diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2019-12-11 18:08:10 +0000 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2019-12-11 18:08:10 +0000 |
commit | 175b4fa261259ab0d033482d10bb4159fee8e538 (patch) | |
tree | e1f1dba5e41177f11ffded5a505e0e7f692b8df5 /spec/finders/keys_finder_spec.rb | |
parent | 4eea104c69e59f6fa53c7bc15b986c69f29b60c8 (diff) | |
download | gitlab-ce-175b4fa261259ab0d033482d10bb4159fee8e538.tar.gz |
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/finders/keys_finder_spec.rb')
-rw-r--r-- | spec/finders/keys_finder_spec.rb | 77 |
1 files changed, 77 insertions, 0 deletions
diff --git a/spec/finders/keys_finder_spec.rb b/spec/finders/keys_finder_spec.rb new file mode 100644 index 00000000000..147e6ee3d84 --- /dev/null +++ b/spec/finders/keys_finder_spec.rb @@ -0,0 +1,77 @@ +# frozen_string_literal: true + +require 'spec_helper' + +describe KeysFinder do + subject(:keys_finder) { described_class.new(user, params) } + + let(:user) { create(:user) } + let(:fingerprint_type) { 'md5' } + let(:fingerprint) { 'ba:81:59:68:d7:6c:cd:02:02:bf:6a:9b:55:4e:af:d1' } + + let(:params) do + { + type: fingerprint_type, + fingerprint: fingerprint + } + end + + let!(:key) do + create(:key, user: user, + key: 'ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIEAiPWx6WM4lhHNedGfBpPJNPpZ7yKu+dnn1SJejgt1016k6YjzGGphH2TUxwKzxcKDKKezwkpfnxPkSMkuEspGRt/aZZ9wa++Oi7Qkr8prgHc4soW6NUlfDzpvZK2H5E7eQaSeP3SAwGmQKUFHCddNaP0L+hM7zhFNzjFvpaMgJw0=', + fingerprint: 'ba:81:59:68:d7:6c:cd:02:02:bf:6a:9b:55:4e:af:d1', + fingerprint_sha256: 'nUhzNyftwADy8AH3wFY31tAKs7HufskYTte2aXo/lCg' + ) + end + + context 'with a regular user' do + it 'raises GitLabAccessDeniedError' do + expect do + keys_finder.execute + end.to raise_error(KeysFinder::GitLabAccessDeniedError) + end + end + + context 'with an admin user' do + let(:user) {create(:admin)} + + context 'with invalid MD5 fingerprint' do + let(:fingerprint) { '11:11:11:11' } + + it 'raises InvalidFingerprint' do + expect { keys_finder.execute } + .to raise_error(KeysFinder::InvalidFingerprint) + end + end + + context 'with invalid SHA fingerprint' do + let(:fingerprint_type) { 'sha256' } + let(:fingerprint) { 'nUhzNyftwAAKs7HufskYTte2g' } + + it 'raises InvalidFingerprint' do + expect { keys_finder.execute } + .to raise_error(KeysFinder::InvalidFingerprint) + end + end + + context 'with valid MD5 params' do + it 'returns key if the fingerprint is found' do + result = keys_finder.execute + + expect(result).to eq(key) + expect(key.user).to eq(user) + end + end + + context 'with valid SHA256 params' do + let(:fingerprint) { 'ba:81:59:68:d7:6c:cd:02:02:bf:6a:9b:55:4e:af:d1' } + + it 'returns key if the fingerprint is found' do + result = keys_finder.execute + + expect(result).to eq(key) + expect(key.user).to eq(user) + end + end + end +end |