gitlab-org--gitlab-foss/spec/models/key_spec.rb

144 lines
4.1 KiB
Ruby
Raw Normal View History

2011-10-08 17:36:38 -04:00
require 'spec_helper'
describe Key do
include EmailHelpers
2011-10-08 17:36:38 -04:00
describe "Associations" do
it { is_expected.to belong_to(:user) }
2011-10-08 17:36:38 -04:00
end
describe "Validation" do
it { is_expected.to validate_presence_of(:title) }
it { is_expected.to validate_length_of(:title).is_at_most(255) }
it { is_expected.to validate_presence_of(:key) }
it { is_expected.to validate_length_of(:key).is_at_most(5000) }
it { is_expected.to allow_value('ssh-foo').for(:key) }
it { is_expected.to allow_value('ecdsa-foo').for(:key) }
it { is_expected.not_to allow_value('foo-bar').for(:key) }
2011-10-08 17:36:38 -04:00
end
describe "Methods" do
let(:user) { create(:user) }
it { is_expected.to respond_to :projects }
2015-06-19 13:17:34 -04:00
it { is_expected.to respond_to :publishable_key }
describe "#publishable_keys" do
it 'replaces SSH key comment with simple identifier of username + hostname' do
expect(build(:key, user: user).publishable_key).to include("#{user.name} (#{Gitlab.config.gitlab.host})")
2015-06-19 13:17:34 -04:00
end
end
describe "#update_last_used_at" do
let(:key) { create(:key) }
context 'when key was not updated during the last day' do
before do
2017-06-21 09:48:12 -04:00
allow_any_instance_of(Gitlab::ExclusiveLease).to receive(:try_obtain)
.and_return('000000')
end
it 'enqueues a UseKeyWorker job' do
expect(UseKeyWorker).to receive(:perform_async).with(key.id)
key.update_last_used_at
end
end
context 'when key was updated during the last day' do
before do
2017-06-21 09:48:12 -04:00
allow_any_instance_of(Gitlab::ExclusiveLease).to receive(:try_obtain)
.and_return(false)
end
it 'does not enqueue a UseKeyWorker job' do
expect(UseKeyWorker).not_to receive(:perform_async)
key.update_last_used_at
end
end
end
2011-10-08 17:36:38 -04:00
end
context "validation of uniqueness (based on fingerprint uniqueness)" do
2013-05-06 08:09:26 -04:00
let(:user) { create(:user) }
2013-05-06 08:09:26 -04:00
it "accepts the key once" do
expect(build(:key, user: user)).to be_valid
end
2013-07-17 09:16:34 -04:00
it "does not accept the exact same key twice" do
first_key = create(:key, user: user)
expect(build(:key, user: user, key: first_key.key)).not_to be_valid
end
2013-07-17 09:16:34 -04:00
it "does not accept a duplicate key with a different comment" do
first_key = create(:key, user: user)
duplicate = build(:key, user: user, key: first_key.key)
2013-07-17 09:16:34 -04:00
duplicate.key << ' extra comment'
expect(duplicate).not_to be_valid
2013-07-17 09:16:34 -04:00
end
end
context "validate it is a fingerprintable key" do
it "accepts the fingerprintable key" do
expect(build(:key)).to be_valid
end
it 'rejects an unfingerprintable key that contains a space' do
key = build(:key)
# Not always the middle, but close enough
key.key = key.key[0..100] + ' ' + key.key[101..-1]
expect(key).not_to be_valid
end
it 'rejects the unfingerprintable key (not a key)' do
expect(build(:key, key: 'ssh-rsa an-invalid-key==')).not_to be_valid
end
it 'rejects the multiple line key' do
key = build(:key)
2015-12-14 21:53:52 -05:00
key.key.tr!(' ', "\n")
expect(key).not_to be_valid
end
end
context 'callbacks' do
it 'adds new key to authorized_file' do
key = build(:personal_key, id: 7)
expect(GitlabShellWorker).to receive(:perform_async).with(:add_key, key.shell_id, key.key)
key.save!
end
it 'removes key from authorized_file' do
key = create(:personal_key)
expect(GitlabShellWorker).to receive(:perform_async).with(:remove_key, key.shell_id, key.key)
key.destroy
end
end
describe '#key=' do
let(:valid_key) do
"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIEAiPWx6WM4lhHNedGfBpPJNPpZ7yKu+dnn1SJejgt4596k6YjzGGphH2TUxwKzxcKDKKezwkpfnxPkSMkuEspGRt/aZZ9wa++Oi7Qkr8prgHc4soW6NUlfDzpvZK2H5E7eQaSeP3SAwGmQKUFHCddNaP0L+hM7zhFNzjFvpaMgJw0= dummy@gitlab.com"
end
it 'strips white spaces' do
expect(described_class.new(key: " #{valid_key} ").key).to eq(valid_key)
end
end
describe 'notification' do
let(:user) { create(:user) }
it 'sends a notification' do
perform_enqueued_jobs do
create(:key, user: user)
end
should_email(user)
end
end
2011-10-08 17:36:38 -04:00
end