summaryrefslogtreecommitdiff
path: root/spec/validators
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-11-19 08:27:35 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2020-11-19 08:27:35 +0000
commit7e9c479f7de77702622631cff2628a9c8dcbc627 (patch)
treec8f718a08e110ad7e1894510980d2155a6549197 /spec/validators
parente852b0ae16db4052c1c567d9efa4facc81146e88 (diff)
downloadgitlab-ce-7e9c479f7de77702622631cff2628a9c8dcbc627.tar.gz
Add latest changes from gitlab-org/gitlab@13-6-stable-eev13.6.0-rc42
Diffstat (limited to 'spec/validators')
-rw-r--r--spec/validators/rsa_key_validator_spec.rb40
1 files changed, 40 insertions, 0 deletions
diff --git a/spec/validators/rsa_key_validator_spec.rb b/spec/validators/rsa_key_validator_spec.rb
new file mode 100644
index 00000000000..b4e74ec5605
--- /dev/null
+++ b/spec/validators/rsa_key_validator_spec.rb
@@ -0,0 +1,40 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe RsaKeyValidator do
+ let(:validatable) do
+ Class.new do
+ include ActiveModel::Validations
+
+ attr_accessor :signing_key
+
+ validates :signing_key, rsa_key: true
+
+ def initialize(signing_key)
+ @signing_key = signing_key
+ end
+ end
+ end
+
+ subject(:validator) { described_class.new(attributes: [:signing_key]) }
+
+ it 'is not valid when invalid RSA key is provided' do
+ record = validatable.new('invalid RSA key')
+
+ validator.validate(record)
+
+ aggregate_failures do
+ expect(record).not_to be_valid
+ expect(record.errors[:signing_key]).to include('is not a valid RSA key')
+ end
+ end
+
+ it 'is valid when valid RSA key is provided' do
+ record = validatable.new(OpenSSL::PKey::RSA.new(1024).to_pem)
+
+ validator.validate(record)
+
+ expect(record).to be_valid
+ end
+end