52 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			52 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| require 'spec_helper'
 | |
| 
 | |
| RSpec.describe Gitlab::Pages do
 | |
|   using RSpec::Parameterized::TableSyntax
 | |
| 
 | |
|   let(:pages_secret) { SecureRandom.random_bytes(Gitlab::Pages::SECRET_LENGTH) }
 | |
| 
 | |
|   before do
 | |
|     allow(described_class).to receive(:secret).and_return(pages_secret)
 | |
|   end
 | |
| 
 | |
|   describe '.verify_api_request' do
 | |
|     let(:payload) { { 'iss' => 'gitlab-pages' } }
 | |
| 
 | |
|     it 'returns false if fails to validate the JWT' do
 | |
|       encoded_token = JWT.encode(payload, 'wrongsecret', 'HS256')
 | |
|       headers = { described_class::INTERNAL_API_REQUEST_HEADER => encoded_token }
 | |
| 
 | |
|       expect(described_class.verify_api_request(headers)).to eq(false)
 | |
|     end
 | |
| 
 | |
|     it 'returns the decoded JWT' do
 | |
|       encoded_token = JWT.encode(payload, described_class.secret, 'HS256')
 | |
|       headers = { described_class::INTERNAL_API_REQUEST_HEADER => encoded_token }
 | |
| 
 | |
|       expect(described_class.verify_api_request(headers)).to eq([{ "iss" => "gitlab-pages" }, { "alg" => "HS256" }])
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '.access_control_is_forced?' do
 | |
|     subject { described_class.access_control_is_forced? }
 | |
| 
 | |
|     where(:access_control_is_enabled, :access_control_is_forced, :result) do
 | |
|       false | false | false
 | |
|       false | true  | false
 | |
|       true  | false | false
 | |
|       true  | true  | true
 | |
|     end
 | |
| 
 | |
|     with_them do
 | |
|       before do
 | |
|         stub_pages_setting(access_control: access_control_is_enabled)
 | |
|         stub_application_setting(force_pages_access_control: access_control_is_forced)
 | |
|       end
 | |
| 
 | |
|       it { is_expected.to eq(result) }
 | |
|     end
 | |
|   end
 | |
| end
 |