Files
gitlab-foss/spec/models/commit_signatures/gpg_signature_spec.rb
2024-11-15 18:17:36 +00:00

181 lines
5.6 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe CommitSignatures::GpgSignature do
# This commit is seeded from https://gitlab.com/gitlab-org/gitlab-test
# For instructions on how to add more seed data, see the project README
let_it_be(:commit_sha) { '0beec7b5ea3f0fdbc95d0dd47f3c5bc275da8a33' }
let_it_be(:project) { create(:project, :repository, path: 'sample-project') }
let_it_be(:gpg_key) { create(:gpg_key) }
let_it_be(:gpg_key_subkey) { create(:gpg_key_subkey, gpg_key: gpg_key) }
let(:commit) { create(:commit, project: project, sha: commit_sha, author: commit_author) }
let(:commit_author) { gpg_key.user }
let(:signature) { create(:gpg_signature, commit_sha: commit_sha, gpg_key: gpg_key) }
let(:attributes) do
{
commit_sha: commit_sha,
project: project,
gpg_key_primary_keyid: gpg_key.keyid
}
end
it_behaves_like 'having unique enum values'
it_behaves_like 'commit signature'
it_behaves_like 'signature with type checking', :gpg
describe 'associations' do
it { is_expected.to belong_to(:gpg_key) }
it { is_expected.to belong_to(:gpg_key_subkey) }
end
describe 'validation' do
subject { described_class.new }
it { is_expected.to validate_presence_of(:commit_sha) }
it { is_expected.to validate_presence_of(:gpg_key_primary_keyid) }
end
describe '.by_commit_sha scope' do
let_it_be(:another_gpg_signature) { create(:gpg_signature, gpg_key: gpg_key) }
it 'returns all gpg signatures by sha' do
expect(described_class.by_commit_sha(commit_sha)).to match_array([signature])
expect(
described_class.by_commit_sha([commit_sha, another_gpg_signature.commit_sha])
).to contain_exactly(signature, another_gpg_signature)
end
end
describe '#gpg_key=' do
it 'supports the assignment of a GpgKey' do
signature = create(:gpg_signature, gpg_key: gpg_key)
expect(signature.gpg_key).to be_an_instance_of(GpgKey)
end
it 'supports the assignment of a GpgKeySubkey' do
signature = create(:gpg_signature, gpg_key: gpg_key_subkey)
expect(signature.gpg_key).to be_an_instance_of(GpgKeySubkey)
end
it 'clears gpg_key and gpg_key_subkey_id when passing nil' do
signature.update_attribute(:gpg_key, nil)
expect(signature.gpg_key_id).to be_nil
expect(signature.gpg_key_subkey_id).to be_nil
end
end
describe '#gpg_commit' do
context 'when commit does not exist' do
it 'returns nil' do
allow(signature).to receive(:commit).and_return(nil)
expect(signature.gpg_commit).to be_nil
end
end
context 'when commit exists' do
it 'returns an instance of Gitlab::Gpg::Commit' do
allow(signature).to receive(:commit).and_return(commit)
expect(signature.gpg_commit).to be_an_instance_of(Gitlab::Gpg::Commit)
end
end
end
describe '#signed_by_user' do
it 'retrieves the gpg_key user' do
expect(signature.signed_by_user).to eq(gpg_key.user)
end
context 'when signature is verified system and no key is stored' do
let(:user) { create(:user) }
before do
signature.update!(gpg_key_id: nil, gpg_key_user_email: user.email, verification_status: :verified_system)
end
it 'retrieves the user from the gpg signature email' do
expect(signature.signed_by_user).to eq(user)
end
context 'when feature flag is disabled' do
before do
stub_feature_flags(check_for_mailmapped_commit_emails: false)
end
it 'returns nil' do
expect(signature.signed_by_user).to be_nil
end
end
end
end
describe '#reverified_status' do
let(:verification_status) { :verified }
let(:signature) do
create(:gpg_signature, commit_sha: commit_sha, gpg_key: gpg_key, project: project,
verification_status: verification_status)
end
before do
allow(project).to receive(:commit).with(commit_sha).and_return(commit)
end
# verified is used for user signed gpg commits.
context 'when verification_status is verified' do
it 'returns existing verification status' do
expect(signature.reverified_status).to eq('verified')
end
context 'when commit author does not match the gpg_key author' do
let(:commit_author) { create(:user) }
it 'returns unverified_author_email' do
expect(signature.reverified_status).to eq('unverified_author_email')
end
context 'when check_for_mailmapped_commit_emails feature flag is disabled' do
before do
stub_feature_flags(check_for_mailmapped_commit_emails: false)
end
it 'verification status is unmodified' do
expect(signature.reverified_status).to eq('verified')
end
end
end
end
context 'when verification_status not verified' do
let(:verification_status) { :unverified }
it 'returns the signature verification status' do
expect(signature.reverified_status).to eq('unverified')
end
end
# verified_system is used for ui signed commits.
context 'when verification_status is verified_system' do
let(:verification_status) { :verified_system }
it 'returns existing verification status' do
expect(signature.reverified_status).to eq('verified_system')
end
context 'when commit author does not match the gpg_key author' do
let(:commit_author) { create(:user) }
it 'returns existing verification status' do
expect(signature.reverified_status).to eq('unverified_author_email')
end
end
end
end
end