Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'spec/lib/gitlab/background_migration/encrypt_columns_spec.rb')
-rw-r--r--spec/lib/gitlab/background_migration/encrypt_columns_spec.rb96
1 files changed, 0 insertions, 96 deletions
diff --git a/spec/lib/gitlab/background_migration/encrypt_columns_spec.rb b/spec/lib/gitlab/background_migration/encrypt_columns_spec.rb
deleted file mode 100644
index 6d3ccde7df2..00000000000
--- a/spec/lib/gitlab/background_migration/encrypt_columns_spec.rb
+++ /dev/null
@@ -1,96 +0,0 @@
-# frozen_string_literal: true
-
-require 'spec_helper'
-
-describe Gitlab::BackgroundMigration::EncryptColumns, schema: 20180910115836 do
- let(:model) { Gitlab::BackgroundMigration::Models::EncryptColumns::WebHook }
- let(:web_hooks) { table(:web_hooks) }
-
- let(:plaintext_attrs) do
- {
- 'encrypted_token' => nil,
- 'encrypted_url' => nil,
- 'token' => 'secret',
- 'url' => 'http://example.com?access_token=secret'
- }
- end
-
- let(:encrypted_attrs) do
- {
- 'encrypted_token' => be_present,
- 'encrypted_url' => be_present,
- 'token' => nil,
- 'url' => nil
- }
- end
-
- describe '#perform' do
- it 'encrypts columns for the specified range' do
- hooks = web_hooks.create([plaintext_attrs] * 5).sort_by(&:id)
-
- # Encrypt all but the first and last rows
- subject.perform(model, [:token, :url], hooks[1].id, hooks[3].id)
-
- hooks = web_hooks.where(id: hooks.map(&:id)).order(:id)
-
- aggregate_failures do
- expect(hooks[0]).to have_attributes(plaintext_attrs)
- expect(hooks[1]).to have_attributes(encrypted_attrs)
- expect(hooks[2]).to have_attributes(encrypted_attrs)
- expect(hooks[3]).to have_attributes(encrypted_attrs)
- expect(hooks[4]).to have_attributes(plaintext_attrs)
- end
- end
-
- it 'acquires an exclusive lock for the update' do
- relation = double('relation', each: nil)
-
- expect(model).to receive(:where) { relation }
- expect(relation).to receive(:lock) { relation }
-
- subject.perform(model, [:token, :url], 1, 1)
- end
-
- it 'skips already-encrypted columns' do
- values = {
- 'encrypted_token' => 'known encrypted token',
- 'encrypted_url' => 'known encrypted url',
- 'token' => 'token',
- 'url' => 'url'
- }
-
- hook = web_hooks.create(values)
-
- subject.perform(model, [:token, :url], hook.id, hook.id)
-
- hook.reload
-
- expect(hook).to have_attributes(values)
- end
-
- it 'reloads the model column information' do
- expect(model).to receive(:reset_column_information).and_call_original
- expect(model).to receive(:define_attribute_methods).and_call_original
-
- subject.perform(model, [:token, :url], 1, 1)
- end
-
- it 'fails if a source column is not present' do
- columns = model.columns.reject { |c| c.name == 'url' }
- allow(model).to receive(:columns) { columns }
-
- expect do
- subject.perform(model, [:token, :url], 1, 1)
- end.to raise_error(/source column: url is missing/)
- end
-
- it 'fails if a destination column is not present' do
- columns = model.columns.reject { |c| c.name == 'encrypted_url' }
- allow(model).to receive(:columns) { columns }
-
- expect do
- subject.perform(model, [:token, :url], 1, 1)
- end.to raise_error(/destination column: encrypted_url is missing/)
- end
- end
-end