Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-02-07 03:09:12 +0300
committerGitLab Bot <gitlab-bot@gitlab.com>2020-02-07 03:09:12 +0300
commit6168721025dd8e98caeb2bf6844273e6690eaf69 (patch)
tree8c4fb20d793669e488a739bc9951dab8b363eed4 /spec/models/x509_issuer_spec.rb
parenta89cb5cbdd832d4d9e80517973aceda6bc0a3856 (diff)
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/models/x509_issuer_spec.rb')
-rw-r--r--spec/models/x509_issuer_spec.rb71
1 files changed, 71 insertions, 0 deletions
diff --git a/spec/models/x509_issuer_spec.rb b/spec/models/x509_issuer_spec.rb
new file mode 100644
index 00000000000..f1067cad655
--- /dev/null
+++ b/spec/models/x509_issuer_spec.rb
@@ -0,0 +1,71 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe X509Issuer do
+ describe 'validation' do
+ it { is_expected.to validate_presence_of(:subject_key_identifier) }
+ it { is_expected.to validate_presence_of(:subject) }
+ it { is_expected.to validate_presence_of(:crl_url) }
+ end
+
+ describe '.safe_create!' do
+ let(:issuer_subject_key_identifier) { 'AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB' }
+ let(:issuer_subject) { 'CN=PKI,OU=Example,O=World' }
+ let(:issuer_crl_url) { 'http://example.com/pki.crl' }
+
+ let(:attributes) do
+ {
+ subject_key_identifier: issuer_subject_key_identifier,
+ subject: issuer_subject,
+ crl_url: issuer_crl_url
+ }
+ end
+
+ it 'creates a new issuer if it was not found' do
+ expect { described_class.safe_create!(attributes) }.to change { described_class.count }.by(1)
+ end
+
+ it 'assigns the correct attributes when creating' do
+ issuer = described_class.safe_create!(attributes)
+
+ expect(issuer.subject_key_identifier).to eq(issuer_subject_key_identifier)
+ expect(issuer.subject).to eq(issuer_subject)
+ expect(issuer.crl_url).to eq(issuer_crl_url)
+ end
+ end
+
+ describe 'validators' do
+ it 'accepts correct subject_key_identifier' do
+ subject_key_identifiers = [
+ 'AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB',
+ 'CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD'
+ ]
+
+ subject_key_identifiers.each do |identifier|
+ expect(build(:x509_issuer, subject_key_identifier: identifier)).to be_valid
+ end
+ end
+
+ it 'rejects invalid subject_key_identifier' do
+ subject_key_identifiers = [
+ 'AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB:AB',
+ 'CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:CD:GG',
+ 'random string',
+ '12321342545356434523412341245452345623453542345234523453245'
+ ]
+
+ subject_key_identifiers.each do |identifier|
+ expect(build(:x509_issuer, subject_key_identifier: identifier)).to be_invalid
+ end
+ end
+
+ it 'accepts valid crl_url' do
+ expect(build(:x509_issuer, crl_url: "https://pki.example.org")).to be_valid
+ end
+
+ it 'rejects invalid crl_url' do
+ expect(build(:x509_issuer, crl_url: "ht://pki.example.org")).to be_invalid
+ end
+ end
+end