forked from AkkomaGang/akkoma
FloatingGhost
98cb255d12
OTP builds to 1.15 Changelog entry Ensure policies are fully loaded Fix :warn use main branch for linkify Fix warn in tests Migrations for phoenix 1.17 Revert "Migrations for phoenix 1.17" This reverts commit 6a3b2f15b74ea5e33150529385215b7a531f3999. Oban upgrade Add default empty whitelist mix format limit test to amd64 OTP 26 tests for 1.15 use OTP_VERSION tag baka just 1.15 Massive deps update Update locale, deps Mix format shell???? multiline??? ? max cases 1 use assert_recieve don't put_env in async tests don't async conn/fs tests mix format FIx some uploader issues Fix tests
124 lines
3.7 KiB
Elixir
124 lines
3.7 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Web.Plugs.AuthenticationPlugTest do
|
|
use Pleroma.Web.ConnCase, async: false
|
|
|
|
alias Pleroma.User
|
|
alias Pleroma.Web.Plugs.AuthenticationPlug
|
|
alias Pleroma.Web.Plugs.OAuthScopesPlug
|
|
alias Pleroma.Web.Plugs.PlugHelper
|
|
|
|
import ExUnit.CaptureLog
|
|
import Pleroma.Factory
|
|
|
|
setup %{conn: conn} do
|
|
user = %User{
|
|
id: 1,
|
|
name: "dude",
|
|
password_hash: Pleroma.Password.hash_pwd_salt("guy")
|
|
}
|
|
|
|
conn =
|
|
conn
|
|
|> assign(:auth_user, user)
|
|
|
|
%{user: user, conn: conn}
|
|
end
|
|
|
|
test "it does nothing if a user is assigned", %{conn: conn} do
|
|
conn =
|
|
conn
|
|
|> assign(:user, %User{})
|
|
|
|
ret_conn =
|
|
conn
|
|
|> AuthenticationPlug.call(%{})
|
|
|
|
assert ret_conn == conn
|
|
end
|
|
|
|
test "with a correct password in the credentials, " <>
|
|
"it assigns the auth_user and marks OAuthScopesPlug as skipped",
|
|
%{conn: conn} do
|
|
conn =
|
|
conn
|
|
|> assign(:auth_credentials, %{password: "guy"})
|
|
|> AuthenticationPlug.call(%{})
|
|
|
|
assert conn.assigns.user == conn.assigns.auth_user
|
|
assert conn.assigns.token == nil
|
|
assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)
|
|
end
|
|
|
|
test "with a bcrypt hash, it updates to an argon2 hash", %{conn: conn} do
|
|
user = insert(:user, password_hash: Bcrypt.hash_pwd_salt("123"))
|
|
assert "$2" <> _ = user.password_hash
|
|
|
|
conn =
|
|
conn
|
|
|> assign(:auth_user, user)
|
|
|> assign(:auth_credentials, %{password: "123"})
|
|
|> AuthenticationPlug.call(%{})
|
|
|
|
assert conn.assigns.user.id == conn.assigns.auth_user.id
|
|
assert conn.assigns.token == nil
|
|
assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)
|
|
|
|
user = User.get_by_id(user.id)
|
|
assert "$argon2" <> _ = user.password_hash
|
|
end
|
|
|
|
test "with a pbkdf2 hash, it updates to an argon2 hash", %{conn: conn} do
|
|
user = insert(:user, password_hash: Pleroma.Password.Pbkdf2.hash_pwd_salt("123"))
|
|
assert "$pbkdf2" <> _ = user.password_hash
|
|
|
|
conn =
|
|
conn
|
|
|> assign(:auth_user, user)
|
|
|> assign(:auth_credentials, %{password: "123"})
|
|
|> AuthenticationPlug.call(%{})
|
|
|
|
assert conn.assigns.user.id == conn.assigns.auth_user.id
|
|
assert conn.assigns.token == nil
|
|
assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)
|
|
|
|
user = User.get_by_id(user.id)
|
|
assert "$argon2" <> _ = user.password_hash
|
|
end
|
|
|
|
describe "checkpw/2" do
|
|
test "check pbkdf2 hash" do
|
|
hash =
|
|
"$pbkdf2-sha512$160000$loXqbp8GYls43F0i6lEfIw$AY.Ep.2pGe57j2hAPY635sI/6w7l9Q9u9Bp02PkPmF3OrClDtJAI8bCiivPr53OKMF7ph6iHhN68Rom5nEfC2A"
|
|
|
|
assert AuthenticationPlug.checkpw("test-password", hash)
|
|
refute AuthenticationPlug.checkpw("test-password1", hash)
|
|
end
|
|
|
|
test "check bcrypt hash" do
|
|
hash = "$2a$10$uyhC/R/zoE1ndwwCtMusK.TLVzkQ/Ugsbqp3uXI.CTTz0gBw.24jS"
|
|
|
|
assert AuthenticationPlug.checkpw("password", hash)
|
|
refute AuthenticationPlug.checkpw("password1", hash)
|
|
end
|
|
|
|
test "check argon2 hash" do
|
|
hash =
|
|
"$argon2id$v=19$m=65536,t=8,p=2$zEMMsTuK5KkL5AFWbX7jyQ$VyaQD7PF6e9btz0oH1YiAkWwIGZ7WNDZP8l+a/O171g"
|
|
|
|
assert AuthenticationPlug.checkpw("password", hash)
|
|
refute AuthenticationPlug.checkpw("password1", hash)
|
|
end
|
|
|
|
test "it returns false when hash invalid" do
|
|
hash =
|
|
"psBWV8gxkGOZWBz$PmfCycChoxeJ3GgGzwvhlgacb9mUoZ.KUXNCssekER4SJ7bOK53uXrHNb2e4i8yPFgSKyzaW9CcmrDXWIEMtD1"
|
|
|
|
assert capture_log(fn ->
|
|
refute AuthenticationPlug.checkpw("password", hash)
|
|
end) =~ "[error] Password hash not recognized"
|
|
end
|
|
end
|
|
end
|