Alien-Base-ModuleBuild

 view release on metacpan or  search on metacpan

t/alien_base_modulebuild_repository.t  view on Meta::CPAN

use Test2::V0 -no_srand => 1;
use Alien::Base::ModuleBuild::Repository;
use File::chdir;
use Path::Tiny qw( path );
use Capture::Tiny qw( capture_stderr );

my $network_fetch = 0;
my $secure_fetch = 1;
@INC = map { path($_)->absolute->stringify } @INC;

# This test will not pass with digest required.  It does not download anything
# off the internet.
$ENV{ALIEN_DOWNLOAD_RULE} = 'warn'              if defined $ENV{ALIEN_DOWNLOAD_RULE} && $ENV{ALIEN_DOWNLOAD_RULE} eq 'digest';
$ENV{ALIEN_DOWNLOAD_RULE} = 'digest_or_encrypt' if defined $ENV{ALIEN_DOWNLOAD_RULE} && $ENV{ALIEN_DOWNLOAD_RULE} eq 'digest_and_encrypt';

my $default = {
  protocol => 'test',
  host     => 'ftp.gnu.org',
  location => '/gnu/gsl',
};

subtest 'alien_install_network' => sub {

  local $ENV{ALIEN_INSTALL_NETWORK};
  delete $ENV{ALIEN_INSTALL_NETWORK};

  $network_fetch = 1;

  ok(lives { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe }, 'default') or diag($@);

  $ENV{ALIEN_INSTALL_NETWORK} = 1;

  ok(lives { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe }, 'override 1') or diag($@);

  $ENV{ALIEN_INSTALL_NETWORK} = 0;

  is(
    dies { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
    match qr/network fetch is disabled via ALIEN_INSTALL_NETWORK/,
    'override 0',
  );

  $network_fetch = 0;

};

subtest 'alien_download_rule' => sub {

  subtest 'warn' => sub {

    local $ENV{ALIEN_DOWNLOAD_RULE} = 'warn';
    is(
      Alien::Base::ModuleBuild->alien_download_rule, 'warn',
    );

    my @warnings;

    local $SIG{__WARN__} = sub {
      my($message) = @_;
      if($message =~ /^(!!! NOTICE OF FUTURE CHANGE IN BEHAVIOR !!!|A future version of Alien::Base::ModuleBuild)/)
      {
        push @warnings, $message
      }
      else
      {
        warn $message;
      }
    };

    @warnings = ();
    $secure_fetch = 1;
    Alien::Base::ModuleBuild::Repository::Test->new($default)->probe;

    is
      \@warnings,
      [];

    @warnings = ();
    $secure_fetch = 0;
    Alien::Base::ModuleBuild::Repository::Test->new($default)->probe;

    is
      \@warnings,
      array {
        item match qr/^!!! NOTICE OF FUTURE CHANGE IN BEHAVIOR !!!/;
        item match qr/^A future version of Alien::Base::ModuleBuild will die here by default with this exception: File fetch is insecure and has no digest\.  Required by ALIEN_DOWNLOAD_RULE=digest_or_encrypt\./;
        item match qr/^!!! NOTICE OF FUTURE CHANGE IN BEHAVIOR !!!/;
        end;
      };

    @warnings = ();
    local $default->{sha1} = 'xxx';
    local $default->{exact_filename} = 'gsl-1.9.tar.gz.sig';
    local $default->{exact_version}  = 1.9;
    Alien::Base::ModuleBuild::Repository::Test->new($default)->probe;

    is
      \@warnings,
      [];

  };

  subtest 'digest' => sub {

    local $ENV{ALIEN_DOWNLOAD_RULE} = 'digest';
    is(
      Alien::Base::ModuleBuild->alien_download_rule, 'digest',
    );

    $secure_fetch = 0;

    is(
      dies { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
      match qr/^File fetch has no digest\.  Required by ALIEN_DOWNLOAD_RULE=digest\./,
    );

    local $default->{sha1} = 'xxx';
    local $default->{exact_filename} = 'gsl-1.9.tar.gz.sig';
    local $default->{exact_version}  = 1.9;

    ok(
      lives { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
    ) or diag($@);

  };

  subtest 'encrypt' => sub {

    local $ENV{ALIEN_DOWNLOAD_RULE} = 'encrypt';
    is(
      Alien::Base::ModuleBuild->alien_download_rule, 'encrypt',
    );

    $secure_fetch = 0;

    is(
      dies { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
      match qr/^File fetch is insecure\.  Secure fetch required by ALIEN_DOWNLOAD_RULE=encrypt\./,
    );

    $secure_fetch = 1;

    ok(
      lives { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
    ) or diag($@);

  };

  subtest 'digest_or_encrypt' => sub {

    local $ENV{ALIEN_DOWNLOAD_RULE} = 'digest_or_encrypt';
    is(
      Alien::Base::ModuleBuild->alien_download_rule, 'digest_or_encrypt',
    );

    $secure_fetch = 0;

    is(
      dies { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
      match qr/^File fetch is insecure and has no digest\.  Required by ALIEN_DOWNLOAD_RULE=digest_or_encrypt\./,
    );

    $secure_fetch = 1;

    ok(
      lives { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
    ) or diag($@);

    $secure_fetch = 0;
    local $default->{sha1} = 'xxx';
    local $default->{exact_filename} = 'gsl-1.9.tar.gz.sig';
    local $default->{exact_version}  = 1.9;

    ok(
      lives { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
    ) or diag($@);

    $secure_fetch = 1;

    ok(
      lives { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
    ) or diag($@);

  };

  subtest 'digest_and_encrypt' => sub {

    local $ENV{ALIEN_DOWNLOAD_RULE} = 'digest_and_encrypt';
    is(
      Alien::Base::ModuleBuild->alien_download_rule, 'digest_and_encrypt',
    );

    $secure_fetch = 0;

    is(
      dies { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
      match qr/^File fetch is insecure and has no digest\.  Both are required by ALIEN_DOWNLOAD_RULE=digest_and_encrypt\./,
    );

    $secure_fetch = 1;

    is(
      dies { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
      match qr/^File fetch is insecure and has no digest\.  Both are required by ALIEN_DOWNLOAD_RULE=digest_and_encrypt\./,
    );

    $secure_fetch = 0;
    local $default->{sha1} = 'xxx';
    local $default->{exact_filename} = 'gsl-1.9.tar.gz.sig';
    local $default->{exact_version}  = 1.9;

    is(
      dies { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
      match qr/^File fetch is insecure and has no digest\.  Both are required by ALIEN_DOWNLOAD_RULE=digest_and_encrypt\./,
    );

    $secure_fetch = 1;

    ok(
      lives { Alien::Base::ModuleBuild::Repository::Test->new($default)->probe },
    ) or diag($@);

  };

};

$secure_fetch = 1;

subtest 'no pattern' => sub {
  my $repo = Alien::Base::ModuleBuild::Repository::Test->new($default);

  my @filenames = $repo->list_files;

  my @files = $repo->probe();

  is( scalar @files, scalar @filenames, 'without pattern, probe returns an object for each file');
  isa_ok( $files[0], 'Alien::Base::ModuleBuild::File' );
};

subtest 'pattern' => sub {
  my $pattern = qr/^gsl-[\d\.]+\.tar\.gz$/;
  local $default->{pattern} = $pattern;
  my $repo = Alien::Base::ModuleBuild::Repository::Test->new($default);

  my @filenames = grep { $_ =~ $pattern } $repo->list_files;

  my @files = $repo->probe();

  is( scalar @files, scalar @filenames, 'with pattern, probe returns an object for each matching file');
  isa_ok( $files[0], 'Alien::Base::ModuleBuild::File' );
  ok( ! defined $files[0]->version, 'without capture, no version information is available');
};

subtest 'pattern and version capture' => sub {
  my $pattern = qr/^gsl-([\d\.]+)\.tar\.gz$/;
  local $default->{pattern} = $pattern;
  my $repo = Alien::Base::ModuleBuild::Repository::Test->new($default);

  my @filenames = grep { $_ =~ $pattern } $repo->list_files;

  my @files = $repo->probe();

  is( scalar @files, scalar @filenames, 'with pattern, probe returns an object for each matching file');
  isa_ok( $files[0], 'Alien::Base::ModuleBuild::File' );
  ok( defined $files[0]->version, 'with capture, version information is available');
};

subtest 'exact filename' => sub {
  my $filename = 'gsl-1.9.tar.gz.sig';
  local $default->{exact_filename} = $filename;
  my $repo = Alien::Base::ModuleBuild::Repository::Test->new($default);

  my @files = $repo->probe();

  is( scalar @files, 1, 'with exact filename, probe returns one object');
  isa_ok( $files[0], 'Alien::Base::ModuleBuild::File' );
  is( $files[0]->{filename}, $filename, 'the name of the object is the given filename');
  ok( ! defined $files[0]->version, 'without exact version, no version information is available');
};

subtest 'exact filename and digest' => sub {
  my $filename = 'gsl-1.9.tar.gz.sig';
  local $default->{exact_filename} = $filename;
  local $default->{exact_version} = '1.9';
  my $sha1 = '17f8ce6a621da79d8343a934100dfd4278b2a5e9';
  local $default->{sha1} = $sha1;
  my $sha256 = 'eb154b23cc82c5c0ae0a7fb5f0b80261e88283227a8bdd830eea29bade534c58';

t/alien_base_modulebuild_repository.t  view on Meta::CPAN

  local $default->{exact_version}  = 1.9;

  is(
    Alien::Base::ModuleBuild::Repository::Test->new($default)->has_digest,
    F(),
    'no sha1 or sha256',
  );

  {
    local $default->{sha1} = 'foo';
    is(
      Alien::Base::ModuleBuild::Repository::Test->new($default)->has_digest,
      T(),
      'sha1'
    );
  }

  {
    local $default->{sha256} = 'foo';
    is(
      Alien::Base::ModuleBuild::Repository::Test->new($default)->has_digest,
      T(),
      'sha256',
    );
  }

  {
    local $default->{sha1}   = 'bar';
    local $default->{sha256} = 'foo';
    is(
      Alien::Base::ModuleBuild::Repository::Test->new($default)->has_digest,
      T(),
      'sha1 and sha256',
    );
  }

  delete $default->{exact_filename};
  delete $default->{exact_version};

  {
    local $default->{sha1}   = 'bar';
    local $default->{sha256} = 'foo';
    is(
      Alien::Base::ModuleBuild::Repository::Test->new($default)->has_digest,
      F(),
      'sha1 and sha256 and no exaxt',
    );
  }

};

done_testing;

package Alien::Base::ModuleBuild::Repository::Test;

use strict;
use warnings;
use parent 'Alien::Base::ModuleBuild::Repository';

sub is_network_fetch { $network_fetch }
sub is_secure_fetch  { $secure_fetch }

sub list_files {
  my $self = shift;
  #files from GNU GSL FTP server, fetched 1/24/2012
  my @files = ( qw/
    gsl-1.0-gsl-1.1.patch.gz
    gsl-1.0.tar.gz
    gsl-1.1-gsl-1.1.1.patch.gz
    gsl-1.1.1-gsl-1.2.patch.gz
    gsl-1.1.1.tar.gz
    gsl-1.1.tar.gz
    gsl-1.10-1.11.patch.gz
    gsl-1.10-1.11.patch.gz.sig
    gsl-1.10.tar.gz
    gsl-1.10.tar.gz.sig
    gsl-1.11-1.12.patch.gz
    gsl-1.11-1.12.patch.gz.sig
    gsl-1.11.tar.gz
    gsl-1.11.tar.gz.sig
    gsl-1.12-1.13.patch.gz
    gsl-1.12-1.13.patch.gz.sig
    gsl-1.12.tar.gz
    gsl-1.12.tar.gz.sig
    gsl-1.13-1.14.patch.gz
    gsl-1.13-1.14.patch.gz.sig
    gsl-1.13.tar.gz
    gsl-1.13.tar.gz.sig
    gsl-1.14.tar.gz
    gsl-1.14.tar.gz.sig
    gsl-1.15.tar.gz
    gsl-1.15.tar.gz.sig
    gsl-1.2-gsl-1.3.patch.gz
    gsl-1.2.tar.gz
    gsl-1.3-gsl-1.4.patch.gz
    gsl-1.3-gsl-1.4.patch.gz.asc
    gsl-1.3.tar.gz
    gsl-1.4-gsl-1.5.patch.gz
    gsl-1.4-gsl-1.5.patch.gz.sig
    gsl-1.4.tar.gz
    gsl-1.4.tar.gz.asc
    gsl-1.5-gsl-1.6.patch.gz
    gsl-1.5-gsl-1.6.patch.gz.sig
    gsl-1.5.tar.gz
    gsl-1.5.tar.gz.sig
    gsl-1.6-gsl-1.7.patch.gz
    gsl-1.6-gsl-1.7.patch.gz.sig
    gsl-1.6.tar.gz
    gsl-1.6.tar.gz.sig
    gsl-1.7-1.8.patch.gz
    gsl-1.7-1.8.patch.gz.sig
    gsl-1.7.tar.gz
    gsl-1.7.tar.gz.sig
    gsl-1.8-1.9.patch.gz
    gsl-1.8-1.9.patch.gz.sig
    gsl-1.8.tar.gz
    gsl-1.8.tar.gz.sig
    gsl-1.9-1.10.patch.gz
    gsl-1.9-1.10.patch.gz.sig
    gsl-1.9.tar.gz
    gsl-1.9.tar.gz.sig



( run in 0.951 second using v1.01-cache-2.11-cpan-39bf76dae61 )