2020-06-23 00:09:42 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe Gitlab::Doctor::Secrets do
|
2020-06-23 00:09:42 +05:30
|
|
|
let!(:user) { create(:user, otp_secret: "test") }
|
|
|
|
let!(:group) { create(:group, runners_token: "test") }
|
2021-11-18 22:05:49 +05:30
|
|
|
let!(:project) { create(:project) }
|
|
|
|
let!(:grafana_integration) { create(:grafana_integration, project: project, token: "test") }
|
2020-06-23 00:09:42 +05:30
|
|
|
let(:logger) { double(:logger).as_null_object }
|
|
|
|
|
|
|
|
subject { described_class.new(logger).run! }
|
|
|
|
|
|
|
|
context 'when encrypted attributes are properly set' do
|
|
|
|
it 'detects decryptable secrets' do
|
|
|
|
expect(logger).to receive(:info).with(/User failures: 0/)
|
|
|
|
expect(logger).to receive(:info).with(/Group failures: 0/)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when attr_encrypted values are not decrypting' do
|
|
|
|
it 'marks undecryptable values as bad' do
|
|
|
|
user.encrypted_otp_secret = "invalid"
|
|
|
|
user.save!
|
|
|
|
|
|
|
|
expect(logger).to receive(:info).with(/User failures: 1/)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when TokenAuthenticatable values are not decrypting' do
|
|
|
|
it 'marks undecryptable values as bad' do
|
|
|
|
group.runners_token_encrypted = "invalid"
|
|
|
|
group.save!
|
|
|
|
|
|
|
|
expect(logger).to receive(:info).with(/Group failures: 1/)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
2021-11-18 22:05:49 +05:30
|
|
|
|
|
|
|
context 'when GrafanaIntegration token is set via private method' do
|
|
|
|
it 'can access GrafanaIntegration token value' do
|
|
|
|
expect(logger).to receive(:info).with(/GrafanaIntegration failures: 0/)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
2020-06-23 00:09:42 +05:30
|
|
|
end
|