mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
59c8d50653
* bin/*, lib/bundler/*, lib/bundler.rb, spec/bundler, man/*: Merge from latest stable branch of bundler/bundler repository and added workaround patches. I will backport them into upstream. * common.mk, defs/gmake.mk: Added `test-bundler` task for test suite of bundler. * tool/sync_default_gems.rb: Added sync task for bundler. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@65509 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
77 lines
2.4 KiB
Ruby
77 lines
2.4 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require "rubygems/security"
|
|
|
|
# unfortunately, testing signed gems with a provided CA is extremely difficult
|
|
# as 'gem cert' is currently the only way to add CAs to the system.
|
|
|
|
RSpec.describe "policies with unsigned gems" do
|
|
before do
|
|
build_security_repo
|
|
gemfile <<-G
|
|
source "file://#{security_repo}"
|
|
gem "rack"
|
|
gem "signed_gem"
|
|
G
|
|
end
|
|
|
|
it "will work after you try to deploy without a lock" do
|
|
bundle "install --deployment"
|
|
bundle :install
|
|
expect(exitstatus).to eq(0) if exitstatus
|
|
expect(the_bundle).to include_gems "rack 1.0", "signed_gem 1.0"
|
|
end
|
|
|
|
it "will fail when given invalid security policy" do
|
|
bundle "install --trust-policy=InvalidPolicyName"
|
|
expect(out).to include("RubyGems doesn't know about trust policy")
|
|
end
|
|
|
|
it "will fail with High Security setting due to presence of unsigned gem" do
|
|
bundle "install --trust-policy=HighSecurity"
|
|
expect(out).to include("security policy didn't allow")
|
|
end
|
|
|
|
# This spec will fail on RubyGems 2 rc1 due to a bug in policy.rb. the bug is fixed in rc3.
|
|
it "will fail with Medium Security setting due to presence of unsigned gem", :unless => ENV["RGV"] == "v2.0.0.rc.1" do
|
|
bundle "install --trust-policy=MediumSecurity"
|
|
expect(out).to include("security policy didn't allow")
|
|
end
|
|
|
|
it "will succeed with no policy" do
|
|
bundle "install"
|
|
expect(exitstatus).to eq(0) if exitstatus
|
|
end
|
|
end
|
|
|
|
RSpec.describe "policies with signed gems and no CA" do
|
|
before do
|
|
build_security_repo
|
|
gemfile <<-G
|
|
source "file://#{security_repo}"
|
|
gem "signed_gem"
|
|
G
|
|
end
|
|
|
|
it "will fail with High Security setting, gem is self-signed" do
|
|
bundle "install --trust-policy=HighSecurity"
|
|
expect(out).to include("security policy didn't allow")
|
|
end
|
|
|
|
it "will fail with Medium Security setting, gem is self-signed" do
|
|
bundle "install --trust-policy=MediumSecurity"
|
|
expect(out).to include("security policy didn't allow")
|
|
end
|
|
|
|
it "will succeed with Low Security setting, low security accepts self signed gem" do
|
|
bundle "install --trust-policy=LowSecurity"
|
|
expect(exitstatus).to eq(0) if exitstatus
|
|
expect(the_bundle).to include_gems "signed_gem 1.0"
|
|
end
|
|
|
|
it "will succeed with no policy" do
|
|
bundle "install"
|
|
expect(exitstatus).to eq(0) if exitstatus
|
|
expect(the_bundle).to include_gems "signed_gem 1.0"
|
|
end
|
|
end
|