blob: 6b9cd0e3bfc6223fc3eaed9d5027b06e4c89a0b4 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
|
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Gitlab::Ci::SecureFiles::Cer do
context 'when the supplied certificate cannot be parsed' do
let(:invalid_certificate) { described_class.new('xyzabc') }
describe '#certificate_data' do
it 'assigns the error message and returns nil' do
expect(invalid_certificate.certificate_data).to be nil
expect(invalid_certificate.error).to eq('not enough data')
end
end
describe '#metadata' do
it 'returns an empty hash' do
expect(invalid_certificate.metadata).to eq({})
end
end
describe '#expires_at' do
it 'returns nil' do
expect(invalid_certificate.metadata[:expires_at]).to be_nil
end
end
end
context 'when the supplied certificate can be parsed' do
let(:sample_file) { fixture_file('ci_secure_files/sample.cer') }
let(:subject) { described_class.new(sample_file) }
describe '#certificate_data' do
it 'returns an OpenSSL::X509::Certificate object' do
expect(subject.certificate_data.class).to be(OpenSSL::X509::Certificate)
end
end
describe '#metadata' do
it 'returns a hash with the expected keys' do
expect(subject.metadata.keys).to match_array([:issuer, :subject, :id, :expires_at])
end
end
describe '#id' do
it 'returns the certificate serial number' do
expect(subject.metadata[:id]).to eq('33669367788748363528491290218354043267')
end
end
describe '#expires_at' do
it 'returns the certificate expiration timestamp' do
expect(subject.metadata[:expires_at]).to eq('2022-04-26 19:20:40 UTC')
end
end
describe '#issuer' do
it 'calls parse on X509Name' do
expect(subject.metadata[:issuer]["O"]).to eq('Apple Inc.')
end
end
describe '#subject' do
it 'calls parse on X509Name' do
expect(subject.metadata[:subject]["OU"]).to eq('N7SYAN8PX8')
end
end
end
end
|