debian-mirror-gitlab/spec/lib/gitlab/ci/secure_files/cer_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

70 lines
2 KiB
Ruby
Raw Normal View History

2022-11-25 23:54:43 +05:30
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Gitlab::Ci::SecureFiles::Cer do
context 'when the supplied certificate cannot be parsed' do
let(:invalid_certificate) { described_class.new('xyzabc') }
describe '#certificate_data' do
it 'assigns the error message and returns nil' do
expect(invalid_certificate.certificate_data).to be nil
expect(invalid_certificate.error).to eq('not enough data')
end
end
describe '#metadata' do
it 'returns an empty hash' do
expect(invalid_certificate.metadata).to eq({})
end
end
describe '#expires_at' do
it 'returns nil' do
expect(invalid_certificate.metadata[:expires_at]).to be_nil
end
end
end
context 'when the supplied certificate can be parsed' do
let(:sample_file) { fixture_file('ci_secure_files/sample.cer') }
let(:subject) { described_class.new(sample_file) }
describe '#certificate_data' do
it 'returns an OpenSSL::X509::Certificate object' do
expect(subject.certificate_data.class).to be(OpenSSL::X509::Certificate)
end
end
describe '#metadata' do
it 'returns a hash with the expected keys' do
expect(subject.metadata.keys).to match_array([:issuer, :subject, :id, :expires_at])
end
end
describe '#id' do
it 'returns the certificate serial number' do
expect(subject.metadata[:id]).to eq('33669367788748363528491290218354043267')
end
end
describe '#expires_at' do
it 'returns the certificate expiration timestamp' do
expect(subject.metadata[:expires_at]).to eq('2022-04-26 19:20:40 UTC')
end
end
describe '#issuer' do
it 'calls parse on X509Name' do
expect(subject.metadata[:issuer]["O"]).to eq('Apple Inc.')
end
end
describe '#subject' do
it 'calls parse on X509Name' do
expect(subject.metadata[:subject]["OU"]).to eq('N7SYAN8PX8')
end
end
end
end