapshot/master.tar.xz" >tmp
'

test_expect_success XZ 'check html headers' '
	head -n 1 tmp |
	grep "Content-Type: application/x-xz" &&

	head -n 2 tmp |
	grep "Content-Disposition: inline; filename=.master.tar.xz."
'

test_expect_success XZ 'strip off the header lines' '
	strip_headers <tmp >master.tar.xz
'

test_expect_success XZ 'verify xz format' '
	xz --test master.tar.xz &&
	cp master.tar.xz /tmp/.
'

test_expect_success XZ 'untar' '
	rm -rf master &&
	tar --xz -xf master.tar.xz
'

test_expect_success XZ 'count files' '
	ls master/ >output &&
	test_line_count = 5 output
'

test_expect_success XZ 'verify untarred file-5' '
	grep "^5$" master/file-5 &&
	test_line_count = 1 master/file-5
'

if test -n "$(which zstd 2>/dev/null)"; then
	test_set_prereq ZSTD
else
	say 'Skipping ZSTD validation tests: zstd not found'
fi

test_expect_success ZSTD 'get foo/snapshot/master.tar.zst' '
	cgit_url "foo/snapshot/master.tar.zst" >tmp
'

test_expect_success ZSTD 'check html headers' '
	head -n 1 tmp |
	grep "Content-Type: application/x-zstd" &&

	head -n 2 tmp |
	grep "Content-Disposition: inline; filename=.master.tar.zst."
'

test_expect_success ZSTD 'strip off the header lines' '
	strip_headers <tmp >master.tar.zst
'

test_expect_success ZSTD 'verify zstd format' '
	zstd --test master.tar.zst &&
	cp master.tar.zst /tmp/.
'

test_expect_success ZSTD 'untar' '
	rm -rf master &&
	tar --zstd -xf master.tar.zst
'

test_expect_success ZSTD 'count files' '
	ls master/ >output &&
	test_line_count = 5 output
'

test_expect_success ZSTD 'verify untarred file-5' '
	grep "^5$" master/file-5 &&
	test_line_count = 1 master/file-5
'

test_expect_success 'get foo/snapshot/master.zip' '
	cgit_url "foo/snapshot/master.zip" >tmp
'

test_expect_success 'check HTML headers (zip)' '
	head -n 1 tmp |
	grep "Content-Type: application/x-zip" &&

	head -n 2 tmp |
	grep "Content-Disposition: inline; filename=.master.zip."
'

test_expect_success 'strip off the header lines (zip)' '
	strip_headers <tmp >master.zip
'

if test -n "$(which unzip 2>/dev/null)"; then
	test_set_prereq UNZIP
else
	say 'Skipping ZIP validation tests: unzip not found'
fi

test_expect_success UNZIP 'verify zip format' '
	unzip -t master.zip
'

test_expect_success UNZIP 'unzip' '
	rm -rf master &&
	unzip master.zip
'

test_expect_success UNZIP 'count files (zip)' '
	ls master/ >output &&
	test_line_count = 5 output
'

test_expect_success UNZIP 'verify unzipped file-5' '
	grep "^5$" master/file-5 &&
	test_line_count = 1 master/file-5
'

test_done
n> hash ~= unistd.crypt(post["password"], hash) then set_cookie("cgitauth", "") else -- One week expiration time local username = secure_value("username", post["username"], os.time() + 604800) set_cookie("cgitauth", username) end html("\n") return 0 end -- Returns 1 if the cookie is valid and 0 if it is not. function authenticate_cookie() accepted_users = lookup_users(cgit["repo"]) if accepted_users == nil then -- We return as valid if the repo is not protected. return 1 end local username = validate_value("username", get_cookie(http["cookie"], "cgitauth")) if username == nil or not accepted_users[username:lower()] then return 0 else return 1 end end -- Prints the html for the login form. function body() html("<h2>Authentication Required</h2>") html("<form method='post' action='") html_attr(cgit["login"]) html("'>") html("<input type='hidden' name='redirect' value='") html_attr(secure_value("redirect", cgit["url"], 0)) html("' />") html("<table>") html("<tr><td><label for='username'>Username:</label></td><td><input id='username' name='username' autofocus /></td></tr>") html("<tr><td><label for='password'>Password:</label></td><td><input id='password' name='password' type='password' /></td></tr>") html("<tr><td colspan='2'><input value='Login' type='submit' /></td></tr>") html("</table></form>") return 0 end -- -- -- Wrapper around filter API, exposing the http table, the cgit table, and the post table to the above functions. -- -- local actions = {} actions["authenticate-post"] = authenticate_post actions["authenticate-cookie"] = authenticate_cookie actions["body"] = body function filter_open(...) action = actions[select(1, ...)] http = {} http["cookie"] = select(2, ...) http["method"] = select(3, ...) http["query"] = select(4, ...) http["referer"] = select(5, ...) http["path"] = select(6, ...) http["host"] = select(7, ...) http["https"] = select(8, ...) cgit = {} cgit["repo"] = select(9, ...) cgit["page"] = select(10, ...) cgit["url"] = select(11, ...) cgit["login"] = select(12, ...) end function filter_close() return action() end function filter_write(str) post = parse_qs(str) end -- -- -- Utility functions based on keplerproject/wsapi. -- -- function url_decode(str) if not str then return "" end str = string.gsub(str, "+", " ") str = string.gsub(str, "%%(%x%x)", function(h) return string.char(tonumber(h, 16)) end) str = string.gsub(str, "\r\n", "\n") return str end function url_encode(str) if not str then return "" end str = string.gsub(str, "\n", "\r\n") str = string.gsub(str, "([^%w ])", function(c) return string.format("%%%02X", string.byte(c)) end) str = string.gsub(str, " ", "+") return str end function parse_qs(qs) local tab = {} for key, val in string.gmatch(qs, "([^&=]+)=([^&=]*)&?") do tab[url_decode(key)] = url_decode(val) end return tab end function get_cookie(cookies, name) cookies = string.gsub(";" .. cookies .. ";", "%s*;%s*", ";") return url_decode(string.match(cookies, ";" .. name .. "=(.-);")) end -- -- -- Cookie construction and validation helpers. -- -- local secret = nil -- Loads a secret from a file, creates a secret, or returns one from memory. function get_secret() if secret ~= nil then return secret end local secret_file = io.open(secret_filename, "r") if secret_file == nil then local old_umask = sysstat.umask(63) local temporary_filename = secret_filename .. ".tmp." .. crypto.hex(crypto.rand.bytes(16)) local temporary_file = io.open(temporary_filename, "w") if temporary_file == nil then os.exit(177) end temporary_file:write(crypto.hex(crypto.rand.bytes(32))) temporary_file:close() unistd.link(temporary_filename, secret_filename) -- Intentionally fails in the case that another process is doing the same. unistd.unlink(temporary_filename) sysstat.umask(old_umask) secret_file = io.open(secret_filename, "r") end if secret_file == nil then os.exit(177) end secret = secret_file:read() secret_file:close() if secret:len() ~= 64 then os.exit(177) end return secret end -- Returns value of cookie if cookie is valid. Otherwise returns nil. function validate_value(expected_field, cookie) local i = 0 local value = "" local field = "" local expiration = 0 local salt = "" local hmac = "" if cookie == nil or cookie:len() < 3 or cookie:sub(1, 1) == "|" then return nil end for component in string.gmatch(cookie, "[^|]+") do if i == 0 then field = component elseif i == 1 then value = component elseif i == 2 then expiration = tonumber(component) if expiration == nil then expiration = -1 end elseif i == 3 then salt = component elseif i == 4 then hmac = component else break end i = i + 1 end if hmac == nil or hmac:len() == 0 then return nil end -- Lua hashes strings, so these comparisons are time invariant. if hmac ~= crypto.hmac.digest("sha256", field .. "|" .. value .. "|" .. tostring(expiration) .. "|" .. salt, get_secret()) then return nil end if expiration == -1 or (expiration ~= 0 and expiration <= os.time()) then return nil end if url_decode(field) ~= expected_field then return nil end return url_decode(value) end function secure_value(field, value, expiration) if value == nil or value:len() <= 0 then return "" end local authstr = "" local salt = crypto.hex(crypto.rand.bytes(16)) value = url_encode(value) field = url_encode(field) authstr = field .. "|" .. value .. "|" .. tostring(expiration) .. "|" .. salt authstr = authstr .. "|" .. crypto.hmac.digest("sha256", authstr, get_secret()) return authstr end function set_cookie(cookie, value) html("Set-Cookie: " .. cookie .. "=" .. value .. "; HttpOnly") if http["https"] == "yes" or http["https"] == "on" or http["https"] == "1" then html("; secure") end html("\n") end function redirect_to(url) html("Status: 302 Redirect\n") html("Cache-Control: no-cache, no-store\n") html("Location: " .. url .. "\n") end function not_found() html("Status: 404 Not Found\n") html("Cache-Control: no-cache, no-store\n\n") end