Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2023-10-19 15:57:54 +0300
committerGitLab Bot <gitlab-bot@gitlab.com>2023-10-19 15:57:54 +0300
commit419c53ec62de6e97a517abd5fdd4cbde3a942a34 (patch)
tree1f43a548b46bca8a5fb8fe0c31cef1883d49c5b6 /spec/tasks/gitlab/doctor/secrets_rake_spec.rb
parent1da20d9135b3ad9e75e65b028bffc921aaf8deb7 (diff)
Add latest changes from gitlab-org/gitlab@16-5-stable-eev16.5.0-rc42
Diffstat (limited to 'spec/tasks/gitlab/doctor/secrets_rake_spec.rb')
-rw-r--r--spec/tasks/gitlab/doctor/secrets_rake_spec.rb56
1 files changed, 56 insertions, 0 deletions
diff --git a/spec/tasks/gitlab/doctor/secrets_rake_spec.rb b/spec/tasks/gitlab/doctor/secrets_rake_spec.rb
new file mode 100644
index 00000000000..91ef3c57d73
--- /dev/null
+++ b/spec/tasks/gitlab/doctor/secrets_rake_spec.rb
@@ -0,0 +1,56 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe 'gitlab:doctor:reset_encrypted_tokens', :silence_stdout, feature_category: :runner_fleet do
+ let(:model_names) { 'Project,Group' }
+ let(:token_names) { 'runners_token' }
+
+ let(:project_with_cipher_error) do
+ create(:project).tap do |project|
+ project.update_columns(runners_token_encrypted:
+ '|rXs75DSHXPE9MGAIgyxcut8pZc72gaa/2ojU0GS1+R+cXNqkbUB13Vb5BaMwf47d98980fc1')
+ end
+ end
+
+ before(:context) do
+ Rake.application.rake_require 'tasks/gitlab/doctor/secrets'
+ end
+
+ before do
+ stub_env('MODEL_NAMES', model_names)
+ stub_env('TOKEN_NAMES', token_names)
+ end
+
+ subject(:run!) do
+ run_rake_task('gitlab:doctor:reset_encrypted_tokens')
+ end
+
+ it 'properly parces parameters from the environment variables' do
+ expect_next_instance_of(::Gitlab::Doctor::ResetTokens, anything,
+ model_names: %w[Project Group],
+ token_names: %w[runners_token],
+ dry_run: true) do |service|
+ expect(service).to receive(:run!).and_call_original
+ end
+
+ run!
+ end
+
+ it "doesn't do anything in DRY_RUN mode(default)" do
+ expect do
+ run!
+ end.not_to change { project_with_cipher_error.reload.runners_token_encrypted }
+ end
+
+ it 'regenerates broken token if DRY_RUN is set to false' do
+ stub_env('DRY_RUN', false)
+
+ expect { project_with_cipher_error.runners_token }.to raise_error(OpenSSL::Cipher::CipherError)
+ expect do
+ run!
+ end.to change { project_with_cipher_error.reload.runners_token_encrypted }
+
+ expect { project_with_cipher_error.runners_token }.not_to raise_error
+ end
+end