-
Notifications
You must be signed in to change notification settings - Fork 288
Expand file tree
/
Copy pathfetch_test.rb
More file actions
84 lines (64 loc) · 1.92 KB
/
fetch_test.rb
File metadata and controls
84 lines (64 loc) · 1.92 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
require 'test_helper'
class OnlineFetchTest < Rugged::OnlineTestCase
def setup
super
@repo = Rugged::Repository.init_at(File.join(@_sandbox_path, "repo"))
end
def teardown
@repo.close
super
end
if git_creds?
def test_fetch_over_git
reset_remote_repo
@repo.remotes.create("origin", ENV['GITTEST_REMOTE_GIT_URL'])
@repo.fetch("origin")
end
end
if Rugged.features.include?(:https)
def test_fetch_over_https
@repo.remotes.create("origin", "https://github.com/libgit2/TestGitRepository.git")
@repo.fetch("origin")
assert_equal [
"refs/remotes/origin/first-merge",
"refs/remotes/origin/master",
"refs/remotes/origin/no-parent",
"refs/tags/annotated_tag",
"refs/tags/blob",
"refs/tags/commit_tree"
], @repo.refs.map(&:name).sort
end
end
if Rugged.features.include?(:ssh) && ssh_creds?
def test_fetch_over_ssh_with_credentials
reset_remote_repo
@repo.remotes.create("origin", ENV['GITTEST_REMOTE_SSH_URL'])
@repo.fetch("origin", {
credentials: ssh_key_credential
})
end
def test_fetch_over_ssh_with_credentials_from_memory
reset_remote_repo
@repo.remotes.create("origin", ENV['GITTEST_REMOTE_SSH_URL'])
@repo.fetch("origin", {
credentials: ssh_key_credential_from_memory
})
end
def test_fetch_over_ssh_with_credentials_from_agent
reset_remote_repo
@repo.remotes.create("origin", ENV['GITTEST_REMOTE_SSH_URL'])
@repo.fetch("origin", {
credentials: ssh_key_credential_from_agent
})
end
def test_fetch_over_ssh_with_credentials_callback
reset_remote_repo
@repo.remotes.create("origin", ENV['GITTEST_REMOTE_SSH_URL'])
@repo.fetch("origin", {
credentials: lambda { |url, username, allowed_types|
return ssh_key_credential
}
})
end
end
end