BigW Consortium Gitlab

key_spec.rb 4.1 KB
Newer Older
gitlabhq committed
1 2
require 'spec_helper'

Douwe Maan committed
3
describe Key, models: true do
4 5
  include EmailHelpers

gitlabhq committed
6
  describe "Associations" do
7
    it { is_expected.to belong_to(:user) }
gitlabhq committed
8 9 10
  end

  describe "Validation" do
11
    it { is_expected.to validate_presence_of(:title) }
12 13
    it { is_expected.to validate_length_of(:title).is_at_most(255) }

14
    it { is_expected.to validate_presence_of(:key) }
15 16 17 18
    it { is_expected.to validate_length_of(:key).is_at_most(5000) }
    it { is_expected.to allow_value('ssh-foo').for(:key) }
    it { is_expected.to allow_value('ecdsa-foo').for(:key) }
    it { is_expected.not_to allow_value('foo-bar').for(:key) }
gitlabhq committed
19 20
  end

Nihad Abbasov committed
21
  describe "Methods" do
22
    let(:user) { create(:user) }
23
    it { is_expected.to respond_to :projects }
24 25 26
    it { is_expected.to respond_to :publishable_key }

    describe "#publishable_keys" do
27
      it 'replaces SSH key comment with simple identifier of username + hostname' do
28
        expect(build(:key, user: user).publishable_key).to include("#{user.name} (#{Gitlab.config.gitlab.host})")
29 30
      end
    end
31 32

    describe "#update_last_used_at" do
33
      let(:key) { create(:key) }
34

35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56
      context 'when key was not updated during the last day' do
        before do
          allow_any_instance_of(Gitlab::ExclusiveLease).to receive(:try_obtain).
            and_return('000000')
        end

        it 'enqueues a UseKeyWorker job' do
          expect(UseKeyWorker).to receive(:perform_async).with(key.id)
          key.update_last_used_at
        end
      end

      context 'when key was updated during the last day' do
        before do
          allow_any_instance_of(Gitlab::ExclusiveLease).to receive(:try_obtain).
            and_return(false)
        end

        it 'does not enqueue a UseKeyWorker job' do
          expect(UseKeyWorker).not_to receive(:perform_async)
          key.update_last_used_at
        end
57 58
      end
    end
gitlabhq committed
59 60
  end

61
  context "validation of uniqueness (based on fingerprint uniqueness)" do
62
    let(:user) { create(:user) }
63

64
    it "accepts the key once" do
65
      expect(build(:key, user: user)).to be_valid
66 67
    end

68
    it "does not accept the exact same key twice" do
69
      create(:key, user: user)
70
      expect(build(:key, user: user)).not_to be_valid
71
    end
72 73 74 75 76

    it "does not accept a duplicate key with a different comment" do
      create(:key, user: user)
      duplicate = build(:key, user: user)
      duplicate.key << ' extra comment'
77
      expect(duplicate).not_to be_valid
78
    end
79
  end
80 81 82

  context "validate it is a fingerprintable key" do
    it "accepts the fingerprintable key" do
83
      expect(build(:key)).to be_valid
84 85
    end

86 87 88 89
    it 'rejects an unfingerprintable key that contains a space' do
      key = build(:key)

      # Not always the middle, but close enough
90
      key.key = key.key[0..100] + ' ' + key.key[101..-1]
91 92

      expect(key).not_to be_valid
93
    end
94

95 96
    it 'rejects the unfingerprintable key (not a key)' do
      expect(build(:key, key: 'ssh-rsa an-invalid-key==')).not_to be_valid
97
    end
98 99 100

    it 'rejects the multiple line key' do
      key = build(:key)
101
      key.key.tr!(' ', "\n")
102 103
      expect(key).not_to be_valid
    end
104
  end
105 106

  context 'callbacks' do
107
    it 'adds new key to authorized_file' do
108 109 110
      key = build(:personal_key, id: 7)
      expect(GitlabShellWorker).to receive(:perform_async).with(:add_key, key.shell_id, key.key)
      key.save!
111 112
    end

113
    it 'removes key from authorized_file' do
114 115 116
      key = create(:personal_key)
      expect(GitlabShellWorker).to receive(:perform_async).with(:remove_key, key.shell_id, key.key)
      key.destroy
117 118
    end
  end
119 120 121 122 123 124 125 126 127 128

  describe '#key=' do
    let(:valid_key) do
      "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIEAiPWx6WM4lhHNedGfBpPJNPpZ7yKu+dnn1SJejgt4596k6YjzGGphH2TUxwKzxcKDKKezwkpfnxPkSMkuEspGRt/aZZ9wa++Oi7Qkr8prgHc4soW6NUlfDzpvZK2H5E7eQaSeP3SAwGmQKUFHCddNaP0L+hM7zhFNzjFvpaMgJw0= dummy@gitlab.com"
    end

    it 'strips white spaces' do
      expect(described_class.new(key: " #{valid_key} ").key).to eq(valid_key)
    end
  end
129 130 131 132 133 134 135 136 137 138 139 140

  describe 'notification' do
    let(:user) { create(:user) }

    it 'sends a notification' do
      perform_enqueued_jobs do
        create(:key, user: user)
      end

      should_email(user)
    end
  end
gitlabhq committed
141
end