diff options
Diffstat (limited to 'spec/models/key_spec.rb')
-rw-r--r-- | spec/models/key_spec.rb | 46 |
1 files changed, 23 insertions, 23 deletions
diff --git a/spec/models/key_spec.rb b/spec/models/key_spec.rb index 06d26ef89f1..61ebbfe4e71 100644 --- a/spec/models/key_spec.rb +++ b/spec/models/key_spec.rb @@ -1,4 +1,4 @@ -require 'spec_helper' +require "spec_helper" describe Key, :mailer do describe "Associations" do @@ -18,7 +18,7 @@ describe Key, :mailer do it { is_expected.to allow_value(attributes_for(:dsa_key_2048)[:key]).for(:key) } it { is_expected.to allow_value(attributes_for(:ecdsa_key_256)[:key]).for(:key) } it { is_expected.to allow_value(attributes_for(:ed25519_key_256)[:key]).for(:key) } - it { is_expected.not_to allow_value('foo-bar').for(:key) } + it { is_expected.not_to allow_value("foo-bar").for(:key) } end describe "Methods" do @@ -27,13 +27,13 @@ describe Key, :mailer do it { is_expected.to respond_to :publishable_key } describe "#publishable_keys" do - it 'replaces SSH key comment with simple identifier of username + hostname' do + it "replaces SSH key comment with simple identifier of username + hostname" do expect(build(:key, user: user).publishable_key).to include("#{user.name} (#{Gitlab.config.gitlab.host})") end end describe "#update_last_used_at" do - it 'updates the last used timestamp' do + it "updates the last used timestamp" do key = build(:key) service = double(:service) @@ -64,7 +64,7 @@ describe Key, :mailer do it "does not accept a duplicate key with a different comment" do first_key = create(:key, user: user) duplicate = build(:key, user: user, key: first_key.key) - duplicate.key << ' extra comment' + duplicate.key << " extra comment" expect(duplicate).not_to be_valid end @@ -75,15 +75,15 @@ describe Key, :mailer do expect(build(:key)).to be_valid end - it 'rejects the unfingerprintable key (not a key)' do - expect(build(:key, key: 'ssh-rsa an-invalid-key==')).not_to be_valid + it "rejects the unfingerprintable key (not a key)" do + expect(build(:key, key: "ssh-rsa an-invalid-key==")).not_to be_valid end where(:factory, :chars, :expected_sections) do [ [:key, ["\n", "\r\n"], 3], - [:key, [' ', ' '], 3], - [:key_without_comment, [' ', ' '], 2] + [:key, [" ", " "], 3], + [:key_without_comment, [" ", " "], 2], ] end @@ -91,7 +91,7 @@ describe Key, :mailer do let!(:key) { create(factory) } let!(:original_fingerprint) { key.fingerprint } - it 'accepts a key with blank space characters after stripping them' do + it "accepts a key with blank space characters after stripping them" do modified_key = key.key.insert(100, chars.first).insert(40, chars.last) _, content = modified_key.split @@ -106,7 +106,7 @@ describe Key, :mailer do end end - context 'validate it meets key restrictions' do + context "validate it meets key restrictions" do where(:factory, :minimum, :result) do forbidden = ApplicationSetting::FORBIDDEN_KEY_VALUE @@ -133,7 +133,7 @@ describe Key, :mailer do [:rsa_key_2048, forbidden, false], [:dsa_key_2048, forbidden, false], [:ecdsa_key_256, forbidden, false], - [:ed25519_key_256, forbidden, false] + [:ed25519_key_256, forbidden, false], ] end @@ -148,30 +148,30 @@ describe Key, :mailer do end end - context 'callbacks' do - it 'adds new key to authorized_file' do + context "callbacks" do + it "adds new key to authorized_file" do key = build(:personal_key, id: 7) expect(GitlabShellWorker).to receive(:perform_async).with(:add_key, key.shell_id, key.key) key.save! end - it 'removes key from authorized_file' do + it "removes key from authorized_file" do key = create(:personal_key) expect(GitlabShellWorker).to receive(:perform_async).with(:remove_key, key.shell_id, key.key) key.destroy end end - describe '#key=' do + describe "#key=" do let(:valid_key) do "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIEAiPWx6WM4lhHNedGfBpPJNPpZ7yKu+dnn1SJejgt4596k6YjzGGphH2TUxwKzxcKDKKezwkpfnxPkSMkuEspGRt/aZZ9wa++Oi7Qkr8prgHc4soW6NUlfDzpvZK2H5E7eQaSeP3SAwGmQKUFHCddNaP0L+hM7zhFNzjFvpaMgJw0= dummy@gitlab.com" end - it 'strips white spaces' do + it "strips white spaces" do expect(described_class.new(key: " #{valid_key} ").key).to eq(valid_key) end - it 'invalidates the public_key attribute' do + it "invalidates the public_key attribute" do key = build(:key) original = key.public_key @@ -182,9 +182,9 @@ describe Key, :mailer do end end - describe '#refresh_user_cache', :use_clean_rails_memory_store_caching do - context 'when the key belongs to a user' do - it 'refreshes the keys count cache for the user' do + describe "#refresh_user_cache", :use_clean_rails_memory_store_caching do + context "when the key belongs to a user" do + it "refreshes the keys count cache for the user" do expect_any_instance_of(Users::KeysCountService) .to receive(:refresh_cache) .and_call_original @@ -195,8 +195,8 @@ describe Key, :mailer do end end - context 'when the key does not belong to a user' do - it 'does nothing' do + context "when the key does not belong to a user" do + it "does nothing" do expect_any_instance_of(Users::KeysCountService) .not_to receive(:refresh_cache) |