/** * @license * Copyright 2019-2020 Balena Ltd. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ import { expect } from 'chai'; import * as _ from 'lodash'; import { promises as fs } from 'fs'; import * as path from 'path'; import { PathUtils } from '@balena/compose/dist/multibuild'; import * as sinon from 'sinon'; import { Readable } from 'stream'; import * as tar from 'tar-stream'; import { streamToBuffer } from 'tar-utils'; import { URL } from 'url'; import { diff } from 'deep-object-diff'; import { makeImageName } from '../build/utils/compose_ts'; import { stripIndent } from '../build/utils/lazy'; import type { BuilderMock } from './nock/builder-mock'; import type { DockerMock } from './nock/docker-mock'; import { cleanOutput, deepJsonParse, deepTemplateReplace, runCommand, } from './helpers'; import type { ExpectedTarStreamFile, ExpectedTarStreamFiles, ExpectedTarStreamFilesByService, } from './projects'; /** * Run a few chai.expect() test assertions on a tar stream/buffer produced by * the balena push, build and deploy commands, intercepted at HTTP level on * their way from the CLI to the Docker daemon or balenaCloud builders. * * @param tarRequestBody Intercepted buffer of tar stream to be sent to builders/Docker * @param expectedFiles Details of files expected to be found in the buffer * @param projectPath Path of test project that was tarred, to compare file contents */ export async function inspectTarStream( tarRequestBody: string | Buffer, expectedFiles: ExpectedTarStreamFiles, projectPath: string, ): Promise { // string to stream: https://stackoverflow.com/a/22085851 const sourceTarStream = new Readable(); sourceTarStream._read = () => undefined; sourceTarStream.push(tarRequestBody); sourceTarStream.push(null); const found: ExpectedTarStreamFiles = await new Promise((resolve, reject) => { const foundFiles: ExpectedTarStreamFiles = {}; const extract = tar.extract(); extract.on('error', reject); extract.on( 'entry', async (header: tar.Headers, stream: Readable, next: tar.Callback) => { try { expect(foundFiles).to.not.have.property(header.name); foundFiles[header.name] = { fileSize: header.size || 0, type: header.type, }; const expected = expectedFiles[header.name]; if (expected?.testStream) { await expected.testStream(header, stream, expected); } else { await defaultTestStream(header, stream, expected, projectPath); } } catch (err) { reject(err as Error); } next(); }, ); extract.once('finish', () => { resolve(foundFiles); }); sourceTarStream.on('error', reject); sourceTarStream.pipe(extract); }); const $expected = _.mapValues(expectedFiles, (v) => _.omit(v, 'testStream', 'contents'), ); try { expect($expected).to.deep.equal(found); } catch (e) { const diffStr = JSON.stringify( diff($expected, found), (_k, v) => (v === undefined ? 'undefined' : v), 4, ); console.error(`\nexpected vs. found diff:\n${diffStr}\n`); throw e; } } /** Check that a tar stream entry matches the project contents in the filesystem */ async function defaultTestStream( header: tar.Headers, stream: Readable, expected: ExpectedTarStreamFile | undefined, projectPath: string, ): Promise { let expectedContents: Buffer | undefined; if (expected?.contents) { expectedContents = Buffer.from(expected.contents); } if (header.name === '.balena/registry-secrets.json') { expectedContents = await fs.readFile( path.join(__dirname, 'test-data', 'projects', 'registry-secrets.json'), ); } const [buf, buf2] = await Promise.all([ streamToBuffer(stream), expectedContents || fs.readFile(path.join(projectPath, PathUtils.toNativePath(header.name))), ]); const msg = stripIndent` contents mismatch for tar stream entry "${header.name}" stream length=${buf.length}, filesystem length=${buf2.length}`; expect(buf.equals(buf2), msg).to.be.true; } /** Test a tar stream entry for the absence of Windows CRLF line breaks */ export async function expectStreamNoCRLF( _header: tar.Headers, stream: Readable, ): Promise { const buf = await streamToBuffer(stream); expect(buf.includes('\r\n')).to.be.false; } /** * Common test logic for the 'build' and 'deploy' commands */ export async function testDockerBuildStream(o: { commandLine: string; dockerMock: DockerMock; expectedFilesByService: ExpectedTarStreamFilesByService; expectedQueryParamsByService: { [service: string]: any[][] }; expectedErrorLines?: string[]; expectedExitCode?: number; expectedResponseLines: string[]; projectName?: string; // --projectName command line flag projectPath: string; responseCode: number; responseBody: string; services: string[]; // e.g. ['main'] or ['service1', 'service2'] tag?: string; // --tag command line flag }) { const expectedErrorLines = deepTemplateReplace(o.expectedErrorLines || [], o); const expectedResponseLines = deepTemplateReplace(o.expectedResponseLines, o); for (const service of o.services) { // tagPrefix is, for example, 'myApp' if the path is 'path/to/myApp' const projectName = o.projectName || path.basename(o.projectPath); const tag = makeImageName(projectName, service, o.tag); const expectedFiles = o.expectedFilesByService[service]; const expectedQueryParams = deepTemplateReplace( o.expectedQueryParamsByService[service], { ...o, tag }, ); const projectPath = service === 'main' ? o.projectPath : path.join(o.projectPath, service); o.dockerMock.expectPostBuild({ ...o, checkURI: (uri: string) => { const url = new URL(uri, 'http://test.net/'); const queryParams = Array.from(url.searchParams.entries()); expect(deepJsonParse(queryParams)).to.have.deep.members( deepJsonParse(expectedQueryParams), ); }, checkBuildRequestBody: (buildRequestBody: string) => inspectTarStream(buildRequestBody, expectedFiles, projectPath), tag, }); if (o.commandLine.startsWith('build')) { o.dockerMock.expectGetImages({ optional: true }); } } await resetDockerignoreCache(); const { exitCode, out, err } = await runCommand(o.commandLine); if (expectedErrorLines.length) { expect(cleanOutput(err, true)).to.include.members(expectedErrorLines); } else { expect(err).to.be.empty; } if (expectedResponseLines.length) { expect(cleanOutput(out, true)).to.include.members(expectedResponseLines); } else { expect(out).to.be.empty; } if (o.expectedExitCode != null) { if (process.env.BALENA_CLI_TEST_TYPE !== 'standalone') { // @ts-expect-error claims the typing doesn't match sinon.assert.calledWith(process.exit); } expect(o.expectedExitCode).to.equal(exitCode); } } /** * Common test logic for the 'push' command */ export async function testPushBuildStream(o: { commandLine: string; builderMock: BuilderMock; expectedFiles: ExpectedTarStreamFiles; expectedQueryParams: string[][]; expectedResponseLines: string[]; projectPath: string; responseCode: number; responseBody: string; }) { const expectedQueryParams = deepTemplateReplace(o.expectedQueryParams, o); const expectedResponseLines = deepTemplateReplace(o.expectedResponseLines, o); o.builderMock.expectPostBuild({ ...o, checkURI: (uri: string) => { const url = new URL(uri, 'http://test.net/'); const queryParams = Array.from(url.searchParams.entries()); expect(deepJsonParse(queryParams)).to.have.deep.members( deepJsonParse(expectedQueryParams), ); }, checkBuildRequestBody: (buildRequestBody) => inspectTarStream(buildRequestBody, o.expectedFiles, o.projectPath), }); await resetDockerignoreCache(); const { out, err } = await runCommand(o.commandLine); expect(err).to.be.empty; expect(cleanOutput(out, true)).to.include.members(expectedResponseLines); } export async function resetDockerignoreCache() { const rewire = await import('rewire'); if (process.env.BALENA_CLI_TEST_TYPE !== 'source') { return; } const ignorePath = '../build/utils/ignore'; delete require.cache[require.resolve(ignorePath)]; const ignoreMod = rewire(ignorePath); ignoreMod.__set__('dockerignoreByService', null); }