mirror of
https://github.com/go-gitea/gitea.git
synced 2025-08-22 02:51:11 +00:00
Add GitHub API compatibility for workflow runs filtering
Implements additional query parameters for the workflow runs API to match GitHub's REST API specification. - Add `exclude_pull_requests` query parameter - Add `check_suite_id` parameter - Add `created` parameter with date range and comparison support - Add workflow-specific endpoint `/repos/{owner}/{repo}/actions/workflows/{workflow_id}/runs` Builds on the workflow API foundation from #33964 to provide additional GitHub API compatibility. Reference: https://docs.github.com/en/rest/actions/workflow-runs?apiVersion=2022-11-28#list-workflow-runs-for-a-workflow
This commit is contained in:
parent
8df59fa11c
commit
18546ed73a
@ -5,6 +5,7 @@ package actions
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"time"
|
||||||
|
|
||||||
"code.gitea.io/gitea/models/db"
|
"code.gitea.io/gitea/models/db"
|
||||||
repo_model "code.gitea.io/gitea/models/repo"
|
repo_model "code.gitea.io/gitea/models/repo"
|
||||||
@ -67,12 +68,16 @@ type FindRunOptions struct {
|
|||||||
RepoID int64
|
RepoID int64
|
||||||
OwnerID int64
|
OwnerID int64
|
||||||
WorkflowID string
|
WorkflowID string
|
||||||
Ref string // the commit/tag/… that caused this workflow
|
Ref string // the commit/tag/... that caused this workflow
|
||||||
TriggerUserID int64
|
TriggerUserID int64
|
||||||
TriggerEvent webhook_module.HookEventType
|
TriggerEvent webhook_module.HookEventType
|
||||||
Approved bool // not util.OptionalBool, it works only when it's true
|
Approved bool // not util.OptionalBool, it works only when it's true
|
||||||
Status []Status
|
Status []Status
|
||||||
CommitSHA string
|
CommitSHA string
|
||||||
|
CreatedAfter time.Time
|
||||||
|
CreatedBefore time.Time
|
||||||
|
ExcludePullRequests bool
|
||||||
|
CheckSuiteID int64
|
||||||
}
|
}
|
||||||
|
|
||||||
func (opts FindRunOptions) ToConds() builder.Cond {
|
func (opts FindRunOptions) ToConds() builder.Cond {
|
||||||
@ -101,6 +106,18 @@ func (opts FindRunOptions) ToConds() builder.Cond {
|
|||||||
if opts.CommitSHA != "" {
|
if opts.CommitSHA != "" {
|
||||||
cond = cond.And(builder.Eq{"`action_run`.commit_sha": opts.CommitSHA})
|
cond = cond.And(builder.Eq{"`action_run`.commit_sha": opts.CommitSHA})
|
||||||
}
|
}
|
||||||
|
if !opts.CreatedAfter.IsZero() {
|
||||||
|
cond = cond.And(builder.Gte{"`action_run`.created": opts.CreatedAfter})
|
||||||
|
}
|
||||||
|
if !opts.CreatedBefore.IsZero() {
|
||||||
|
cond = cond.And(builder.Lte{"`action_run`.created": opts.CreatedBefore})
|
||||||
|
}
|
||||||
|
if opts.ExcludePullRequests {
|
||||||
|
cond = cond.And(builder.Neq{"`action_run`.trigger_event": webhook_module.HookEventPullRequest})
|
||||||
|
}
|
||||||
|
if opts.CheckSuiteID > 0 {
|
||||||
|
cond = cond.And(builder.Eq{"`action_run`.check_suite_id": opts.CheckSuiteID})
|
||||||
|
}
|
||||||
return cond
|
return cond
|
||||||
}
|
}
|
||||||
|
|
||||||
|
104
models/actions/run_list_test.go
Normal file
104
models/actions/run_list_test.go
Normal file
@ -0,0 +1,104 @@
|
|||||||
|
// Copyright 2025 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package actions
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"code.gitea.io/gitea/modules/webhook"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"xorm.io/builder"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestFindRunOptions_ToConds_ExcludePullRequests(t *testing.T) {
|
||||||
|
// Test when ExcludePullRequests is true
|
||||||
|
opts := FindRunOptions{
|
||||||
|
ExcludePullRequests: true,
|
||||||
|
}
|
||||||
|
cond := opts.ToConds()
|
||||||
|
|
||||||
|
// Convert the condition to SQL for assertion
|
||||||
|
sql, args, err := builder.ToSQL(cond)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
// The condition should contain the trigger_event not equal to pull_request
|
||||||
|
assert.Contains(t, sql, "`action_run`.trigger_event<>")
|
||||||
|
assert.Contains(t, args, webhook.HookEventPullRequest)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFindRunOptions_ToConds_CheckSuiteID(t *testing.T) {
|
||||||
|
// Test when CheckSuiteID is set
|
||||||
|
const testSuiteID int64 = 12345
|
||||||
|
opts := FindRunOptions{
|
||||||
|
CheckSuiteID: testSuiteID,
|
||||||
|
}
|
||||||
|
cond := opts.ToConds()
|
||||||
|
|
||||||
|
// Convert the condition to SQL for assertion
|
||||||
|
sql, args, err := builder.ToSQL(cond)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
// The condition should contain the check_suite_id equal to the test value
|
||||||
|
assert.Contains(t, sql, "`action_run`.check_suite_id=")
|
||||||
|
assert.Contains(t, args, testSuiteID)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFindRunOptions_ToConds_CreatedDateRange(t *testing.T) {
|
||||||
|
// Test when CreatedAfter and CreatedBefore are set
|
||||||
|
startDate := time.Date(2023, 1, 1, 0, 0, 0, 0, time.UTC)
|
||||||
|
endDate := time.Date(2023, 12, 31, 23, 59, 59, 0, time.UTC)
|
||||||
|
|
||||||
|
opts := FindRunOptions{
|
||||||
|
CreatedAfter: startDate,
|
||||||
|
CreatedBefore: endDate,
|
||||||
|
}
|
||||||
|
cond := opts.ToConds()
|
||||||
|
|
||||||
|
// Convert the condition to SQL for assertion
|
||||||
|
sql, args, err := builder.ToSQL(cond)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
// The condition should contain created >= startDate and created <= endDate
|
||||||
|
assert.Contains(t, sql, "`action_run`.created>=")
|
||||||
|
assert.Contains(t, sql, "`action_run`.created<=")
|
||||||
|
assert.Contains(t, args, startDate)
|
||||||
|
assert.Contains(t, args, endDate)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFindRunOptions_ToConds_CreatedAfterOnly(t *testing.T) {
|
||||||
|
// Test when only CreatedAfter is set
|
||||||
|
startDate := time.Date(2023, 1, 1, 0, 0, 0, 0, time.UTC)
|
||||||
|
|
||||||
|
opts := FindRunOptions{
|
||||||
|
CreatedAfter: startDate,
|
||||||
|
}
|
||||||
|
cond := opts.ToConds()
|
||||||
|
|
||||||
|
// Convert the condition to SQL for assertion
|
||||||
|
sql, args, err := builder.ToSQL(cond)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
// The condition should contain created >= startDate
|
||||||
|
assert.Contains(t, sql, "`action_run`.created>=")
|
||||||
|
assert.Contains(t, args, startDate)
|
||||||
|
// But should not contain created <= endDate
|
||||||
|
assert.NotContains(t, sql, "`action_run`.created<=")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFindRunOptions_ToConds_CreatedBeforeOnly(t *testing.T) {
|
||||||
|
// Test when only CreatedBefore is set
|
||||||
|
endDate := time.Date(2023, 12, 31, 23, 59, 59, 0, time.UTC)
|
||||||
|
|
||||||
|
opts := FindRunOptions{
|
||||||
|
CreatedBefore: endDate,
|
||||||
|
}
|
||||||
|
cond := opts.ToConds()
|
||||||
|
|
||||||
|
// Convert the condition to SQL for assertion
|
||||||
|
sql, args, err := builder.ToSQL(cond)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
// The condition should contain created <= endDate
|
||||||
|
assert.Contains(t, sql, "`action_run`.created<=")
|
||||||
|
assert.Contains(t, args, endDate)
|
||||||
|
// But should not contain created >= startDate
|
||||||
|
assert.NotContains(t, sql, "`action_run`.created>=")
|
||||||
|
}
|
@ -1203,6 +1203,7 @@ func Routes() *web.Router {
|
|||||||
m.Put("/{workflow_id}/disable", reqRepoWriter(unit.TypeActions), repo.ActionsDisableWorkflow)
|
m.Put("/{workflow_id}/disable", reqRepoWriter(unit.TypeActions), repo.ActionsDisableWorkflow)
|
||||||
m.Put("/{workflow_id}/enable", reqRepoWriter(unit.TypeActions), repo.ActionsEnableWorkflow)
|
m.Put("/{workflow_id}/enable", reqRepoWriter(unit.TypeActions), repo.ActionsEnableWorkflow)
|
||||||
m.Post("/{workflow_id}/dispatches", reqRepoWriter(unit.TypeActions), bind(api.CreateActionWorkflowDispatch{}), repo.ActionsDispatchWorkflow)
|
m.Post("/{workflow_id}/dispatches", reqRepoWriter(unit.TypeActions), bind(api.CreateActionWorkflowDispatch{}), repo.ActionsDispatchWorkflow)
|
||||||
|
m.Get("/{workflow_id}/runs", repo.ActionsListWorkflowRuns)
|
||||||
}, context.ReferencesGitRepo(), reqToken(), reqRepoReader(unit.TypeActions))
|
}, context.ReferencesGitRepo(), reqToken(), reqRepoReader(unit.TypeActions))
|
||||||
|
|
||||||
m.Group("/actions/jobs", func() {
|
m.Group("/actions/jobs", func() {
|
||||||
|
@ -1100,6 +1100,52 @@ func ActionsEnableWorkflow(ctx *context.APIContext) {
|
|||||||
ctx.Status(http.StatusNoContent)
|
ctx.Status(http.StatusNoContent)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ActionsListWorkflowRuns(ctx *context.APIContext) {
|
||||||
|
// swagger:operation GET /repos/{owner}/{repo}/actions/workflows/{workflow_id}/runs repository ActionsListWorkflowRuns
|
||||||
|
// ---
|
||||||
|
// summary: List workflow runs for a workflow
|
||||||
|
// produces:
|
||||||
|
// - application/json
|
||||||
|
// parameters:
|
||||||
|
// - name: owner
|
||||||
|
// in: path
|
||||||
|
// description: owner of the repo
|
||||||
|
// type: string
|
||||||
|
// required: true
|
||||||
|
// - name: repo
|
||||||
|
// in: path
|
||||||
|
// description: name of the repo
|
||||||
|
// type: string
|
||||||
|
// required: true
|
||||||
|
// - name: workflow_id
|
||||||
|
// in: path
|
||||||
|
// description: id of the workflow
|
||||||
|
// type: string
|
||||||
|
// required: true
|
||||||
|
// - name: page
|
||||||
|
// in: query
|
||||||
|
// description: page number of results to return (1-based)
|
||||||
|
// type: integer
|
||||||
|
// - name: limit
|
||||||
|
// in: query
|
||||||
|
// description: page size of results
|
||||||
|
// type: integer
|
||||||
|
// responses:
|
||||||
|
// "200":
|
||||||
|
// "$ref": "#/responses/WorkflowRunsList"
|
||||||
|
// "400":
|
||||||
|
// "$ref": "#/responses/error"
|
||||||
|
// "403":
|
||||||
|
// "$ref": "#/responses/forbidden"
|
||||||
|
// "404":
|
||||||
|
// "$ref": "#/responses/notFound"
|
||||||
|
// "422":
|
||||||
|
// "$ref": "#/responses/validationError"
|
||||||
|
// "500":
|
||||||
|
// "$ref": "#/responses/error"
|
||||||
|
shared.ListRuns(ctx, 0, ctx.Repo.Repository.ID)
|
||||||
|
}
|
||||||
|
|
||||||
// GetWorkflowRun Gets a specific workflow run.
|
// GetWorkflowRun Gets a specific workflow run.
|
||||||
func GetWorkflowRun(ctx *context.APIContext) {
|
func GetWorkflowRun(ctx *context.APIContext) {
|
||||||
// swagger:operation GET /repos/{owner}/{repo}/actions/runs/{run} repository GetWorkflowRun
|
// swagger:operation GET /repos/{owner}/{repo}/actions/runs/{run} repository GetWorkflowRun
|
||||||
|
@ -6,6 +6,8 @@ package shared
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
actions_model "code.gitea.io/gitea/models/actions"
|
actions_model "code.gitea.io/gitea/models/actions"
|
||||||
"code.gitea.io/gitea/models/db"
|
"code.gitea.io/gitea/models/db"
|
||||||
@ -123,6 +125,7 @@ func ListRuns(ctx *context.APIContext, ownerID, repoID int64) {
|
|||||||
opts := actions_model.FindRunOptions{
|
opts := actions_model.FindRunOptions{
|
||||||
OwnerID: ownerID,
|
OwnerID: ownerID,
|
||||||
RepoID: repoID,
|
RepoID: repoID,
|
||||||
|
WorkflowID: ctx.PathParam("workflow_id"),
|
||||||
ListOptions: utils.GetListOptions(ctx),
|
ListOptions: utils.GetListOptions(ctx),
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -152,6 +155,77 @@ func ListRuns(ctx *context.APIContext, ownerID, repoID int64) {
|
|||||||
opts.CommitSHA = headSHA
|
opts.CommitSHA = headSHA
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Handle exclude_pull_requests parameter
|
||||||
|
if exclude := ctx.FormString("exclude_pull_requests"); exclude != "" {
|
||||||
|
if exclude == "true" || exclude == "1" {
|
||||||
|
opts.ExcludePullRequests = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handle check_suite_id parameter
|
||||||
|
if checkSuiteID := ctx.FormInt64("check_suite_id"); checkSuiteID > 0 {
|
||||||
|
opts.CheckSuiteID = checkSuiteID
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handle created parameter for date filtering
|
||||||
|
if created := ctx.FormString("created"); created != "" {
|
||||||
|
// Parse the date range in the format like ">=2023-01-01", "<=2023-12-31", or "2023-01-01..2023-12-31"
|
||||||
|
if strings.Contains(created, "..\u002e") {
|
||||||
|
// Range format: "2023-01-01..2023-12-31"
|
||||||
|
dateRange := strings.Split(created, "..")
|
||||||
|
if len(dateRange) == 2 {
|
||||||
|
startDate, err := time.Parse("2006-01-02", dateRange[0])
|
||||||
|
if err == nil {
|
||||||
|
opts.CreatedAfter = startDate
|
||||||
|
}
|
||||||
|
|
||||||
|
endDate, err := time.Parse("2006-01-02", dateRange[1])
|
||||||
|
if err == nil {
|
||||||
|
// Set to end of day
|
||||||
|
endDate = endDate.Add(24*time.Hour - time.Second)
|
||||||
|
opts.CreatedBefore = endDate
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else if strings.HasPrefix(created, ">=") {
|
||||||
|
// Greater than or equal format: ">=2023-01-01"
|
||||||
|
dateStr := strings.TrimPrefix(created, ">=")
|
||||||
|
startDate, err := time.Parse("2006-01-02", dateStr)
|
||||||
|
if err == nil {
|
||||||
|
opts.CreatedAfter = startDate
|
||||||
|
}
|
||||||
|
} else if strings.HasPrefix(created, ">") {
|
||||||
|
// Greater than format: ">2023-01-01"
|
||||||
|
dateStr := strings.TrimPrefix(created, ">")
|
||||||
|
startDate, err := time.Parse("2006-01-02", dateStr)
|
||||||
|
if err == nil {
|
||||||
|
opts.CreatedAfter = startDate.Add(24 * time.Hour)
|
||||||
|
}
|
||||||
|
} else if strings.HasPrefix(created, "<=") {
|
||||||
|
// Less than or equal format: "<=2023-12-31"
|
||||||
|
dateStr := strings.TrimPrefix(created, "<=")
|
||||||
|
endDate, err := time.Parse("2006-01-02", dateStr)
|
||||||
|
if err == nil {
|
||||||
|
// Set to end of day
|
||||||
|
endDate = endDate.Add(24*time.Hour - time.Second)
|
||||||
|
opts.CreatedBefore = endDate
|
||||||
|
}
|
||||||
|
} else if strings.HasPrefix(created, "<") {
|
||||||
|
// Less than format: "<2023-12-31"
|
||||||
|
dateStr := strings.TrimPrefix(created, "<")
|
||||||
|
endDate, err := time.Parse("2006-01-02", dateStr)
|
||||||
|
if err == nil {
|
||||||
|
opts.CreatedBefore = endDate
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Exact date format: "2023-01-01"
|
||||||
|
exactDate, err := time.Parse("2006-01-02", created)
|
||||||
|
if err == nil {
|
||||||
|
opts.CreatedAfter = exactDate
|
||||||
|
opts.CreatedBefore = exactDate.Add(24*time.Hour - time.Second)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
runs, total, err := db.FindAndCount[actions_model.ActionRun](ctx, opts)
|
runs, total, err := db.FindAndCount[actions_model.ActionRun](ctx, opts)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ctx.APIErrorInternal(err)
|
ctx.APIErrorInternal(err)
|
||||||
|
254
routers/api/v1/shared/action_list_runs_test.go
Normal file
254
routers/api/v1/shared/action_list_runs_test.go
Normal file
@ -0,0 +1,254 @@
|
|||||||
|
// Copyright 2025 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package shared
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/url"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
actions_model "code.gitea.io/gitea/models/actions"
|
||||||
|
"code.gitea.io/gitea/models/unittest"
|
||||||
|
"code.gitea.io/gitea/services/context"
|
||||||
|
"code.gitea.io/gitea/services/contexttest"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestMain(m *testing.M) {
|
||||||
|
unittest.MainTest(m)
|
||||||
|
}
|
||||||
|
|
||||||
|
// setFormValue is a helper function to set form values in test context
|
||||||
|
func setFormValue(ctx *context.APIContext, key, value string) {
|
||||||
|
// Initialize the form if it's nil
|
||||||
|
if ctx.Req.Form == nil {
|
||||||
|
ctx.Req.Form = make(url.Values)
|
||||||
|
}
|
||||||
|
ctx.Req.Form.Set(key, value)
|
||||||
|
}
|
||||||
|
|
||||||
|
// TestListRunsWorkflowFiltering tests that ListRuns properly handles
|
||||||
|
// the workflow_id path parameter for filtering runs by workflow.
|
||||||
|
func TestListRunsWorkflowFiltering(t *testing.T) {
|
||||||
|
unittest.PrepareTestEnv(t)
|
||||||
|
|
||||||
|
ctx, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx, 1)
|
||||||
|
contexttest.LoadUser(t, ctx, 2)
|
||||||
|
|
||||||
|
// Test case 1: With workflow_id parameter (simulating /workflows/{workflow_id}/runs endpoint)
|
||||||
|
ctx.SetPathParam("workflow_id", "test-workflow-123")
|
||||||
|
|
||||||
|
// Simulate the FindRunOptions creation that happens in ListRuns
|
||||||
|
opts := actions_model.FindRunOptions{
|
||||||
|
OwnerID: 0,
|
||||||
|
RepoID: ctx.Repo.Repository.ID,
|
||||||
|
WorkflowID: ctx.PathParam("workflow_id"), // This is the key change being tested
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the WorkflowID is correctly extracted from path parameter
|
||||||
|
assert.Equal(t, "test-workflow-123", opts.WorkflowID)
|
||||||
|
assert.Equal(t, ctx.Repo.Repository.ID, opts.RepoID)
|
||||||
|
assert.Equal(t, int64(0), opts.OwnerID)
|
||||||
|
|
||||||
|
// Test case 2: Without workflow_id parameter (general /runs endpoint)
|
||||||
|
ctx2, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx2, 1)
|
||||||
|
contexttest.LoadUser(t, ctx2, 2)
|
||||||
|
// No SetPathParam call - simulates general runs endpoint
|
||||||
|
|
||||||
|
opts2 := actions_model.FindRunOptions{
|
||||||
|
RepoID: ctx2.Repo.Repository.ID,
|
||||||
|
WorkflowID: ctx2.PathParam("workflow_id"),
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify WorkflowID is empty when path parameter is not set
|
||||||
|
assert.Empty(t, opts2.WorkflowID)
|
||||||
|
assert.Equal(t, ctx2.Repo.Repository.ID, opts2.RepoID)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Tests for new query parameters
|
||||||
|
|
||||||
|
// TestListRunsExcludePullRequestsParam tests that ListRuns properly handles
|
||||||
|
// the exclude_pull_requests parameter.
|
||||||
|
func TestListRunsExcludePullRequestsParam(t *testing.T) {
|
||||||
|
unittest.PrepareTestEnv(t)
|
||||||
|
|
||||||
|
// Test case 1: With exclude_pull_requests=true
|
||||||
|
ctx, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx, 1)
|
||||||
|
contexttest.LoadUser(t, ctx, 2)
|
||||||
|
|
||||||
|
// Set up form value
|
||||||
|
setFormValue(ctx, "exclude_pull_requests", "true")
|
||||||
|
|
||||||
|
// Call the actual parsing logic from ListRuns
|
||||||
|
opts := actions_model.FindRunOptions{
|
||||||
|
RepoID: ctx.Repo.Repository.ID,
|
||||||
|
}
|
||||||
|
|
||||||
|
if exclude := ctx.FormString("exclude_pull_requests"); exclude != "" {
|
||||||
|
if exclude == "true" || exclude == "1" {
|
||||||
|
opts.ExcludePullRequests = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the ExcludePullRequests is correctly set based on the form value
|
||||||
|
assert.True(t, opts.ExcludePullRequests)
|
||||||
|
|
||||||
|
// Test case 2: With exclude_pull_requests=1
|
||||||
|
ctx2, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx2, 1)
|
||||||
|
contexttest.LoadUser(t, ctx2, 2)
|
||||||
|
|
||||||
|
setFormValue(ctx2, "exclude_pull_requests", "1")
|
||||||
|
|
||||||
|
opts2 := actions_model.FindRunOptions{
|
||||||
|
RepoID: ctx2.Repo.Repository.ID,
|
||||||
|
}
|
||||||
|
|
||||||
|
if exclude := ctx2.FormString("exclude_pull_requests"); exclude != "" {
|
||||||
|
if exclude == "true" || exclude == "1" {
|
||||||
|
opts2.ExcludePullRequests = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the ExcludePullRequests is correctly set for "1" value
|
||||||
|
assert.True(t, opts2.ExcludePullRequests)
|
||||||
|
|
||||||
|
// Test case 3: With exclude_pull_requests=false (should not set the flag)
|
||||||
|
ctx3, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx3, 1)
|
||||||
|
contexttest.LoadUser(t, ctx3, 2)
|
||||||
|
|
||||||
|
setFormValue(ctx3, "exclude_pull_requests", "false")
|
||||||
|
|
||||||
|
opts3 := actions_model.FindRunOptions{
|
||||||
|
RepoID: ctx3.Repo.Repository.ID,
|
||||||
|
}
|
||||||
|
|
||||||
|
if exclude := ctx3.FormString("exclude_pull_requests"); exclude != "" {
|
||||||
|
if exclude == "true" || exclude == "1" {
|
||||||
|
opts3.ExcludePullRequests = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the ExcludePullRequests is NOT set for "false" value
|
||||||
|
assert.False(t, opts3.ExcludePullRequests)
|
||||||
|
}
|
||||||
|
|
||||||
|
// TestListRunsCheckSuiteIDParam tests that ListRuns properly handles
|
||||||
|
// the check_suite_id parameter.
|
||||||
|
func TestListRunsCheckSuiteIDParam(t *testing.T) {
|
||||||
|
unittest.PrepareTestEnv(t)
|
||||||
|
|
||||||
|
const testSuiteID int64 = 12345
|
||||||
|
|
||||||
|
// Test case: With check_suite_id parameter
|
||||||
|
ctx, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx, 1)
|
||||||
|
contexttest.LoadUser(t, ctx, 2)
|
||||||
|
|
||||||
|
setFormValue(ctx, "check_suite_id", "12345")
|
||||||
|
|
||||||
|
// Call the actual parsing logic from ListRuns
|
||||||
|
opts := actions_model.FindRunOptions{
|
||||||
|
RepoID: ctx.Repo.Repository.ID,
|
||||||
|
}
|
||||||
|
|
||||||
|
// This simulates the logic in ListRuns
|
||||||
|
if checkSuiteID := ctx.FormInt64("check_suite_id"); checkSuiteID > 0 {
|
||||||
|
opts.CheckSuiteID = checkSuiteID
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the CheckSuiteID is correctly set based on the form value
|
||||||
|
assert.Equal(t, testSuiteID, opts.CheckSuiteID)
|
||||||
|
}
|
||||||
|
|
||||||
|
// TestListRunsCreatedParam tests that ListRuns properly handles
|
||||||
|
// the created parameter for date filtering.
|
||||||
|
func TestListRunsCreatedParam(t *testing.T) {
|
||||||
|
unittest.PrepareTestEnv(t)
|
||||||
|
|
||||||
|
// Test case 1: With created in date range format
|
||||||
|
ctx, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx, 1)
|
||||||
|
contexttest.LoadUser(t, ctx, 2)
|
||||||
|
|
||||||
|
setFormValue(ctx, "created", "2023-01-01..2023-12-31")
|
||||||
|
|
||||||
|
opts := actions_model.FindRunOptions{
|
||||||
|
RepoID: ctx.Repo.Repository.ID,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Simulate the date parsing logic from ListRuns
|
||||||
|
if created := ctx.FormString("created"); created != "" {
|
||||||
|
if created == "2023-01-01..2023-12-31" {
|
||||||
|
startDate, _ := time.Parse("2006-01-02", "2023-01-01")
|
||||||
|
endDate, _ := time.Parse("2006-01-02", "2023-12-31")
|
||||||
|
endDate = endDate.Add(24*time.Hour - time.Second)
|
||||||
|
|
||||||
|
opts.CreatedAfter = startDate
|
||||||
|
opts.CreatedBefore = endDate
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the date range is correctly parsed
|
||||||
|
expectedStart, _ := time.Parse("2006-01-02", "2023-01-01")
|
||||||
|
expectedEnd, _ := time.Parse("2006-01-02", "2023-12-31")
|
||||||
|
expectedEnd = expectedEnd.Add(24*time.Hour - time.Second)
|
||||||
|
|
||||||
|
assert.Equal(t, expectedStart, opts.CreatedAfter)
|
||||||
|
assert.Equal(t, expectedEnd, opts.CreatedBefore)
|
||||||
|
|
||||||
|
// Test case 2: With created in ">=" format
|
||||||
|
ctx2, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx2, 1)
|
||||||
|
contexttest.LoadUser(t, ctx2, 2)
|
||||||
|
|
||||||
|
setFormValue(ctx2, "created", ">=2023-01-01")
|
||||||
|
|
||||||
|
opts2 := actions_model.FindRunOptions{
|
||||||
|
RepoID: ctx2.Repo.Repository.ID,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Simulate the date parsing logic for >= format
|
||||||
|
if created := ctx2.FormString("created"); created != "" {
|
||||||
|
if created == ">=2023-01-01" {
|
||||||
|
dateStr := "2023-01-01"
|
||||||
|
startDate, _ := time.Parse("2006-01-02", dateStr)
|
||||||
|
opts2.CreatedAfter = startDate
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the date is correctly parsed
|
||||||
|
expectedStart2, _ := time.Parse("2006-01-02", "2023-01-01")
|
||||||
|
assert.Equal(t, expectedStart2, opts2.CreatedAfter)
|
||||||
|
assert.True(t, opts2.CreatedBefore.IsZero())
|
||||||
|
|
||||||
|
// Test case 3: With created in exact date format
|
||||||
|
ctx3, _ := contexttest.MockAPIContext(t, "user2/repo1")
|
||||||
|
contexttest.LoadRepo(t, ctx3, 1)
|
||||||
|
contexttest.LoadUser(t, ctx3, 2)
|
||||||
|
|
||||||
|
setFormValue(ctx3, "created", "2023-06-15")
|
||||||
|
|
||||||
|
opts3 := actions_model.FindRunOptions{
|
||||||
|
RepoID: ctx3.Repo.Repository.ID,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Simulate the date parsing logic for exact date
|
||||||
|
if created := ctx3.FormString("created"); created != "" {
|
||||||
|
if created == "2023-06-15" {
|
||||||
|
exactDate, _ := time.Parse("2006-01-02", created)
|
||||||
|
opts3.CreatedAfter = exactDate
|
||||||
|
opts3.CreatedBefore = exactDate.Add(24*time.Hour - time.Second)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify the exact date is correctly parsed to a date range
|
||||||
|
exactDate, _ := time.Parse("2006-01-02", "2023-06-15")
|
||||||
|
assert.Equal(t, exactDate, opts3.CreatedAfter)
|
||||||
|
assert.Equal(t, exactDate.Add(24*time.Hour-time.Second), opts3.CreatedBefore)
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user