summaryrefslogtreecommitdiff
path: root/spec/lib/gitlab/gpg/invalid_gpg_signature_updater_spec.rb
blob: 48f8fa285aac6f6188d0847d2c6589a0e6ade28f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
require 'rails_helper'

RSpec.describe Gitlab::Gpg::InvalidGpgSignatureUpdater do
  describe '#run' do
    context 'gpg signature did not have an associated gpg key' do
      let!(:commit_sha) { '0beec7b5ea3f0fdbc95d0dd47f3c5bc275da8a33' }
      let!(:project) { create :project, :repository, path: 'sample-project' }
      let!(:commit) do
        raw_commit = double(:raw_commit, signature: [
          GpgHelpers::User1.signed_commit_signature,
          GpgHelpers::User1.signed_commit_base_data
        ], sha: commit_sha)
        allow(raw_commit).to receive :save!

        create :commit, git_commit: raw_commit, project: project
      end

      let!(:gpg_signature) do
        create :gpg_signature,
          project: project,
          commit_sha: commit_sha,
          gpg_key: nil,
          gpg_key_primary_keyid: GpgHelpers::User1.primary_keyid,
          valid_signature: false
      end

      before do
        allow(Gitlab::Git::Commit).to receive(:find).with(kind_of(Repository), commit_sha).and_return(commit)
      end

      it 'updates the signature to being valid when the missing gpg key is added' do
        # InvalidGpgSignatureUpdater is called by the after_create hook
        create :gpg_key,
          key: GpgHelpers::User1.public_key,
          user: create(:user, email: GpgHelpers::User1.emails.first)

        expect(gpg_signature.reload.valid_signature).to be_truthy
      end

      it 'keeps the signature at being invalid when an unrelated gpg key is added' do
        # InvalidGpgSignatureUpdater is called by the after_create hook
        create :gpg_key,
          key: GpgHelpers::User2.public_key,
          user: create(:user, email: GpgHelpers::User2.emails.first)

        expect(gpg_signature.reload.valid_signature).to be_falsey
      end
    end
  end
end