1use std::collections::BTreeMap;
2use std::fs;
3use std::path::{Path, PathBuf};
4use std::process::Command;
5use std::str::FromStr;
6
7use anyhow::{Context, Result, anyhow, bail};
8use async_trait::async_trait;
9use oci_distribution::Reference;
10use oci_distribution::client::{Client, ClientConfig, ClientProtocol, Config, ImageLayer};
11use oci_distribution::secrets::RegistryAuth;
12use semver::Version;
13use serde::{Deserialize, Serialize};
14use time::OffsetDateTime;
15use time::format_description::well_known::Rfc3339;
16
17use crate::cli::{
18 ReleaseGenerateArgs, ReleaseLatestArgs, ReleasePromoteArgs, ReleasePublishArgs, ReleaseViewArgs,
19};
20use crate::install::block_on_maybe_runtime;
21use crate::passthrough::{ToolchainChannel, delegated_binary_name_for_channel};
22use crate::toolchain_catalogue::GREENTIC_TOOLCHAIN_PACKAGES;
23
24const DEFAULT_OAUTH_USER: &str = "oauth2";
25pub const TOOLCHAIN_MANIFEST_SCHEMA: &str = "greentic.toolchain-manifest.v1";
26pub const TOOLCHAIN_NAME: &str = "gtc";
27pub const TOOLCHAIN_LAYER_MEDIA_TYPE: &str = "application/vnd.greentic.toolchain.manifest.v1+json";
28const TOOLCHAIN_CONFIG_MEDIA_TYPE: &str = "application/vnd.greentic.toolchain.config.v1+json";
29
30#[derive(Debug, Clone, Serialize, Deserialize, PartialEq, Eq)]
31pub struct ToolchainManifest {
32 pub schema: String,
33 pub toolchain: String,
34 pub version: String,
35 #[serde(default, skip_serializing_if = "Option::is_none")]
36 pub channel: Option<String>,
37 #[serde(default, skip_serializing_if = "Option::is_none")]
38 pub created_at: Option<String>,
39 pub packages: Vec<ToolchainPackage>,
40}
41
42#[derive(Debug, Clone, Serialize, Deserialize, PartialEq, Eq)]
43pub struct ToolchainPackage {
44 #[serde(rename = "crate")]
45 pub crate_name: String,
46 pub bins: Vec<String>,
47 pub version: String,
48}
49
50pub fn generate(args: ReleaseGenerateArgs) -> Result<()> {
51 let resolver = CargoSearchVersionResolver;
52 let source = block_on_maybe_runtime(load_source_manifest(
53 &args.repo,
54 &args.from,
55 args.token.as_deref(),
56 ))
57 .with_context(|| {
58 format!(
59 "failed to resolve source manifest `{}`",
60 toolchain_ref(&args.repo, &args.from)
61 )
62 })?;
63 let source = match source {
64 Some(source) => Some(source),
65 None => bootstrap_source_manifest_if_needed(
66 &args.repo,
67 &args.from,
68 args.token.as_deref(),
69 args.dry_run,
70 &resolver,
71 )?,
72 };
73 let manifest = generate_manifest(
74 &args.release,
75 &args.from,
76 source.as_ref(),
77 &resolver,
78 Some(created_at_now()?),
79 )?;
80 if args.dry_run {
81 println!("{}", serde_json::to_string_pretty(&manifest)?);
82 return Ok(());
83 }
84 let path = write_manifest(&args.out, &manifest)?;
85 println!("Wrote {}", path.display());
86 Ok(())
87}
88
89fn bootstrap_source_manifest_if_needed<R: CrateVersionResolver>(
90 repo: &str,
91 tag: &str,
92 token: Option<&str>,
93 dry_run: bool,
94 resolver: &R,
95) -> Result<Option<ToolchainManifest>> {
96 let manifest = bootstrap_source_manifest(tag, resolver, Some(created_at_now()?))?;
97 if dry_run {
98 eprintln!(
99 "Dry run: would bootstrap missing source manifest {}",
100 toolchain_ref(repo, tag)
101 );
102 return Ok(Some(manifest));
103 }
104
105 let auth = match optional_registry_auth(token)? {
106 RegistryAuth::Anonymous => {
107 eprintln!(
108 "Source manifest {} is missing; no GHCR token is available, so only the local release manifest will be generated.",
109 toolchain_ref(repo, tag)
110 );
111 return Ok(Some(manifest));
112 }
113 auth => auth,
114 };
115 block_on_maybe_runtime(async {
116 let client = oci_client();
117 let source_ref = parse_reference(repo, tag)?;
118 push_manifest_layer(&client, &source_ref, &auth, &manifest).await
119 })
120 .with_context(|| format!("failed to bootstrap {}", toolchain_ref(repo, tag)))?;
121 println!("Bootstrapped {}", toolchain_ref(repo, tag));
122 Ok(Some(manifest))
123}
124
125fn bootstrap_source_manifest<R: CrateVersionResolver>(
126 tag: &str,
127 resolver: &R,
128 created_at: Option<String>,
129) -> Result<ToolchainManifest> {
130 generate_manifest(tag, tag, None, resolver, created_at)
131}
132
133pub fn publish(args: ReleasePublishArgs) -> Result<()> {
134 let (release, manifest, source) = publish_manifest_input(&args)?;
135
136 if args.dry_run {
137 println!(
138 "Dry run: would publish {}",
139 toolchain_ref(&args.repo, &release)
140 );
141 if let Some(tag) = &args.tag {
142 println!(
143 "Dry run: would tag {} as {}",
144 toolchain_ref(&args.repo, &release),
145 toolchain_ref(&args.repo, tag)
146 );
147 }
148 return Ok(());
149 }
150
151 let auth = registry_auth(args.token.as_deref())?;
152 block_on_maybe_runtime(async {
153 let client = oci_client();
154 let release_ref = parse_reference(&args.repo, &release)?;
155 if !args.force && manifest_exists(&client, &release_ref, &auth).await? {
156 bail!(
157 "release tag `{}` already exists; pass --force to overwrite it",
158 toolchain_ref(&args.repo, &release)
159 );
160 }
161 push_manifest_layer(&client, &release_ref, &auth, &manifest).await?;
162 if let Some(tag) = &args.tag {
163 let tag_ref = parse_reference(&args.repo, tag)?;
164 push_manifest_layer(&client, &tag_ref, &auth, &manifest).await?;
165 }
166 Ok(())
167 })?;
168
169 if let Some(source) = source {
170 match source {
171 PublishManifestSource::Generated(path) => println!("Wrote {}", path.display()),
172 PublishManifestSource::Local(path) => println!("Read {}", path.display()),
173 }
174 }
175 println!("Published {}", toolchain_ref(&args.repo, &release));
176 if let Some(tag) = &args.tag {
177 println!("Updated {}", toolchain_ref(&args.repo, tag));
178 }
179 Ok(())
180}
181
182#[derive(Debug, Clone, PartialEq, Eq)]
183enum PublishManifestSource {
184 Generated(PathBuf),
185 Local(PathBuf),
186}
187
188fn publish_manifest_input(
189 args: &ReleasePublishArgs,
190) -> Result<(String, ToolchainManifest, Option<PublishManifestSource>)> {
191 if let Some(path) = &args.manifest {
192 let mut manifest = read_manifest_file(path)?;
193 validate_manifest(&manifest)?;
194 let release = if let Some(release) = &args.release {
195 manifest.version = release.clone();
196 release.clone()
197 } else {
198 manifest.version.clone()
199 };
200 return Ok((
201 release,
202 manifest,
203 Some(PublishManifestSource::Local(path.clone())),
204 ));
205 }
206
207 let release = args
208 .release
209 .as_deref()
210 .context("pass --release or --manifest")?;
211 let from = args.from.as_deref().unwrap_or("latest");
212 let resolver = CargoSearchVersionResolver;
213 let source = block_on_maybe_runtime(load_source_manifest(
214 &args.repo,
215 from,
216 args.token.as_deref(),
217 ))
218 .with_context(|| {
219 format!(
220 "failed to resolve source manifest `{}`",
221 toolchain_ref(&args.repo, from)
222 )
223 })?;
224 let manifest = generate_manifest(
225 release,
226 from,
227 source.as_ref(),
228 &resolver,
229 Some(created_at_now()?),
230 )?;
231 let path = if args.dry_run {
232 println!("{}", serde_json::to_string_pretty(&manifest)?);
233 None
234 } else {
235 Some(PublishManifestSource::Generated(write_manifest(
236 &args.out, &manifest,
237 )?))
238 };
239 Ok((release.to_string(), manifest, path))
240}
241
242fn read_manifest_file(path: &Path) -> Result<ToolchainManifest> {
243 let bytes = fs::read(path).with_context(|| format!("failed to read {}", path.display()))?;
244 serde_json::from_slice(&bytes).with_context(|| format!("failed to parse {}", path.display()))
245}
246
247pub fn promote(args: ReleasePromoteArgs) -> Result<()> {
248 if args.dry_run {
249 println!(
250 "Dry run: would promote {} to {}",
251 toolchain_ref(&args.repo, &args.release),
252 toolchain_ref(&args.repo, &args.tag)
253 );
254 return Ok(());
255 }
256
257 let auth = registry_auth(args.token.as_deref())?;
258 block_on_maybe_runtime(async {
259 let client = oci_client();
260 let source_ref = parse_reference(&args.repo, &args.release)?;
261 let target_ref = parse_reference(&args.repo, &args.tag)?;
262 let (manifest, _) = client
263 .pull_manifest(&source_ref, &auth)
264 .await
265 .with_context(|| {
266 format!(
267 "failed to resolve source release `{}`",
268 toolchain_ref(&args.repo, &args.release)
269 )
270 })?;
271 client
272 .push_manifest(&target_ref, &manifest)
273 .await
274 .with_context(|| {
275 format!(
276 "failed to update tag `{}`",
277 toolchain_ref(&args.repo, &args.tag)
278 )
279 })?;
280 Ok(())
281 })?;
282 println!(
283 "Promoted {} to {}",
284 toolchain_ref(&args.repo, &args.release),
285 toolchain_ref(&args.repo, &args.tag)
286 );
287 Ok(())
288}
289
290pub fn view(args: ReleaseViewArgs) -> Result<()> {
291 let tag = release_view_tag(&args)?;
292 let manifest = block_on_maybe_runtime(load_source_manifest(
293 &args.repo,
294 &tag,
295 args.token.as_deref(),
296 ))
297 .with_context(|| {
298 format!(
299 "failed to resolve manifest `{}`",
300 toolchain_ref(&args.repo, &tag)
301 )
302 })?
303 .with_context(|| {
304 format!(
305 "manifest `{}` was not found or is not authorized for this token",
306 toolchain_ref(&args.repo, &tag)
307 )
308 })?;
309 println!("{}", serde_json::to_string_pretty(&manifest)?);
310 Ok(())
311}
312
313pub fn latest(args: ReleaseLatestArgs) -> Result<()> {
314 let manifest = latest_manifest(Some(created_at_now()?));
315 if args.dry_run {
316 println!("{}", serde_json::to_string_pretty(&manifest)?);
317 println!(
318 "Dry run: would publish {}",
319 toolchain_ref(&args.repo, "latest")
320 );
321 return Ok(());
322 }
323
324 let auth = registry_auth(args.token.as_deref())?;
325 block_on_maybe_runtime(async {
326 let client = oci_client();
327 let latest_ref = parse_reference(&args.repo, "latest")?;
328 if !args.force && manifest_exists(&client, &latest_ref, &auth).await? {
329 bail!(
330 "latest tag `{}` already exists; pass --force to overwrite it",
331 toolchain_ref(&args.repo, "latest")
332 );
333 }
334 push_manifest_layer(&client, &latest_ref, &auth, &manifest).await
335 })?;
336 println!("Published {}", toolchain_ref(&args.repo, "latest"));
337 Ok(())
338}
339
340fn latest_manifest(created_at: Option<String>) -> ToolchainManifest {
341 ToolchainManifest {
342 schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
343 toolchain: TOOLCHAIN_NAME.to_string(),
344 version: "latest".to_string(),
345 channel: Some("latest".to_string()),
346 created_at,
347 packages: latest_manifest_packages(),
348 }
349}
350
351fn latest_manifest_packages() -> Vec<ToolchainPackage> {
352 std::iter::once(ToolchainPackage {
353 crate_name: delegated_binary_name_for_channel(
354 TOOLCHAIN_NAME,
355 ToolchainChannel::Development,
356 ),
357 bins: vec![delegated_binary_name_for_channel(
358 TOOLCHAIN_NAME,
359 ToolchainChannel::Development,
360 )],
361 version: "latest".to_string(),
362 })
363 .chain(GREENTIC_TOOLCHAIN_PACKAGES.iter().map(|package| {
364 ToolchainPackage {
365 crate_name: delegated_binary_name_for_channel(
366 package.crate_name,
367 ToolchainChannel::Development,
368 ),
369 bins: package
370 .bins
371 .iter()
372 .map(|bin| delegated_binary_name_for_channel(bin, ToolchainChannel::Development))
373 .collect(),
374 version: "latest".to_string(),
375 }
376 }))
377 .collect()
378}
379
380fn release_view_tag(args: &ReleaseViewArgs) -> Result<String> {
381 match (&args.release, &args.tag) {
382 (Some(release), None) => Ok(release.clone()),
383 (None, Some(tag)) => Ok(tag.clone()),
384 _ => bail!("pass exactly one of --release or --tag"),
385 }
386}
387
388pub fn generate_manifest<R: CrateVersionResolver>(
389 release: &str,
390 from: &str,
391 source: Option<&ToolchainManifest>,
392 resolver: &R,
393 created_at: Option<String>,
394) -> Result<ToolchainManifest> {
395 if let Some(source) = source {
396 validate_manifest(source)?;
397 }
398 let source_versions = source_version_map(source);
399 let mut packages = Vec::new();
400 for package in GREENTIC_TOOLCHAIN_PACKAGES {
401 let crate_in_manifest = manifest_crate_name_for_source(from, package.crate_name);
402 let source_version = source_versions.get(&crate_in_manifest);
403 let version = match source_version.map(String::as_str) {
404 Some(version) if version != "latest" => version.to_string(),
405 _ => resolver.resolve_latest(&crate_in_manifest)?,
406 };
407 packages.push(ToolchainPackage {
408 crate_name: crate_in_manifest,
409 bins: manifest_bins_for_source(from, package.bins),
410 version,
411 });
412 }
413 Ok(ToolchainManifest {
414 schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
415 toolchain: TOOLCHAIN_NAME.to_string(),
416 version: release.to_string(),
417 channel: Some(from.to_string()),
418 created_at,
419 packages,
420 })
421}
422
423fn manifest_bins_for_source(from: &str, bins: &[&str]) -> Vec<String> {
424 if from == "dev" {
425 bins.iter()
426 .map(|bin| delegated_binary_name_for_channel(bin, ToolchainChannel::Development))
427 .collect()
428 } else {
429 bins.iter().map(|bin| (*bin).to_string()).collect()
430 }
431}
432
433fn manifest_crate_name_for_source(from: &str, crate_name: &str) -> String {
441 if from == "dev" {
442 delegated_binary_name_for_channel(crate_name, ToolchainChannel::Development)
443 } else {
444 crate_name.to_string()
445 }
446}
447
448pub fn validate_manifest(manifest: &ToolchainManifest) -> Result<()> {
449 if manifest.schema != TOOLCHAIN_MANIFEST_SCHEMA {
450 bail!(
451 "unsupported toolchain manifest schema `{}`",
452 manifest.schema
453 );
454 }
455 if manifest.toolchain != TOOLCHAIN_NAME {
456 bail!("unsupported toolchain `{}`", manifest.toolchain);
457 }
458 Ok(())
459}
460
461pub fn toolchain_ref(repo: &str, tag: &str) -> String {
462 format!("{repo}:{tag}")
463}
464
465fn source_version_map(source: Option<&ToolchainManifest>) -> BTreeMap<String, String> {
466 let mut out = BTreeMap::new();
467 if let Some(source) = source {
468 for package in &source.packages {
469 out.insert(package.crate_name.clone(), package.version.clone());
470 }
471 }
472 out
473}
474
475fn write_manifest(out_dir: &Path, manifest: &ToolchainManifest) -> Result<PathBuf> {
476 fs::create_dir_all(out_dir)
477 .with_context(|| format!("failed to create {}", out_dir.display()))?;
478 let path = out_dir.join(manifest_file_name(manifest));
479 let json = serde_json::to_vec_pretty(manifest).context("failed to serialize manifest")?;
480 fs::write(&path, json).with_context(|| format!("failed to write {}", path.display()))?;
481 Ok(path)
482}
483
484fn manifest_file_name(manifest: &ToolchainManifest) -> String {
485 match manifest.channel.as_deref() {
486 Some("stable") | None => format!("gtc-{}.json", manifest.version),
487 Some(channel) => format!("gtc-{channel}-{}.json", manifest.version),
488 }
489}
490
491fn created_at_now() -> Result<String> {
492 OffsetDateTime::now_utc()
493 .format(&Rfc3339)
494 .context("failed to format current time")
495}
496
497pub trait CrateVersionResolver {
498 fn resolve_latest(&self, crate_name: &str) -> Result<String>;
499}
500
501struct CargoSearchVersionResolver;
502
503impl CrateVersionResolver for CargoSearchVersionResolver {
504 fn resolve_latest(&self, crate_name: &str) -> Result<String> {
505 let output = Command::new("cargo")
506 .arg("search")
507 .arg(crate_name)
508 .arg("--limit")
509 .arg("1")
510 .output()
511 .with_context(|| format!("failed to execute `cargo search {crate_name} --limit 1`"))?;
512 if !output.status.success() {
513 bail!(
514 "`cargo search {crate_name} --limit 1` failed with exit code {:?}",
515 output.status.code()
516 );
517 }
518 let stdout = String::from_utf8(output.stdout).with_context(|| {
519 format!("`cargo search {crate_name} --limit 1` returned non-UTF8 output")
520 })?;
521 parse_cargo_search_version(crate_name, &stdout)
522 }
523}
524
525fn parse_cargo_search_version(crate_name: &str, stdout: &str) -> Result<String> {
526 let first_line = stdout
527 .lines()
528 .find(|line| !line.trim().is_empty())
529 .ok_or_else(|| anyhow!("`cargo search {crate_name} --limit 1` returned no results"))?;
530 let Some((found_name, rhs)) = first_line.split_once('=') else {
531 bail!("unexpected cargo search output: {first_line}");
532 };
533 if found_name.trim() != crate_name {
534 bail!(
535 "`cargo search {crate_name} --limit 1` returned `{}` first",
536 found_name.trim()
537 );
538 }
539 let quoted = rhs
540 .split('#')
541 .next()
542 .map(str::trim)
543 .ok_or_else(|| anyhow!("unexpected cargo search output: {first_line}"))?;
544 let version = quoted.trim_matches('"');
545 Version::parse(version)
546 .with_context(|| format!("failed to parse crate version from `{first_line}`"))?;
547 Ok(version.to_string())
548}
549
550#[async_trait]
551trait ToolchainManifestSource {
552 async fn load_manifest(
553 &self,
554 repo: &str,
555 tag: &str,
556 token: Option<&str>,
557 ) -> Result<Option<ToolchainManifest>>;
558}
559
560struct OciToolchainManifestSource;
561
562#[async_trait]
563impl ToolchainManifestSource for OciToolchainManifestSource {
564 async fn load_manifest(
565 &self,
566 repo: &str,
567 tag: &str,
568 token: Option<&str>,
569 ) -> Result<Option<ToolchainManifest>> {
570 let auth = optional_registry_auth(token)?;
571 let client = oci_client();
572 let reference = parse_reference(repo, tag)?;
573 let image = match client
574 .pull(&reference, &auth, vec![TOOLCHAIN_LAYER_MEDIA_TYPE])
575 .await
576 {
577 Ok(image) => image,
578 Err(err) if is_missing_manifest_error(&err) || is_unauthorized_error(&err) => {
579 return Ok(None);
580 }
581 Err(err) => {
582 return Err(err)
583 .with_context(|| format!("failed to pull {}", toolchain_ref(repo, tag)));
584 }
585 };
586 let Some(layer) = image
587 .layers
588 .into_iter()
589 .find(|layer| layer.media_type == TOOLCHAIN_LAYER_MEDIA_TYPE)
590 else {
591 return Ok(None);
592 };
593 let manifest = serde_json::from_slice::<ToolchainManifest>(&layer.data)
594 .with_context(|| format!("failed to parse {}", toolchain_ref(repo, tag)))?;
595 validate_manifest(&manifest)?;
596 Ok(Some(manifest))
597 }
598}
599
600async fn load_source_manifest(
601 repo: &str,
602 tag: &str,
603 token: Option<&str>,
604) -> Result<Option<ToolchainManifest>> {
605 OciToolchainManifestSource
606 .load_manifest(repo, tag, token)
607 .await
608}
609
610fn oci_client() -> Client {
611 Client::new(ClientConfig {
612 protocol: ClientProtocol::Https,
613 ..Default::default()
614 })
615}
616
617fn registry_auth(raw_token: Option<&str>) -> Result<RegistryAuth> {
618 let token = resolve_registry_token(raw_token)?
619 .or_else(|| std::env::var("GHCR_TOKEN").ok())
620 .or_else(|| std::env::var("GITHUB_TOKEN").ok())
621 .context("GHCR token is required; pass --token or set GHCR_TOKEN/GITHUB_TOKEN")?;
622 if token.trim().is_empty() {
623 bail!("GHCR token is empty");
624 }
625 Ok(RegistryAuth::Basic(DEFAULT_OAUTH_USER.to_string(), token))
626}
627
628fn optional_registry_auth(raw_token: Option<&str>) -> Result<RegistryAuth> {
629 match registry_auth(raw_token) {
630 Ok(auth) => Ok(auth),
631 Err(_) if raw_token.is_none() => Ok(RegistryAuth::Anonymous),
632 Err(err) => Err(err),
633 }
634}
635
636fn resolve_registry_token(raw_token: Option<&str>) -> Result<Option<String>> {
637 let Some(raw_token) = raw_token else {
638 return Ok(None);
639 };
640 if let Some(var) = raw_token.strip_prefix("env:") {
641 let token =
642 std::env::var(var).with_context(|| format!("failed to resolve env var {var}"))?;
643 if token.trim().is_empty() {
644 bail!("env var {var} resolved to an empty token");
645 }
646 return Ok(Some(token));
647 }
648 if raw_token.trim().is_empty() {
649 bail!("GHCR token is empty");
650 }
651 Ok(Some(raw_token.to_string()))
652}
653
654fn parse_reference(repo: &str, tag: &str) -> Result<Reference> {
655 Reference::from_str(&toolchain_ref(repo, tag))
656 .with_context(|| format!("invalid OCI reference `{}`", toolchain_ref(repo, tag)))
657}
658
659async fn manifest_exists(
660 client: &Client,
661 reference: &Reference,
662 auth: &RegistryAuth,
663) -> Result<bool> {
664 match client.pull_manifest(reference, auth).await {
665 Ok(_) => Ok(true),
666 Err(err) if is_missing_manifest_error(&err) => Ok(false),
667 Err(err) => Err(err).context("failed to check whether release tag exists"),
668 }
669}
670
671fn is_missing_manifest_error(err: &oci_distribution::errors::OciDistributionError) -> bool {
672 let msg = err.to_string().to_ascii_lowercase();
673 msg.contains("manifest unknown")
674 || msg.contains("name unknown")
675 || msg.contains("not found")
676 || msg.contains("404")
677}
678
679fn is_unauthorized_error(err: &oci_distribution::errors::OciDistributionError) -> bool {
680 let msg = err.to_string().to_ascii_lowercase();
681 msg.contains("not authorized") || msg.contains("unauthorized") || msg.contains("401")
682}
683
684async fn push_manifest_layer(
685 client: &Client,
686 reference: &Reference,
687 auth: &RegistryAuth,
688 manifest: &ToolchainManifest,
689) -> Result<()> {
690 let data = serde_json::to_vec_pretty(manifest).context("failed to serialize manifest")?;
691 let layer = ImageLayer::new(data, TOOLCHAIN_LAYER_MEDIA_TYPE.to_string(), None);
692 let config = Config::new(
693 br#"{"toolchain":"gtc"}"#.to_vec(),
694 TOOLCHAIN_CONFIG_MEDIA_TYPE.to_string(),
695 None,
696 );
697 client
698 .push(reference, &[layer], config, auth, None)
699 .await
700 .context("failed to push toolchain manifest")?;
701 Ok(())
702}
703
704#[cfg(test)]
705mod tests {
706 use super::*;
707
708 struct FixedResolver;
709
710 impl CrateVersionResolver for FixedResolver {
711 fn resolve_latest(&self, crate_name: &str) -> Result<String> {
712 Ok(match crate_name {
713 "greentic-runner" => "0.5.10",
714 _ => "1.2.3",
715 }
716 .to_string())
717 }
718 }
719
720 #[test]
721 fn parses_cargo_search_version() {
722 let version = parse_cargo_search_version(
723 "greentic-dev",
724 r#"greentic-dev = "0.5.1" # Developer CLI"#,
725 )
726 .unwrap();
727 assert_eq!(version, "0.5.1");
728 }
729
730 #[test]
731 fn generates_manifest_from_catalogue() {
732 let manifest = generate_manifest("1.0.5", "latest", None, &FixedResolver, None).unwrap();
733 assert_eq!(manifest.schema, TOOLCHAIN_MANIFEST_SCHEMA);
734 assert_eq!(manifest.toolchain, TOOLCHAIN_NAME);
735 assert_eq!(manifest.version, "1.0.5");
736 assert_eq!(manifest.channel.as_deref(), Some("latest"));
737 assert!(
738 manifest
739 .packages
740 .iter()
741 .any(|package| package.crate_name == "greentic-bundle"
742 && package.bins == ["greentic-bundle"])
743 );
744 assert!(
745 manifest
746 .packages
747 .iter()
748 .any(|package| package.crate_name == "greentic-runner"
749 && package.bins == ["greentic-runner"])
750 );
751 }
752
753 #[test]
754 fn source_manifest_can_pin_package_versions() {
755 let source = ToolchainManifest {
756 schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
757 toolchain: TOOLCHAIN_NAME.to_string(),
758 version: "latest".to_string(),
759 channel: Some("latest".to_string()),
760 created_at: None,
761 packages: vec![ToolchainPackage {
762 crate_name: "greentic-dev".to_string(),
763 bins: vec!["greentic-dev".to_string()],
764 version: "0.5.9".to_string(),
765 }],
766 };
767 let manifest =
768 generate_manifest("1.0.5", "latest", Some(&source), &FixedResolver, None).unwrap();
769 let greentic_dev = manifest
770 .packages
771 .iter()
772 .find(|package| package.crate_name == "greentic-dev")
773 .unwrap();
774 assert_eq!(greentic_dev.version, "0.5.9");
775 }
776
777 #[test]
778 fn from_argument_controls_generated_channel_over_source_manifest() {
779 let source = ToolchainManifest {
780 schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
781 toolchain: TOOLCHAIN_NAME.to_string(),
782 version: "latest".to_string(),
783 channel: Some("stable".to_string()),
784 created_at: None,
785 packages: Vec::new(),
786 };
787 let manifest =
788 generate_manifest("1.0.16", "dev", Some(&source), &FixedResolver, None).unwrap();
789 assert_eq!(manifest.channel.as_deref(), Some("dev"));
790 assert_eq!(manifest_file_name(&manifest), "gtc-dev-1.0.16.json");
791 }
792
793 #[test]
794 fn generate_from_dev_uses_dev_crate_and_binary_names() {
795 let manifest = generate_manifest("1.0.16", "dev", None, &FixedResolver, None).unwrap();
796 assert!(
797 manifest
798 .packages
799 .iter()
800 .flat_map(|package| package.bins.iter())
801 .all(|bin| bin.ends_with("-dev"))
802 );
803 assert!(
804 manifest
805 .packages
806 .iter()
807 .all(|package| package.crate_name.ends_with("-dev")),
808 "dev manifest must pin -dev crate names so binstall resolves the dev mirror"
809 );
810 assert!(manifest.packages.iter().any(|package| {
811 package.crate_name == "greentic-flow-dev" && package.bins == ["greentic-flow-dev"]
812 }));
813 assert!(manifest.packages.iter().any(|package| {
814 package.crate_name == "greentic-component-dev"
815 && package.bins == ["greentic-component-dev"]
816 }));
817 assert!(manifest.packages.iter().any(|package| {
818 package.crate_name == "greentic-dev-dev" && package.bins == ["greentic-dev-dev"]
819 }));
820 }
821
822 #[test]
823 fn bootstrap_source_manifest_uses_source_tag_identity() {
824 let manifest = bootstrap_source_manifest("latest", &FixedResolver, None).unwrap();
825 assert_eq!(manifest.version, "latest");
826 assert_eq!(manifest.channel.as_deref(), Some("latest"));
827 assert_eq!(manifest.schema, TOOLCHAIN_MANIFEST_SCHEMA);
828 assert_eq!(manifest.toolchain, TOOLCHAIN_NAME);
829 assert!(
830 manifest
831 .packages
832 .iter()
833 .all(|package| package.version != "latest")
834 );
835 }
836
837 #[test]
838 fn validates_schema_and_toolchain() {
839 let mut manifest =
840 generate_manifest("1.0.5", "latest", None, &FixedResolver, None).unwrap();
841 assert!(validate_manifest(&manifest).is_ok());
842 manifest.schema = "wrong".to_string();
843 assert!(validate_manifest(&manifest).is_err());
844 }
845
846 #[test]
847 fn resolves_inline_registry_token() {
848 assert_eq!(
849 resolve_registry_token(Some("secret-token"))
850 .unwrap()
851 .as_deref(),
852 Some("secret-token")
853 );
854 }
855
856 #[test]
857 fn release_view_tag_prefers_release_or_tag() {
858 let args = ReleaseViewArgs {
859 release: Some("1.0.5".to_string()),
860 tag: None,
861 repo: "ghcr.io/greenticai/greentic-versions/gtc".to_string(),
862 token: None,
863 };
864 assert_eq!(release_view_tag(&args).unwrap(), "1.0.5");
865
866 let args = ReleaseViewArgs {
867 release: None,
868 tag: Some("stable".to_string()),
869 repo: "ghcr.io/greenticai/greentic-versions/gtc".to_string(),
870 token: None,
871 };
872 assert_eq!(release_view_tag(&args).unwrap(), "stable");
873 }
874
875 #[test]
876 fn publish_manifest_input_uses_local_manifest_version() {
877 let dir = tempfile::tempdir().unwrap();
878 let path = dir.path().join("gtc-1.0.12.json");
879 let manifest = generate_manifest("1.0.12", "latest", None, &FixedResolver, None).unwrap();
880 fs::write(&path, serde_json::to_vec_pretty(&manifest).unwrap()).unwrap();
881 let args = ReleasePublishArgs {
882 release: None,
883 from: None,
884 tag: Some("stable".to_string()),
885 manifest: Some(path.clone()),
886 repo: "ghcr.io/greenticai/greentic-versions/gtc".to_string(),
887 token: None,
888 out: dir.path().to_path_buf(),
889 dry_run: true,
890 force: true,
891 };
892 let (release, loaded, source_path) = publish_manifest_input(&args).unwrap();
893 assert_eq!(release, "1.0.12");
894 assert_eq!(loaded, manifest);
895 assert_eq!(
896 source_path,
897 Some(PublishManifestSource::Local(path.clone()))
898 );
899 }
900
901 #[test]
902 fn publish_manifest_input_allows_release_override_for_local_manifest() {
903 let dir = tempfile::tempdir().unwrap();
904 let path = dir.path().join("gtc-1.0.13.json");
905 let manifest = generate_manifest("1.0.12", "latest", None, &FixedResolver, None).unwrap();
906 fs::write(&path, serde_json::to_vec_pretty(&manifest).unwrap()).unwrap();
907 let args = ReleasePublishArgs {
908 release: Some("1.0.13".to_string()),
909 from: None,
910 tag: Some("stable".to_string()),
911 manifest: Some(path.clone()),
912 repo: "ghcr.io/greenticai/greentic-versions/gtc".to_string(),
913 token: None,
914 out: dir.path().to_path_buf(),
915 dry_run: true,
916 force: true,
917 };
918 let (release, loaded, source_path) = publish_manifest_input(&args).unwrap();
919 assert_eq!(release, "1.0.13");
920 assert_eq!(loaded.version, "1.0.13");
921 assert_eq!(
922 source_path,
923 Some(PublishManifestSource::Local(path.clone()))
924 );
925 }
926
927 #[test]
928 fn manifest_file_name_omits_stable_channel() {
929 let manifest = ToolchainManifest {
930 schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
931 toolchain: TOOLCHAIN_NAME.to_string(),
932 version: "1.0.12".to_string(),
933 channel: Some("stable".to_string()),
934 created_at: None,
935 packages: Vec::new(),
936 };
937 assert_eq!(manifest_file_name(&manifest), "gtc-1.0.12.json");
938 }
939
940 #[test]
941 fn manifest_file_name_includes_non_stable_channel() {
942 let mut manifest = generate_manifest("1.0.12", "dev", None, &FixedResolver, None).unwrap();
943 assert_eq!(manifest_file_name(&manifest), "gtc-dev-1.0.12.json");
944
945 manifest.channel = Some("customer-a".to_string());
946 assert_eq!(manifest_file_name(&manifest), "gtc-customer-a-1.0.12.json");
947 }
948
949 #[test]
950 fn latest_manifest_uses_latest_dev_bins() {
951 let manifest = latest_manifest(None);
952 assert_eq!(manifest.version, "latest");
953 assert_eq!(manifest.channel.as_deref(), Some("latest"));
954 assert_eq!(manifest.schema, TOOLCHAIN_MANIFEST_SCHEMA);
955 assert_eq!(manifest.toolchain, TOOLCHAIN_NAME);
956 assert!(!manifest.packages.is_empty());
957 assert!(
958 manifest
959 .packages
960 .iter()
961 .all(|package| package.version == "latest")
962 );
963 assert!(
964 manifest
965 .packages
966 .iter()
967 .flat_map(|package| package.bins.iter())
968 .all(|bin| bin.ends_with("-dev"))
969 );
970 assert!(
971 manifest
972 .packages
973 .iter()
974 .all(|package| package.crate_name.ends_with("-dev")),
975 "latest-channel manifest mirrors dev binaries, so crate names must be -dev too"
976 );
977 assert!(
978 manifest
979 .packages
980 .iter()
981 .any(|package| { package.crate_name == "gtc-dev" && package.bins == ["gtc-dev"] })
982 );
983 assert!(manifest.packages.iter().any(|package| {
984 package.crate_name == "greentic-dev-dev" && package.bins == ["greentic-dev-dev"]
985 }));
986 }
987
988 #[test]
989 fn builds_toolchain_ref() {
990 assert_eq!(
991 toolchain_ref("ghcr.io/greenticai/greentic-versions/gtc", "stable"),
992 "ghcr.io/greenticai/greentic-versions/gtc:stable"
993 );
994 }
995}