Skip to main content

greentic_dev/
release_cmd.rs

1use std::collections::BTreeMap;
2use std::fs;
3use std::path::{Path, PathBuf};
4use std::process::Command;
5use std::str::FromStr;
6
7use anyhow::{Context, Result, anyhow, bail};
8use async_trait::async_trait;
9use oci_distribution::Reference;
10use oci_distribution::client::{Client, ClientConfig, ClientProtocol, Config, ImageLayer};
11use oci_distribution::secrets::RegistryAuth;
12use semver::Version;
13use serde::{Deserialize, Serialize};
14use time::OffsetDateTime;
15use time::format_description::well_known::Rfc3339;
16
17use crate::cli::{
18    ReleaseGenerateArgs, ReleaseLatestArgs, ReleasePromoteArgs, ReleasePublishArgs, ReleaseViewArgs,
19};
20use crate::install::block_on_maybe_runtime;
21use crate::passthrough::{ToolchainChannel, delegated_binary_name_for_channel};
22use crate::toolchain_catalogue::GREENTIC_TOOLCHAIN_PACKAGES;
23
24const DEFAULT_OAUTH_USER: &str = "oauth2";
25pub const TOOLCHAIN_MANIFEST_SCHEMA: &str = "greentic.toolchain-manifest.v1";
26pub const TOOLCHAIN_NAME: &str = "gtc";
27pub const TOOLCHAIN_LAYER_MEDIA_TYPE: &str = "application/vnd.greentic.toolchain.manifest.v1+json";
28const TOOLCHAIN_CONFIG_MEDIA_TYPE: &str = "application/vnd.greentic.toolchain.config.v1+json";
29
30#[derive(Debug, Clone, Serialize, Deserialize, PartialEq, Eq)]
31pub struct ToolchainManifest {
32    pub schema: String,
33    pub toolchain: String,
34    pub version: String,
35    #[serde(default, skip_serializing_if = "Option::is_none")]
36    pub channel: Option<String>,
37    #[serde(default, skip_serializing_if = "Option::is_none")]
38    pub created_at: Option<String>,
39    pub packages: Vec<ToolchainPackage>,
40}
41
42#[derive(Debug, Clone, Serialize, Deserialize, PartialEq, Eq)]
43pub struct ToolchainPackage {
44    #[serde(rename = "crate")]
45    pub crate_name: String,
46    pub bins: Vec<String>,
47    pub version: String,
48}
49
50pub fn generate(args: ReleaseGenerateArgs) -> Result<()> {
51    let resolver = CargoSearchVersionResolver;
52    let source = block_on_maybe_runtime(load_source_manifest(
53        &args.repo,
54        &args.from,
55        args.token.as_deref(),
56    ))
57    .with_context(|| {
58        format!(
59            "failed to resolve source manifest `{}`",
60            toolchain_ref(&args.repo, &args.from)
61        )
62    })?;
63    let source = match source {
64        Some(source) => Some(source),
65        None => bootstrap_source_manifest_if_needed(
66            &args.repo,
67            &args.from,
68            args.token.as_deref(),
69            args.dry_run,
70            &resolver,
71        )?,
72    };
73    let manifest = generate_manifest(
74        &args.release,
75        &args.from,
76        source.as_ref(),
77        &resolver,
78        Some(created_at_now()?),
79    )?;
80    if args.dry_run {
81        println!("{}", serde_json::to_string_pretty(&manifest)?);
82        return Ok(());
83    }
84    let path = write_manifest(&args.out, &manifest)?;
85    println!("Wrote {}", path.display());
86    Ok(())
87}
88
89fn bootstrap_source_manifest_if_needed<R: CrateVersionResolver>(
90    repo: &str,
91    tag: &str,
92    token: Option<&str>,
93    dry_run: bool,
94    resolver: &R,
95) -> Result<Option<ToolchainManifest>> {
96    let manifest = bootstrap_source_manifest(tag, resolver, Some(created_at_now()?))?;
97    if dry_run {
98        eprintln!(
99            "Dry run: would bootstrap missing source manifest {}",
100            toolchain_ref(repo, tag)
101        );
102        return Ok(Some(manifest));
103    }
104
105    let auth = match optional_registry_auth(token)? {
106        RegistryAuth::Anonymous => {
107            eprintln!(
108                "Source manifest {} is missing; no GHCR token is available, so only the local release manifest will be generated.",
109                toolchain_ref(repo, tag)
110            );
111            return Ok(Some(manifest));
112        }
113        auth => auth,
114    };
115    block_on_maybe_runtime(async {
116        let client = oci_client();
117        let source_ref = parse_reference(repo, tag)?;
118        push_manifest_layer(&client, &source_ref, &auth, &manifest).await
119    })
120    .with_context(|| format!("failed to bootstrap {}", toolchain_ref(repo, tag)))?;
121    println!("Bootstrapped {}", toolchain_ref(repo, tag));
122    Ok(Some(manifest))
123}
124
125fn bootstrap_source_manifest<R: CrateVersionResolver>(
126    tag: &str,
127    resolver: &R,
128    created_at: Option<String>,
129) -> Result<ToolchainManifest> {
130    generate_manifest(tag, tag, None, resolver, created_at)
131}
132
133pub fn publish(args: ReleasePublishArgs) -> Result<()> {
134    let (release, manifest, source) = publish_manifest_input(&args)?;
135
136    if args.dry_run {
137        println!(
138            "Dry run: would publish {}",
139            toolchain_ref(&args.repo, &release)
140        );
141        if let Some(tag) = &args.tag {
142            println!(
143                "Dry run: would tag {} as {}",
144                toolchain_ref(&args.repo, &release),
145                toolchain_ref(&args.repo, tag)
146            );
147        }
148        return Ok(());
149    }
150
151    let auth = registry_auth(args.token.as_deref())?;
152    block_on_maybe_runtime(async {
153        let client = oci_client();
154        let release_ref = parse_reference(&args.repo, &release)?;
155        if !args.force && manifest_exists(&client, &release_ref, &auth).await? {
156            bail!(
157                "release tag `{}` already exists; pass --force to overwrite it",
158                toolchain_ref(&args.repo, &release)
159            );
160        }
161        push_manifest_layer(&client, &release_ref, &auth, &manifest).await?;
162        if let Some(tag) = &args.tag {
163            let tag_ref = parse_reference(&args.repo, tag)?;
164            push_manifest_layer(&client, &tag_ref, &auth, &manifest).await?;
165        }
166        Ok(())
167    })?;
168
169    if let Some(source) = source {
170        match source {
171            PublishManifestSource::Generated(path) => println!("Wrote {}", path.display()),
172            PublishManifestSource::Local(path) => println!("Read {}", path.display()),
173        }
174    }
175    println!("Published {}", toolchain_ref(&args.repo, &release));
176    if let Some(tag) = &args.tag {
177        println!("Updated {}", toolchain_ref(&args.repo, tag));
178    }
179    Ok(())
180}
181
182#[derive(Debug, Clone, PartialEq, Eq)]
183enum PublishManifestSource {
184    Generated(PathBuf),
185    Local(PathBuf),
186}
187
188fn publish_manifest_input(
189    args: &ReleasePublishArgs,
190) -> Result<(String, ToolchainManifest, Option<PublishManifestSource>)> {
191    if let Some(path) = &args.manifest {
192        let mut manifest = read_manifest_file(path)?;
193        validate_manifest(&manifest)?;
194        let release = if let Some(release) = &args.release {
195            manifest.version = release.clone();
196            release.clone()
197        } else {
198            manifest.version.clone()
199        };
200        return Ok((
201            release,
202            manifest,
203            Some(PublishManifestSource::Local(path.clone())),
204        ));
205    }
206
207    let release = args
208        .release
209        .as_deref()
210        .context("pass --release or --manifest")?;
211    let from = args.from.as_deref().unwrap_or("latest");
212    let resolver = CargoSearchVersionResolver;
213    let source = block_on_maybe_runtime(load_source_manifest(
214        &args.repo,
215        from,
216        args.token.as_deref(),
217    ))
218    .with_context(|| {
219        format!(
220            "failed to resolve source manifest `{}`",
221            toolchain_ref(&args.repo, from)
222        )
223    })?;
224    let manifest = generate_manifest(
225        release,
226        from,
227        source.as_ref(),
228        &resolver,
229        Some(created_at_now()?),
230    )?;
231    let path = if args.dry_run {
232        println!("{}", serde_json::to_string_pretty(&manifest)?);
233        None
234    } else {
235        Some(PublishManifestSource::Generated(write_manifest(
236            &args.out, &manifest,
237        )?))
238    };
239    Ok((release.to_string(), manifest, path))
240}
241
242fn read_manifest_file(path: &Path) -> Result<ToolchainManifest> {
243    let bytes = fs::read(path).with_context(|| format!("failed to read {}", path.display()))?;
244    serde_json::from_slice(&bytes).with_context(|| format!("failed to parse {}", path.display()))
245}
246
247pub fn promote(args: ReleasePromoteArgs) -> Result<()> {
248    if args.dry_run {
249        println!(
250            "Dry run: would promote {} to {}",
251            toolchain_ref(&args.repo, &args.release),
252            toolchain_ref(&args.repo, &args.tag)
253        );
254        return Ok(());
255    }
256
257    let auth = registry_auth(args.token.as_deref())?;
258    block_on_maybe_runtime(async {
259        let client = oci_client();
260        let source_ref = parse_reference(&args.repo, &args.release)?;
261        let target_ref = parse_reference(&args.repo, &args.tag)?;
262        let (manifest, _) = client
263            .pull_manifest(&source_ref, &auth)
264            .await
265            .with_context(|| {
266                format!(
267                    "failed to resolve source release `{}`",
268                    toolchain_ref(&args.repo, &args.release)
269                )
270            })?;
271        client
272            .push_manifest(&target_ref, &manifest)
273            .await
274            .with_context(|| {
275                format!(
276                    "failed to update tag `{}`",
277                    toolchain_ref(&args.repo, &args.tag)
278                )
279            })?;
280        Ok(())
281    })?;
282    println!(
283        "Promoted {} to {}",
284        toolchain_ref(&args.repo, &args.release),
285        toolchain_ref(&args.repo, &args.tag)
286    );
287    Ok(())
288}
289
290pub fn view(args: ReleaseViewArgs) -> Result<()> {
291    let tag = release_view_tag(&args)?;
292    let manifest = block_on_maybe_runtime(load_source_manifest(
293        &args.repo,
294        &tag,
295        args.token.as_deref(),
296    ))
297    .with_context(|| {
298        format!(
299            "failed to resolve manifest `{}`",
300            toolchain_ref(&args.repo, &tag)
301        )
302    })?
303    .with_context(|| {
304        format!(
305            "manifest `{}` was not found or is not authorized for this token",
306            toolchain_ref(&args.repo, &tag)
307        )
308    })?;
309    println!("{}", serde_json::to_string_pretty(&manifest)?);
310    Ok(())
311}
312
313pub fn latest(args: ReleaseLatestArgs) -> Result<()> {
314    let manifest = latest_manifest(Some(created_at_now()?));
315    if args.dry_run {
316        println!("{}", serde_json::to_string_pretty(&manifest)?);
317        println!(
318            "Dry run: would publish {}",
319            toolchain_ref(&args.repo, "latest")
320        );
321        return Ok(());
322    }
323
324    let auth = registry_auth(args.token.as_deref())?;
325    block_on_maybe_runtime(async {
326        let client = oci_client();
327        let latest_ref = parse_reference(&args.repo, "latest")?;
328        if !args.force && manifest_exists(&client, &latest_ref, &auth).await? {
329            bail!(
330                "latest tag `{}` already exists; pass --force to overwrite it",
331                toolchain_ref(&args.repo, "latest")
332            );
333        }
334        push_manifest_layer(&client, &latest_ref, &auth, &manifest).await
335    })?;
336    println!("Published {}", toolchain_ref(&args.repo, "latest"));
337    Ok(())
338}
339
340fn latest_manifest(created_at: Option<String>) -> ToolchainManifest {
341    ToolchainManifest {
342        schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
343        toolchain: TOOLCHAIN_NAME.to_string(),
344        version: "latest".to_string(),
345        channel: Some("latest".to_string()),
346        created_at,
347        packages: latest_manifest_packages(),
348    }
349}
350
351fn latest_manifest_packages() -> Vec<ToolchainPackage> {
352    std::iter::once(ToolchainPackage {
353        crate_name: delegated_binary_name_for_channel(
354            TOOLCHAIN_NAME,
355            ToolchainChannel::Development,
356        ),
357        bins: vec![delegated_binary_name_for_channel(
358            TOOLCHAIN_NAME,
359            ToolchainChannel::Development,
360        )],
361        version: "latest".to_string(),
362    })
363    .chain(GREENTIC_TOOLCHAIN_PACKAGES.iter().map(|package| {
364        ToolchainPackage {
365            crate_name: delegated_binary_name_for_channel(
366                package.crate_name,
367                ToolchainChannel::Development,
368            ),
369            bins: package
370                .bins
371                .iter()
372                .map(|bin| delegated_binary_name_for_channel(bin, ToolchainChannel::Development))
373                .collect(),
374            version: "latest".to_string(),
375        }
376    }))
377    .collect()
378}
379
380fn release_view_tag(args: &ReleaseViewArgs) -> Result<String> {
381    match (&args.release, &args.tag) {
382        (Some(release), None) => Ok(release.clone()),
383        (None, Some(tag)) => Ok(tag.clone()),
384        _ => bail!("pass exactly one of --release or --tag"),
385    }
386}
387
388pub fn generate_manifest<R: CrateVersionResolver>(
389    release: &str,
390    from: &str,
391    source: Option<&ToolchainManifest>,
392    resolver: &R,
393    created_at: Option<String>,
394) -> Result<ToolchainManifest> {
395    if let Some(source) = source {
396        validate_manifest(source)?;
397    }
398    let source_versions = source_version_map(source);
399    let mut packages = Vec::new();
400    for package in GREENTIC_TOOLCHAIN_PACKAGES {
401        let crate_in_manifest = manifest_crate_name_for_source(from, package.crate_name);
402        let source_version = source_versions.get(&crate_in_manifest);
403        let version = match source_version.map(String::as_str) {
404            Some(version) if version != "latest" => version.to_string(),
405            _ => resolver.resolve_latest(&crate_in_manifest)?,
406        };
407        packages.push(ToolchainPackage {
408            crate_name: crate_in_manifest,
409            bins: manifest_bins_for_source(from, package.bins),
410            version,
411        });
412    }
413    Ok(ToolchainManifest {
414        schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
415        toolchain: TOOLCHAIN_NAME.to_string(),
416        version: release.to_string(),
417        channel: Some(from.to_string()),
418        created_at,
419        packages,
420    })
421}
422
423fn manifest_bins_for_source(from: &str, bins: &[&str]) -> Vec<String> {
424    if from == "dev" {
425        bins.iter()
426            .map(|bin| delegated_binary_name_for_channel(bin, ToolchainChannel::Development))
427            .collect()
428    } else {
429        bins.iter().map(|bin| (*bin).to_string()).collect()
430    }
431}
432
433/// Apply the dev-channel `-dev` suffix to a crate name when the manifest
434/// channel is `"dev"`. The dev-publish lane mirrors every binary crate as
435/// `<crate>-dev` (binary bifurcation); the toolchain manifest must pin the
436/// mirrored crate so `cargo binstall` resolves the dev artifact instead of
437/// the stable one. Reuses `delegated_binary_name_for_channel` because the
438/// rule is identical for crates and binaries (`-dev` suffix, with the
439/// special carve-out that `greentic-dev` itself becomes `greentic-dev-dev`).
440fn manifest_crate_name_for_source(from: &str, crate_name: &str) -> String {
441    if from == "dev" {
442        delegated_binary_name_for_channel(crate_name, ToolchainChannel::Development)
443    } else {
444        crate_name.to_string()
445    }
446}
447
448pub fn validate_manifest(manifest: &ToolchainManifest) -> Result<()> {
449    if manifest.schema != TOOLCHAIN_MANIFEST_SCHEMA {
450        bail!(
451            "unsupported toolchain manifest schema `{}`",
452            manifest.schema
453        );
454    }
455    if manifest.toolchain != TOOLCHAIN_NAME {
456        bail!("unsupported toolchain `{}`", manifest.toolchain);
457    }
458    Ok(())
459}
460
461pub fn toolchain_ref(repo: &str, tag: &str) -> String {
462    format!("{repo}:{tag}")
463}
464
465fn source_version_map(source: Option<&ToolchainManifest>) -> BTreeMap<String, String> {
466    let mut out = BTreeMap::new();
467    if let Some(source) = source {
468        for package in &source.packages {
469            out.insert(package.crate_name.clone(), package.version.clone());
470        }
471    }
472    out
473}
474
475fn write_manifest(out_dir: &Path, manifest: &ToolchainManifest) -> Result<PathBuf> {
476    fs::create_dir_all(out_dir)
477        .with_context(|| format!("failed to create {}", out_dir.display()))?;
478    let path = out_dir.join(manifest_file_name(manifest));
479    let json = serde_json::to_vec_pretty(manifest).context("failed to serialize manifest")?;
480    fs::write(&path, json).with_context(|| format!("failed to write {}", path.display()))?;
481    Ok(path)
482}
483
484fn manifest_file_name(manifest: &ToolchainManifest) -> String {
485    match manifest.channel.as_deref() {
486        Some("stable") | None => format!("gtc-{}.json", manifest.version),
487        Some(channel) => format!("gtc-{channel}-{}.json", manifest.version),
488    }
489}
490
491fn created_at_now() -> Result<String> {
492    OffsetDateTime::now_utc()
493        .format(&Rfc3339)
494        .context("failed to format current time")
495}
496
497pub trait CrateVersionResolver {
498    fn resolve_latest(&self, crate_name: &str) -> Result<String>;
499}
500
501struct CargoSearchVersionResolver;
502
503impl CrateVersionResolver for CargoSearchVersionResolver {
504    fn resolve_latest(&self, crate_name: &str) -> Result<String> {
505        let output = Command::new("cargo")
506            .arg("search")
507            .arg(crate_name)
508            .arg("--limit")
509            .arg("1")
510            .output()
511            .with_context(|| format!("failed to execute `cargo search {crate_name} --limit 1`"))?;
512        if !output.status.success() {
513            bail!(
514                "`cargo search {crate_name} --limit 1` failed with exit code {:?}",
515                output.status.code()
516            );
517        }
518        let stdout = String::from_utf8(output.stdout).with_context(|| {
519            format!("`cargo search {crate_name} --limit 1` returned non-UTF8 output")
520        })?;
521        parse_cargo_search_version(crate_name, &stdout)
522    }
523}
524
525fn parse_cargo_search_version(crate_name: &str, stdout: &str) -> Result<String> {
526    let first_line = stdout
527        .lines()
528        .find(|line| !line.trim().is_empty())
529        .ok_or_else(|| anyhow!("`cargo search {crate_name} --limit 1` returned no results"))?;
530    let Some((found_name, rhs)) = first_line.split_once('=') else {
531        bail!("unexpected cargo search output: {first_line}");
532    };
533    if found_name.trim() != crate_name {
534        bail!(
535            "`cargo search {crate_name} --limit 1` returned `{}` first",
536            found_name.trim()
537        );
538    }
539    let quoted = rhs
540        .split('#')
541        .next()
542        .map(str::trim)
543        .ok_or_else(|| anyhow!("unexpected cargo search output: {first_line}"))?;
544    let version = quoted.trim_matches('"');
545    Version::parse(version)
546        .with_context(|| format!("failed to parse crate version from `{first_line}`"))?;
547    Ok(version.to_string())
548}
549
550#[async_trait]
551trait ToolchainManifestSource {
552    async fn load_manifest(
553        &self,
554        repo: &str,
555        tag: &str,
556        token: Option<&str>,
557    ) -> Result<Option<ToolchainManifest>>;
558}
559
560struct OciToolchainManifestSource;
561
562#[async_trait]
563impl ToolchainManifestSource for OciToolchainManifestSource {
564    async fn load_manifest(
565        &self,
566        repo: &str,
567        tag: &str,
568        token: Option<&str>,
569    ) -> Result<Option<ToolchainManifest>> {
570        let auth = optional_registry_auth(token)?;
571        let client = oci_client();
572        let reference = parse_reference(repo, tag)?;
573        let image = match client
574            .pull(&reference, &auth, vec![TOOLCHAIN_LAYER_MEDIA_TYPE])
575            .await
576        {
577            Ok(image) => image,
578            Err(err) if is_missing_manifest_error(&err) || is_unauthorized_error(&err) => {
579                return Ok(None);
580            }
581            Err(err) => {
582                return Err(err)
583                    .with_context(|| format!("failed to pull {}", toolchain_ref(repo, tag)));
584            }
585        };
586        let Some(layer) = image
587            .layers
588            .into_iter()
589            .find(|layer| layer.media_type == TOOLCHAIN_LAYER_MEDIA_TYPE)
590        else {
591            return Ok(None);
592        };
593        let manifest = serde_json::from_slice::<ToolchainManifest>(&layer.data)
594            .with_context(|| format!("failed to parse {}", toolchain_ref(repo, tag)))?;
595        validate_manifest(&manifest)?;
596        Ok(Some(manifest))
597    }
598}
599
600async fn load_source_manifest(
601    repo: &str,
602    tag: &str,
603    token: Option<&str>,
604) -> Result<Option<ToolchainManifest>> {
605    OciToolchainManifestSource
606        .load_manifest(repo, tag, token)
607        .await
608}
609
610fn oci_client() -> Client {
611    Client::new(ClientConfig {
612        protocol: ClientProtocol::Https,
613        ..Default::default()
614    })
615}
616
617fn registry_auth(raw_token: Option<&str>) -> Result<RegistryAuth> {
618    let token = resolve_registry_token(raw_token)?
619        .or_else(|| std::env::var("GHCR_TOKEN").ok())
620        .or_else(|| std::env::var("GITHUB_TOKEN").ok())
621        .context("GHCR token is required; pass --token or set GHCR_TOKEN/GITHUB_TOKEN")?;
622    if token.trim().is_empty() {
623        bail!("GHCR token is empty");
624    }
625    Ok(RegistryAuth::Basic(DEFAULT_OAUTH_USER.to_string(), token))
626}
627
628fn optional_registry_auth(raw_token: Option<&str>) -> Result<RegistryAuth> {
629    match registry_auth(raw_token) {
630        Ok(auth) => Ok(auth),
631        Err(_) if raw_token.is_none() => Ok(RegistryAuth::Anonymous),
632        Err(err) => Err(err),
633    }
634}
635
636fn resolve_registry_token(raw_token: Option<&str>) -> Result<Option<String>> {
637    let Some(raw_token) = raw_token else {
638        return Ok(None);
639    };
640    if let Some(var) = raw_token.strip_prefix("env:") {
641        let token =
642            std::env::var(var).with_context(|| format!("failed to resolve env var {var}"))?;
643        if token.trim().is_empty() {
644            bail!("env var {var} resolved to an empty token");
645        }
646        return Ok(Some(token));
647    }
648    if raw_token.trim().is_empty() {
649        bail!("GHCR token is empty");
650    }
651    Ok(Some(raw_token.to_string()))
652}
653
654fn parse_reference(repo: &str, tag: &str) -> Result<Reference> {
655    Reference::from_str(&toolchain_ref(repo, tag))
656        .with_context(|| format!("invalid OCI reference `{}`", toolchain_ref(repo, tag)))
657}
658
659async fn manifest_exists(
660    client: &Client,
661    reference: &Reference,
662    auth: &RegistryAuth,
663) -> Result<bool> {
664    match client.pull_manifest(reference, auth).await {
665        Ok(_) => Ok(true),
666        Err(err) if is_missing_manifest_error(&err) => Ok(false),
667        Err(err) => Err(err).context("failed to check whether release tag exists"),
668    }
669}
670
671fn is_missing_manifest_error(err: &oci_distribution::errors::OciDistributionError) -> bool {
672    let msg = err.to_string().to_ascii_lowercase();
673    msg.contains("manifest unknown")
674        || msg.contains("name unknown")
675        || msg.contains("not found")
676        || msg.contains("404")
677}
678
679fn is_unauthorized_error(err: &oci_distribution::errors::OciDistributionError) -> bool {
680    let msg = err.to_string().to_ascii_lowercase();
681    msg.contains("not authorized") || msg.contains("unauthorized") || msg.contains("401")
682}
683
684async fn push_manifest_layer(
685    client: &Client,
686    reference: &Reference,
687    auth: &RegistryAuth,
688    manifest: &ToolchainManifest,
689) -> Result<()> {
690    let data = serde_json::to_vec_pretty(manifest).context("failed to serialize manifest")?;
691    let layer = ImageLayer::new(data, TOOLCHAIN_LAYER_MEDIA_TYPE.to_string(), None);
692    let config = Config::new(
693        br#"{"toolchain":"gtc"}"#.to_vec(),
694        TOOLCHAIN_CONFIG_MEDIA_TYPE.to_string(),
695        None,
696    );
697    client
698        .push(reference, &[layer], config, auth, None)
699        .await
700        .context("failed to push toolchain manifest")?;
701    Ok(())
702}
703
704#[cfg(test)]
705mod tests {
706    use super::*;
707
708    struct FixedResolver;
709
710    impl CrateVersionResolver for FixedResolver {
711        fn resolve_latest(&self, crate_name: &str) -> Result<String> {
712            Ok(match crate_name {
713                "greentic-runner" => "0.5.10",
714                _ => "1.2.3",
715            }
716            .to_string())
717        }
718    }
719
720    #[test]
721    fn parses_cargo_search_version() {
722        let version = parse_cargo_search_version(
723            "greentic-dev",
724            r#"greentic-dev = "0.5.1"    # Developer CLI"#,
725        )
726        .unwrap();
727        assert_eq!(version, "0.5.1");
728    }
729
730    #[test]
731    fn generates_manifest_from_catalogue() {
732        let manifest = generate_manifest("1.0.5", "latest", None, &FixedResolver, None).unwrap();
733        assert_eq!(manifest.schema, TOOLCHAIN_MANIFEST_SCHEMA);
734        assert_eq!(manifest.toolchain, TOOLCHAIN_NAME);
735        assert_eq!(manifest.version, "1.0.5");
736        assert_eq!(manifest.channel.as_deref(), Some("latest"));
737        assert!(
738            manifest
739                .packages
740                .iter()
741                .any(|package| package.crate_name == "greentic-bundle"
742                    && package.bins == ["greentic-bundle"])
743        );
744        assert!(
745            manifest
746                .packages
747                .iter()
748                .any(|package| package.crate_name == "greentic-runner"
749                    && package.bins == ["greentic-runner"])
750        );
751    }
752
753    #[test]
754    fn source_manifest_can_pin_package_versions() {
755        let source = ToolchainManifest {
756            schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
757            toolchain: TOOLCHAIN_NAME.to_string(),
758            version: "latest".to_string(),
759            channel: Some("latest".to_string()),
760            created_at: None,
761            packages: vec![ToolchainPackage {
762                crate_name: "greentic-dev".to_string(),
763                bins: vec!["greentic-dev".to_string()],
764                version: "0.5.9".to_string(),
765            }],
766        };
767        let manifest =
768            generate_manifest("1.0.5", "latest", Some(&source), &FixedResolver, None).unwrap();
769        let greentic_dev = manifest
770            .packages
771            .iter()
772            .find(|package| package.crate_name == "greentic-dev")
773            .unwrap();
774        assert_eq!(greentic_dev.version, "0.5.9");
775    }
776
777    #[test]
778    fn from_argument_controls_generated_channel_over_source_manifest() {
779        let source = ToolchainManifest {
780            schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
781            toolchain: TOOLCHAIN_NAME.to_string(),
782            version: "latest".to_string(),
783            channel: Some("stable".to_string()),
784            created_at: None,
785            packages: Vec::new(),
786        };
787        let manifest =
788            generate_manifest("1.0.16", "dev", Some(&source), &FixedResolver, None).unwrap();
789        assert_eq!(manifest.channel.as_deref(), Some("dev"));
790        assert_eq!(manifest_file_name(&manifest), "gtc-dev-1.0.16.json");
791    }
792
793    #[test]
794    fn generate_from_dev_uses_dev_crate_and_binary_names() {
795        let manifest = generate_manifest("1.0.16", "dev", None, &FixedResolver, None).unwrap();
796        assert!(
797            manifest
798                .packages
799                .iter()
800                .flat_map(|package| package.bins.iter())
801                .all(|bin| bin.ends_with("-dev"))
802        );
803        assert!(
804            manifest
805                .packages
806                .iter()
807                .all(|package| package.crate_name.ends_with("-dev")),
808            "dev manifest must pin -dev crate names so binstall resolves the dev mirror"
809        );
810        assert!(manifest.packages.iter().any(|package| {
811            package.crate_name == "greentic-flow-dev" && package.bins == ["greentic-flow-dev"]
812        }));
813        assert!(manifest.packages.iter().any(|package| {
814            package.crate_name == "greentic-component-dev"
815                && package.bins == ["greentic-component-dev"]
816        }));
817        assert!(manifest.packages.iter().any(|package| {
818            package.crate_name == "greentic-dev-dev" && package.bins == ["greentic-dev-dev"]
819        }));
820    }
821
822    #[test]
823    fn bootstrap_source_manifest_uses_source_tag_identity() {
824        let manifest = bootstrap_source_manifest("latest", &FixedResolver, None).unwrap();
825        assert_eq!(manifest.version, "latest");
826        assert_eq!(manifest.channel.as_deref(), Some("latest"));
827        assert_eq!(manifest.schema, TOOLCHAIN_MANIFEST_SCHEMA);
828        assert_eq!(manifest.toolchain, TOOLCHAIN_NAME);
829        assert!(
830            manifest
831                .packages
832                .iter()
833                .all(|package| package.version != "latest")
834        );
835    }
836
837    #[test]
838    fn validates_schema_and_toolchain() {
839        let mut manifest =
840            generate_manifest("1.0.5", "latest", None, &FixedResolver, None).unwrap();
841        assert!(validate_manifest(&manifest).is_ok());
842        manifest.schema = "wrong".to_string();
843        assert!(validate_manifest(&manifest).is_err());
844    }
845
846    #[test]
847    fn resolves_inline_registry_token() {
848        assert_eq!(
849            resolve_registry_token(Some("secret-token"))
850                .unwrap()
851                .as_deref(),
852            Some("secret-token")
853        );
854    }
855
856    #[test]
857    fn release_view_tag_prefers_release_or_tag() {
858        let args = ReleaseViewArgs {
859            release: Some("1.0.5".to_string()),
860            tag: None,
861            repo: "ghcr.io/greenticai/greentic-versions/gtc".to_string(),
862            token: None,
863        };
864        assert_eq!(release_view_tag(&args).unwrap(), "1.0.5");
865
866        let args = ReleaseViewArgs {
867            release: None,
868            tag: Some("stable".to_string()),
869            repo: "ghcr.io/greenticai/greentic-versions/gtc".to_string(),
870            token: None,
871        };
872        assert_eq!(release_view_tag(&args).unwrap(), "stable");
873    }
874
875    #[test]
876    fn publish_manifest_input_uses_local_manifest_version() {
877        let dir = tempfile::tempdir().unwrap();
878        let path = dir.path().join("gtc-1.0.12.json");
879        let manifest = generate_manifest("1.0.12", "latest", None, &FixedResolver, None).unwrap();
880        fs::write(&path, serde_json::to_vec_pretty(&manifest).unwrap()).unwrap();
881        let args = ReleasePublishArgs {
882            release: None,
883            from: None,
884            tag: Some("stable".to_string()),
885            manifest: Some(path.clone()),
886            repo: "ghcr.io/greenticai/greentic-versions/gtc".to_string(),
887            token: None,
888            out: dir.path().to_path_buf(),
889            dry_run: true,
890            force: true,
891        };
892        let (release, loaded, source_path) = publish_manifest_input(&args).unwrap();
893        assert_eq!(release, "1.0.12");
894        assert_eq!(loaded, manifest);
895        assert_eq!(
896            source_path,
897            Some(PublishManifestSource::Local(path.clone()))
898        );
899    }
900
901    #[test]
902    fn publish_manifest_input_allows_release_override_for_local_manifest() {
903        let dir = tempfile::tempdir().unwrap();
904        let path = dir.path().join("gtc-1.0.13.json");
905        let manifest = generate_manifest("1.0.12", "latest", None, &FixedResolver, None).unwrap();
906        fs::write(&path, serde_json::to_vec_pretty(&manifest).unwrap()).unwrap();
907        let args = ReleasePublishArgs {
908            release: Some("1.0.13".to_string()),
909            from: None,
910            tag: Some("stable".to_string()),
911            manifest: Some(path.clone()),
912            repo: "ghcr.io/greenticai/greentic-versions/gtc".to_string(),
913            token: None,
914            out: dir.path().to_path_buf(),
915            dry_run: true,
916            force: true,
917        };
918        let (release, loaded, source_path) = publish_manifest_input(&args).unwrap();
919        assert_eq!(release, "1.0.13");
920        assert_eq!(loaded.version, "1.0.13");
921        assert_eq!(
922            source_path,
923            Some(PublishManifestSource::Local(path.clone()))
924        );
925    }
926
927    #[test]
928    fn manifest_file_name_omits_stable_channel() {
929        let manifest = ToolchainManifest {
930            schema: TOOLCHAIN_MANIFEST_SCHEMA.to_string(),
931            toolchain: TOOLCHAIN_NAME.to_string(),
932            version: "1.0.12".to_string(),
933            channel: Some("stable".to_string()),
934            created_at: None,
935            packages: Vec::new(),
936        };
937        assert_eq!(manifest_file_name(&manifest), "gtc-1.0.12.json");
938    }
939
940    #[test]
941    fn manifest_file_name_includes_non_stable_channel() {
942        let mut manifest = generate_manifest("1.0.12", "dev", None, &FixedResolver, None).unwrap();
943        assert_eq!(manifest_file_name(&manifest), "gtc-dev-1.0.12.json");
944
945        manifest.channel = Some("customer-a".to_string());
946        assert_eq!(manifest_file_name(&manifest), "gtc-customer-a-1.0.12.json");
947    }
948
949    #[test]
950    fn latest_manifest_uses_latest_dev_bins() {
951        let manifest = latest_manifest(None);
952        assert_eq!(manifest.version, "latest");
953        assert_eq!(manifest.channel.as_deref(), Some("latest"));
954        assert_eq!(manifest.schema, TOOLCHAIN_MANIFEST_SCHEMA);
955        assert_eq!(manifest.toolchain, TOOLCHAIN_NAME);
956        assert!(!manifest.packages.is_empty());
957        assert!(
958            manifest
959                .packages
960                .iter()
961                .all(|package| package.version == "latest")
962        );
963        assert!(
964            manifest
965                .packages
966                .iter()
967                .flat_map(|package| package.bins.iter())
968                .all(|bin| bin.ends_with("-dev"))
969        );
970        assert!(
971            manifest
972                .packages
973                .iter()
974                .all(|package| package.crate_name.ends_with("-dev")),
975            "latest-channel manifest mirrors dev binaries, so crate names must be -dev too"
976        );
977        assert!(
978            manifest
979                .packages
980                .iter()
981                .any(|package| { package.crate_name == "gtc-dev" && package.bins == ["gtc-dev"] })
982        );
983        assert!(manifest.packages.iter().any(|package| {
984            package.crate_name == "greentic-dev-dev" && package.bins == ["greentic-dev-dev"]
985        }));
986    }
987
988    #[test]
989    fn builds_toolchain_ref() {
990        assert_eq!(
991            toolchain_ref("ghcr.io/greenticai/greentic-versions/gtc", "stable"),
992            "ghcr.io/greenticai/greentic-versions/gtc:stable"
993        );
994    }
995}