@@ -281,44 +281,14 @@ begin_test "ghe-restore with no pages backup"
281
281
)
282
282
end_test
283
283
284
- # Setup Actions data for the subsequent tests
285
- setup_actions_test_data " $GHE_DATA_DIR /1"
286
-
287
- begin_test " ghe-restore invokes ghe-import-mssql"
288
- (
289
- set -e
290
- rm -rf " $GHE_REMOTE_ROOT_DIR "
291
- setup_remote_metadata
292
- enable_actions
293
-
294
- # enable maintenance mode and create required directories
295
- setup_maintenance_mode
296
-
297
- # set restore host environ var
298
- GHE_RESTORE_HOST=127.0.0.1
299
- export GHE_RESTORE_HOST
300
-
301
- # run ghe-restore and write output to file for asserting against
302
- if ! ghe-restore -v -f > " $TRASHDIR /restore-out" 2>&1 ; then
303
- cat " $TRASHDIR /restore-out"
304
- : ghe-restore should have exited successfully
305
- false
306
- fi
307
-
308
- grep -q " Restoring MSSQL database" " $TRASHDIR /restore-out"
309
- grep -q " ghe-import-mssql .* OK" " $TRASHDIR /restore-out"
310
- )
311
- end_test
312
-
313
- begin_test " ghe-restore with Kredz settings"
284
+ begin_test " ghe-restore with encrypted column encryption keying material"
314
285
(
315
286
set -e
316
287
rm -rf " $GHE_REMOTE_ROOT_DIR "
317
288
setup_remote_metadata
318
- enable_actions
319
289
320
290
required_files=(
321
- " kredz-credz-hmac "
291
+ " encrypted-column-encryption-keying-material "
322
292
)
323
293
324
294
for file in " ${required_files[@]} " ; do
@@ -327,24 +297,23 @@ begin_test "ghe-restore with Kredz settings"
327
297
328
298
ghe-restore -v -f localhost
329
299
required_secrets=(
330
- " secrets.kredz.credz-hmac-secret "
300
+ " secrets.github.encrypted-column-keying-material "
331
301
)
332
-
302
+
333
303
for secret in " ${required_secrets[@]} " ; do
334
304
[ " $( ghe-ssh " $GHE_HOSTNAME " -- ghe-config " $secret " ) " = " foo" ]
335
305
done
336
306
)
337
307
end_test
338
308
339
- begin_test " ghe-restore with kredz-varz settings "
309
+ begin_test " ghe-restore with encrypted column current encryption key "
340
310
(
341
311
set -e
342
312
rm -rf " $GHE_REMOTE_ROOT_DIR "
343
313
setup_remote_metadata
344
- enable_actions
345
314
346
315
required_files=(
347
- " kredz-varz-hmac "
316
+ " encrypted-column-current-encryption-key "
348
317
)
349
318
350
319
for file in " ${required_files[@]} " ; do
@@ -353,7 +322,7 @@ begin_test "ghe-restore with kredz-varz settings"
353
322
354
323
ghe-restore -v -f localhost
355
324
required_secrets=(
356
- " secrets.kredz.varz-hmac-secret "
325
+ " secrets.github.encrypted-column-current-encryption-key "
357
326
)
358
327
359
328
for secret in " ${required_secrets[@]} " ; do
@@ -362,15 +331,44 @@ begin_test "ghe-restore with kredz-varz settings"
362
331
)
363
332
end_test
364
333
334
+ # Setup Actions data for the subsequent tests
335
+ setup_actions_test_data " $GHE_DATA_DIR /1"
365
336
366
- begin_test " ghe-restore with encrypted column encryption keying material "
337
+ begin_test " ghe-restore invokes ghe-import-mssql "
367
338
(
368
339
set -e
369
340
rm -rf " $GHE_REMOTE_ROOT_DIR "
370
341
setup_remote_metadata
342
+ enable_actions
343
+
344
+ # enable maintenance mode and create required directories
345
+ setup_maintenance_mode
346
+
347
+ # set restore host environ var
348
+ GHE_RESTORE_HOST=127.0.0.1
349
+ export GHE_RESTORE_HOST
350
+
351
+ # run ghe-restore and write output to file for asserting against
352
+ if ! ghe-restore -v -f > " $TRASHDIR /restore-out" 2>&1 ; then
353
+ cat " $TRASHDIR /restore-out"
354
+ : ghe-restore should have exited successfully
355
+ false
356
+ fi
357
+
358
+ grep -q " Restoring MSSQL database" " $TRASHDIR /restore-out"
359
+ grep -q " ghe-import-mssql .* OK" " $TRASHDIR /restore-out"
360
+ )
361
+ end_test
362
+
363
+ begin_test " ghe-restore with Kredz settings"
364
+ (
365
+ set -e
366
+ rm -rf " $GHE_REMOTE_ROOT_DIR "
367
+ setup_remote_metadata
368
+ enable_actions
371
369
372
370
required_files=(
373
- " encrypted-column-encryption-keying-material "
371
+ " kredz-credz-hmac "
374
372
)
375
373
376
374
for file in " ${required_files[@]} " ; do
@@ -379,7 +377,7 @@ begin_test "ghe-restore with encrypted column encryption keying material"
379
377
380
378
ghe-restore -v -f localhost
381
379
required_secrets=(
382
- " secrets.github.encrypted-column-keying-material "
380
+ " secrets.kredz.credz-hmac-secret "
383
381
)
384
382
385
383
for secret in " ${required_secrets[@]} " ; do
@@ -388,14 +386,15 @@ begin_test "ghe-restore with encrypted column encryption keying material"
388
386
)
389
387
end_test
390
388
391
- begin_test " ghe-restore with encrypted column current encryption key "
389
+ begin_test " ghe-restore with kredz-varz settings "
392
390
(
393
391
set -e
394
392
rm -rf " $GHE_REMOTE_ROOT_DIR "
395
393
setup_remote_metadata
394
+ enable_actions
396
395
397
396
required_files=(
398
- " encrypted-column-current-encryption-key "
397
+ " kredz-varz-hmac "
399
398
)
400
399
401
400
for file in " ${required_files[@]} " ; do
@@ -404,7 +403,7 @@ begin_test "ghe-restore with encrypted column current encryption key"
404
403
405
404
ghe-restore -v -f localhost
406
405
required_secrets=(
407
- " secrets.github.encrypted-column-current-encryption-key "
406
+ " secrets.kredz.varz-hmac-secret "
408
407
)
409
408
410
409
for secret in " ${required_secrets[@]} " ; do
0 commit comments