summaryrefslogtreecommitdiff
path: root/spec/models/key_spec.rb
diff options
context:
space:
mode:
Diffstat (limited to 'spec/models/key_spec.rb')
-rw-r--r--spec/models/key_spec.rb46
1 files changed, 23 insertions, 23 deletions
diff --git a/spec/models/key_spec.rb b/spec/models/key_spec.rb
index 06d26ef89f1..61ebbfe4e71 100644
--- a/spec/models/key_spec.rb
+++ b/spec/models/key_spec.rb
@@ -1,4 +1,4 @@
-require 'spec_helper'
+require "spec_helper"
describe Key, :mailer do
describe "Associations" do
@@ -18,7 +18,7 @@ describe Key, :mailer do
it { is_expected.to allow_value(attributes_for(:dsa_key_2048)[:key]).for(:key) }
it { is_expected.to allow_value(attributes_for(:ecdsa_key_256)[:key]).for(:key) }
it { is_expected.to allow_value(attributes_for(:ed25519_key_256)[:key]).for(:key) }
- it { is_expected.not_to allow_value('foo-bar').for(:key) }
+ it { is_expected.not_to allow_value("foo-bar").for(:key) }
end
describe "Methods" do
@@ -27,13 +27,13 @@ describe Key, :mailer do
it { is_expected.to respond_to :publishable_key }
describe "#publishable_keys" do
- it 'replaces SSH key comment with simple identifier of username + hostname' do
+ it "replaces SSH key comment with simple identifier of username + hostname" do
expect(build(:key, user: user).publishable_key).to include("#{user.name} (#{Gitlab.config.gitlab.host})")
end
end
describe "#update_last_used_at" do
- it 'updates the last used timestamp' do
+ it "updates the last used timestamp" do
key = build(:key)
service = double(:service)
@@ -64,7 +64,7 @@ describe Key, :mailer do
it "does not accept a duplicate key with a different comment" do
first_key = create(:key, user: user)
duplicate = build(:key, user: user, key: first_key.key)
- duplicate.key << ' extra comment'
+ duplicate.key << " extra comment"
expect(duplicate).not_to be_valid
end
@@ -75,15 +75,15 @@ describe Key, :mailer do
expect(build(:key)).to be_valid
end
- it 'rejects the unfingerprintable key (not a key)' do
- expect(build(:key, key: 'ssh-rsa an-invalid-key==')).not_to be_valid
+ it "rejects the unfingerprintable key (not a key)" do
+ expect(build(:key, key: "ssh-rsa an-invalid-key==")).not_to be_valid
end
where(:factory, :chars, :expected_sections) do
[
[:key, ["\n", "\r\n"], 3],
- [:key, [' ', ' '], 3],
- [:key_without_comment, [' ', ' '], 2]
+ [:key, [" ", " "], 3],
+ [:key_without_comment, [" ", " "], 2],
]
end
@@ -91,7 +91,7 @@ describe Key, :mailer do
let!(:key) { create(factory) }
let!(:original_fingerprint) { key.fingerprint }
- it 'accepts a key with blank space characters after stripping them' do
+ it "accepts a key with blank space characters after stripping them" do
modified_key = key.key.insert(100, chars.first).insert(40, chars.last)
_, content = modified_key.split
@@ -106,7 +106,7 @@ describe Key, :mailer do
end
end
- context 'validate it meets key restrictions' do
+ context "validate it meets key restrictions" do
where(:factory, :minimum, :result) do
forbidden = ApplicationSetting::FORBIDDEN_KEY_VALUE
@@ -133,7 +133,7 @@ describe Key, :mailer do
[:rsa_key_2048, forbidden, false],
[:dsa_key_2048, forbidden, false],
[:ecdsa_key_256, forbidden, false],
- [:ed25519_key_256, forbidden, false]
+ [:ed25519_key_256, forbidden, false],
]
end
@@ -148,30 +148,30 @@ describe Key, :mailer do
end
end
- context 'callbacks' do
- it 'adds new key to authorized_file' do
+ context "callbacks" do
+ it "adds new key to authorized_file" do
key = build(:personal_key, id: 7)
expect(GitlabShellWorker).to receive(:perform_async).with(:add_key, key.shell_id, key.key)
key.save!
end
- it 'removes key from authorized_file' do
+ it "removes key from authorized_file" do
key = create(:personal_key)
expect(GitlabShellWorker).to receive(:perform_async).with(:remove_key, key.shell_id, key.key)
key.destroy
end
end
- describe '#key=' do
+ describe "#key=" do
let(:valid_key) do
"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIEAiPWx6WM4lhHNedGfBpPJNPpZ7yKu+dnn1SJejgt4596k6YjzGGphH2TUxwKzxcKDKKezwkpfnxPkSMkuEspGRt/aZZ9wa++Oi7Qkr8prgHc4soW6NUlfDzpvZK2H5E7eQaSeP3SAwGmQKUFHCddNaP0L+hM7zhFNzjFvpaMgJw0= dummy@gitlab.com"
end
- it 'strips white spaces' do
+ it "strips white spaces" do
expect(described_class.new(key: " #{valid_key} ").key).to eq(valid_key)
end
- it 'invalidates the public_key attribute' do
+ it "invalidates the public_key attribute" do
key = build(:key)
original = key.public_key
@@ -182,9 +182,9 @@ describe Key, :mailer do
end
end
- describe '#refresh_user_cache', :use_clean_rails_memory_store_caching do
- context 'when the key belongs to a user' do
- it 'refreshes the keys count cache for the user' do
+ describe "#refresh_user_cache", :use_clean_rails_memory_store_caching do
+ context "when the key belongs to a user" do
+ it "refreshes the keys count cache for the user" do
expect_any_instance_of(Users::KeysCountService)
.to receive(:refresh_cache)
.and_call_original
@@ -195,8 +195,8 @@ describe Key, :mailer do
end
end
- context 'when the key does not belong to a user' do
- it 'does nothing' do
+ context "when the key does not belong to a user" do
+ it "does nothing" do
expect_any_instance_of(Users::KeysCountService)
.not_to receive(:refresh_cache)