Skip to content

Commit 30d759f

Browse files
committed
move encrypted column encryption key restore tests _above_ actions setup
1 parent 3b2f1c1 commit 30d759f

File tree

1 file changed

+43
-44
lines changed

1 file changed

+43
-44
lines changed

test/test-ghe-restore.sh

Lines changed: 43 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -281,44 +281,14 @@ begin_test "ghe-restore with no pages backup"
281281
)
282282
end_test
283283

284-
# Setup Actions data for the subsequent tests
285-
setup_actions_test_data "$GHE_DATA_DIR/1"
286-
287-
begin_test "ghe-restore invokes ghe-import-mssql"
288-
(
289-
set -e
290-
rm -rf "$GHE_REMOTE_ROOT_DIR"
291-
setup_remote_metadata
292-
enable_actions
293-
294-
# enable maintenance mode and create required directories
295-
setup_maintenance_mode
296-
297-
# set restore host environ var
298-
GHE_RESTORE_HOST=127.0.0.1
299-
export GHE_RESTORE_HOST
300-
301-
# run ghe-restore and write output to file for asserting against
302-
if ! ghe-restore -v -f > "$TRASHDIR/restore-out" 2>&1; then
303-
cat "$TRASHDIR/restore-out"
304-
: ghe-restore should have exited successfully
305-
false
306-
fi
307-
308-
grep -q "Restoring MSSQL database" "$TRASHDIR/restore-out"
309-
grep -q "ghe-import-mssql .* OK" "$TRASHDIR/restore-out"
310-
)
311-
end_test
312-
313-
begin_test "ghe-restore with Kredz settings"
284+
begin_test "ghe-restore with encrypted column encryption keying material"
314285
(
315286
set -e
316287
rm -rf "$GHE_REMOTE_ROOT_DIR"
317288
setup_remote_metadata
318-
enable_actions
319289

320290
required_files=(
321-
"kredz-credz-hmac"
291+
"encrypted-column-encryption-keying-material"
322292
)
323293

324294
for file in "${required_files[@]}"; do
@@ -327,24 +297,23 @@ begin_test "ghe-restore with Kredz settings"
327297

328298
ghe-restore -v -f localhost
329299
required_secrets=(
330-
"secrets.kredz.credz-hmac-secret"
300+
"secrets.github.encrypted-column-keying-material"
331301
)
332-
302+
333303
for secret in "${required_secrets[@]}"; do
334304
[ "$(ghe-ssh "$GHE_HOSTNAME" -- ghe-config "$secret")" = "foo" ]
335305
done
336306
)
337307
end_test
338308

339-
begin_test "ghe-restore with kredz-varz settings"
309+
begin_test "ghe-restore with encrypted column current encryption key"
340310
(
341311
set -e
342312
rm -rf "$GHE_REMOTE_ROOT_DIR"
343313
setup_remote_metadata
344-
enable_actions
345314

346315
required_files=(
347-
"kredz-varz-hmac"
316+
"encrypted-column-current-encryption-key"
348317
)
349318

350319
for file in "${required_files[@]}"; do
@@ -353,7 +322,7 @@ begin_test "ghe-restore with kredz-varz settings"
353322

354323
ghe-restore -v -f localhost
355324
required_secrets=(
356-
"secrets.kredz.varz-hmac-secret"
325+
"secrets.github.encrypted-column-current-encryption-key"
357326
)
358327

359328
for secret in "${required_secrets[@]}"; do
@@ -362,15 +331,44 @@ begin_test "ghe-restore with kredz-varz settings"
362331
)
363332
end_test
364333

334+
# Setup Actions data for the subsequent tests
335+
setup_actions_test_data "$GHE_DATA_DIR/1"
365336

366-
begin_test "ghe-restore with encrypted column encryption keying material"
337+
begin_test "ghe-restore invokes ghe-import-mssql"
367338
(
368339
set -e
369340
rm -rf "$GHE_REMOTE_ROOT_DIR"
370341
setup_remote_metadata
342+
enable_actions
343+
344+
# enable maintenance mode and create required directories
345+
setup_maintenance_mode
346+
347+
# set restore host environ var
348+
GHE_RESTORE_HOST=127.0.0.1
349+
export GHE_RESTORE_HOST
350+
351+
# run ghe-restore and write output to file for asserting against
352+
if ! ghe-restore -v -f > "$TRASHDIR/restore-out" 2>&1; then
353+
cat "$TRASHDIR/restore-out"
354+
: ghe-restore should have exited successfully
355+
false
356+
fi
357+
358+
grep -q "Restoring MSSQL database" "$TRASHDIR/restore-out"
359+
grep -q "ghe-import-mssql .* OK" "$TRASHDIR/restore-out"
360+
)
361+
end_test
362+
363+
begin_test "ghe-restore with Kredz settings"
364+
(
365+
set -e
366+
rm -rf "$GHE_REMOTE_ROOT_DIR"
367+
setup_remote_metadata
368+
enable_actions
371369

372370
required_files=(
373-
"encrypted-column-encryption-keying-material"
371+
"kredz-credz-hmac"
374372
)
375373

376374
for file in "${required_files[@]}"; do
@@ -379,7 +377,7 @@ begin_test "ghe-restore with encrypted column encryption keying material"
379377

380378
ghe-restore -v -f localhost
381379
required_secrets=(
382-
"secrets.github.encrypted-column-keying-material"
380+
"secrets.kredz.credz-hmac-secret"
383381
)
384382

385383
for secret in "${required_secrets[@]}"; do
@@ -388,14 +386,15 @@ begin_test "ghe-restore with encrypted column encryption keying material"
388386
)
389387
end_test
390388

391-
begin_test "ghe-restore with encrypted column current encryption key"
389+
begin_test "ghe-restore with kredz-varz settings"
392390
(
393391
set -e
394392
rm -rf "$GHE_REMOTE_ROOT_DIR"
395393
setup_remote_metadata
394+
enable_actions
396395

397396
required_files=(
398-
"encrypted-column-current-encryption-key"
397+
"kredz-varz-hmac"
399398
)
400399

401400
for file in "${required_files[@]}"; do
@@ -404,7 +403,7 @@ begin_test "ghe-restore with encrypted column current encryption key"
404403

405404
ghe-restore -v -f localhost
406405
required_secrets=(
407-
"secrets.github.encrypted-column-current-encryption-key"
406+
"secrets.kredz.varz-hmac-secret"
408407
)
409408

410409
for secret in "${required_secrets[@]}"; do

0 commit comments

Comments
 (0)