debian-mirror-gitlab/spec/uploaders/ci/secure_file_uploader_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

73 lines
1.8 KiB
Ruby
Raw Normal View History

2022-03-02 08:16:31 +05:30
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Ci::SecureFileUploader do
subject { ci_secure_file.file }
let(:project) { create(:project) }
let(:ci_secure_file) { create(:ci_secure_file) }
let(:sample_file) { fixture_file('ci_secure_files/upload-keystore.jks') }
before do
stub_ci_secure_file_object_storage
end
describe '#key' do
it 'creates a digest with a secret key and the project id' do
2022-06-21 17:19:12 +05:30
expect(Digest::SHA256)
2022-03-02 08:16:31 +05:30
.to receive(:digest)
2022-06-21 17:19:12 +05:30
.with(ci_secure_file.key_data)
2022-03-02 08:16:31 +05:30
.and_return('digest')
expect(subject.key).to eq('digest')
end
end
describe '.checksum' do
it 'returns a SHA256 checksum for the unencrypted file' do
expect(subject.checksum).to eq(Digest::SHA256.hexdigest(sample_file))
end
end
describe 'encryption' do
it 'encrypts the stored file' do
expect(Base64.encode64(subject.file.read)).not_to eq(Base64.encode64(sample_file))
end
it 'decrypts the file when reading' do
expect(Base64.encode64(subject.read)).to eq(Base64.encode64(sample_file))
end
end
describe '.direct_upload_enabled?' do
it 'returns false' do
expect(described_class.direct_upload_enabled?).to eq(false)
end
end
describe '.background_upload_enabled?' do
it 'returns false' do
expect(described_class.background_upload_enabled?).to eq(false)
end
end
describe '.default_store' do
context 'when object storage is enabled' do
it 'returns REMOTE' do
expect(described_class.default_store).to eq(ObjectStorage::Store::REMOTE)
end
end
context 'when object storage is disabled' do
before do
stub_ci_secure_file_object_storage(enabled: false)
end
it 'returns LOCAL' do
expect(described_class.default_store).to eq(ObjectStorage::Store::LOCAL)
end
end
end
end