Add (QUnit) server tests
This commit is contained in:
parent
ef82f2640f
commit
136920404d
201
server/tests/test.js
Normal file
201
server/tests/test.js
Normal file
|
@ -0,0 +1,201 @@
|
||||||
|
server_url = "https://gpass.soutade.fr";
|
||||||
|
current_user = "test-v7";
|
||||||
|
pbkdf2_level = 1000;
|
||||||
|
CRYPTO_V1_COMPATIBLE = 1;
|
||||||
|
use_shadow_logins = false;
|
||||||
|
|
||||||
|
/*
|
||||||
|
Must contains :
|
||||||
|
URL login password masterkey
|
||||||
|
-----------------------------------------------------------------
|
||||||
|
v7 format
|
||||||
|
test test test test
|
||||||
|
test2 test2 test2 test2 (+shadow login)
|
||||||
|
test16 test16 testtesttesttest test16
|
||||||
|
test17 test17 testtesttesttestt test17
|
||||||
|
v8 format
|
||||||
|
testv8 testv8 testv8 testv8
|
||||||
|
testv8_2 testv8_2 testv8_2 testv8_2 (+shadow login)
|
||||||
|
testv8_16 testv8_16 testtesttesttest testv8_16
|
||||||
|
testv8_17 testv8_17 testtesttesttestt testv8_17
|
||||||
|
|
||||||
|
We assume shadow logins are enabled in server side
|
||||||
|
*/
|
||||||
|
|
||||||
|
function alert(a) {}
|
||||||
|
function nb_unciphered_passwords(passwords)
|
||||||
|
{
|
||||||
|
var nb_unciphered = 0;
|
||||||
|
for(i=0;i<passwords.length; i++)
|
||||||
|
{
|
||||||
|
if (passwords[i].unciphered)
|
||||||
|
nb_unciphered++;
|
||||||
|
}
|
||||||
|
return nb_unciphered;
|
||||||
|
}
|
||||||
|
|
||||||
|
function find_password(passwords, login)
|
||||||
|
{
|
||||||
|
for(i=0; i<passwords.length; i++)
|
||||||
|
{
|
||||||
|
if (passwords[i].clear_login == login)
|
||||||
|
return passwords[i];
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async function decrypt_passwords(passwords, masterkey)
|
||||||
|
{
|
||||||
|
var nb_unciphered = 0;
|
||||||
|
|
||||||
|
for(nb_unciphered = 0, i=0;i<passwords.length; i++)
|
||||||
|
{
|
||||||
|
res = await passwords[i].decrypt(current_mkey);
|
||||||
|
if (res == true)
|
||||||
|
nb_unciphered++;
|
||||||
|
}
|
||||||
|
|
||||||
|
return nb_unciphered;
|
||||||
|
}
|
||||||
|
|
||||||
|
QUnit.test( "Testbench", async function( assert ) {
|
||||||
|
assert.ok( passwords == null, "Initial passwords null" );
|
||||||
|
list_all_entries(current_user);
|
||||||
|
assert.ok( passwords != null, "Retrieved passwords" );
|
||||||
|
assert.equal( passwords.length, 8, "8 passwords retrieved" );
|
||||||
|
var shadow_logins = 0;
|
||||||
|
for(i=0;i<passwords.length; i++)
|
||||||
|
if (passwords[i].shadow_login.length)
|
||||||
|
shadow_logins++;
|
||||||
|
assert.ok( shadow_logins == 2, "2 shadow logins" );
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "test");
|
||||||
|
var nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal( nb_unciphered, 1, "test #1 decrypted" );
|
||||||
|
|
||||||
|
await get_ciphered_credentials(current_mkey);
|
||||||
|
res = nb_unciphered_passwords(passwords);
|
||||||
|
assert.equal(res, 1, "No more passwords unciphered with shadow logins");
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "test2");
|
||||||
|
|
||||||
|
// Get ciphered credentials for "test2"
|
||||||
|
await get_ciphered_credentials(current_mkey);
|
||||||
|
res = nb_unciphered_passwords(passwords);
|
||||||
|
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 1, "Shadow logins OK");
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "test16");
|
||||||
|
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 1, "Test16 OK");
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "test17");
|
||||||
|
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 1, "Test17 OK");
|
||||||
|
|
||||||
|
// V8
|
||||||
|
current_mkey = derive_mkey(current_user, "testv8");
|
||||||
|
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 1, "Testv8 OK");
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "testv8_2");
|
||||||
|
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 0, "Testv8_2 without shadow login");
|
||||||
|
|
||||||
|
await get_ciphered_credentials(current_mkey);
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 1, "Testv8_2 OK");
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "testv8_16");
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 1, "Testv8_16 OK");
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "testv8_17");
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 1, "Testv8_17 OK");
|
||||||
|
|
||||||
|
nb_unciphered = nb_unciphered_passwords(passwords);
|
||||||
|
assert.equal(nb_unciphered, 8, "All passwords unciphered");
|
||||||
|
|
||||||
|
password = find_password(passwords, "testv8");
|
||||||
|
var ok = remove_password_server(current_user, passwords[i].ciphered_login,
|
||||||
|
passwords[i].access_token);
|
||||||
|
assert.equal(ok, true, "Remove OK");
|
||||||
|
alert(passwords[i].ciphered_login);
|
||||||
|
ok = remove_password_server(current_user, passwords[i].ciphered_login,
|
||||||
|
passwords[i].access_token);
|
||||||
|
assert.equal(ok, true, "Double remove OK");
|
||||||
|
|
||||||
|
password = find_password(passwords, "testv8_2");
|
||||||
|
ok = remove_password_server(current_user, passwords[i].ciphered_login,
|
||||||
|
"");
|
||||||
|
assert.equal(ok, false, "Remove without access token OK");
|
||||||
|
|
||||||
|
ok = remove_password_server(current_user, passwords[i].ciphered_login,
|
||||||
|
"AAAAAAAAAAAAAAAA");
|
||||||
|
assert.equal(ok, false, "Remove Bad access token");
|
||||||
|
|
||||||
|
|
||||||
|
res = await construct_pentry(current_user, "testv8_new", "testv8_new", "testv8_new", "testv8_new", true).then(
|
||||||
|
function (pentry) {
|
||||||
|
if (pentry == null) return false;
|
||||||
|
|
||||||
|
return add_password_server(current_user, pentry);
|
||||||
|
});
|
||||||
|
|
||||||
|
assert.equal(res, false, "Add without access token OK");
|
||||||
|
|
||||||
|
use_shadow_logins = true;
|
||||||
|
|
||||||
|
res = await construct_pentry(current_user, "testv8_new", "testv8_new", "testv8_new", "testv8_new", true).then(
|
||||||
|
function (pentry) {
|
||||||
|
if (pentry == null) return false;
|
||||||
|
|
||||||
|
return add_password_server(current_user, pentry);
|
||||||
|
});
|
||||||
|
|
||||||
|
assert.equal(res, true, "Add with access token OK");
|
||||||
|
res = add_password_server(current_user, passwords[passwords.length-1]);
|
||||||
|
assert.equal(res, false, "Double add OK");
|
||||||
|
|
||||||
|
res = await construct_pentry(current_user, "testv8_new2", "testv8_new2", "testv8_new2", "testv8_new2", true).then(
|
||||||
|
function (pentry) {
|
||||||
|
if (pentry == null) return false;
|
||||||
|
|
||||||
|
pentry.shadow_login = "AAA";
|
||||||
|
return add_password_server(current_user, pentry);
|
||||||
|
});
|
||||||
|
|
||||||
|
assert.equal(res, false, "Add with truncated shadow login OK");
|
||||||
|
|
||||||
|
password = find_password(passwords, "test16");
|
||||||
|
ok = remove_password_server(current_user, password.ciphered_login,
|
||||||
|
password.access_token);
|
||||||
|
assert.equal(ok, true, "Remove v7");
|
||||||
|
|
||||||
|
password = find_password(passwords, "test16");
|
||||||
|
ok = remove_password_server(current_user, password.ciphered_login,
|
||||||
|
"AAAAAAAAAAAAAAAA");
|
||||||
|
assert.equal(ok, true, "Remove v7 bad access token");
|
||||||
|
});
|
||||||
|
|
||||||
|
QUnit.test( "Updated database", async function( assert ) {
|
||||||
|
passwords = null;
|
||||||
|
list_all_entries(current_user);
|
||||||
|
assert.ok( passwords != null, "Passed!" );
|
||||||
|
assert.equal( passwords.length, 7, "7 passwords retrieved" );
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "testv8");
|
||||||
|
var nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal( nb_unciphered, 0, "Password removed" );
|
||||||
|
|
||||||
|
current_mkey = derive_mkey(current_user, "testv8_new");
|
||||||
|
await get_ciphered_credentials(current_mkey);
|
||||||
|
nb_unciphered = await decrypt_passwords(passwords, current_user);
|
||||||
|
assert.equal(nb_unciphered, 1, "Password added");
|
||||||
|
});
|
17
server/tests/tests.html
Normal file
17
server/tests/tests.html
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="viewport" content="width=device-width">
|
||||||
|
<title>QUnit Example</title>
|
||||||
|
<link rel="stylesheet" href="https://code.jquery.com/qunit/qunit-2.3.0.css">
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div id="qunit"></div>
|
||||||
|
<div id="qunit-fixture"></div>
|
||||||
|
<script src="https://code.jquery.com/qunit/qunit-2.3.0.js"></script>
|
||||||
|
<script src="../resources/misc.js"></script>
|
||||||
|
<script src="../resources/gpass.js"></script>
|
||||||
|
<script src="test.js"></script>
|
||||||
|
</body>
|
||||||
|
</html>
|
BIN
server/tests/users/test-v7/gpass.bdd
Normal file
BIN
server/tests/users/test-v7/gpass.bdd
Normal file
Binary file not shown.
BIN
server/tests/users/test-v7/gpass.bdd.init
Normal file
BIN
server/tests/users/test-v7/gpass.bdd.init
Normal file
Binary file not shown.
23
server/tests/users/test-v7/index.php
Normal file
23
server/tests/users/test-v7/index.php
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
<?php
|
||||||
|
/*
|
||||||
|
Copyright (C) 2013 Grégory Soutadé
|
||||||
|
|
||||||
|
This file is part of gPass.
|
||||||
|
|
||||||
|
gPass is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
gPass is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with gPass. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
include "../../_user";
|
||||||
|
|
||||||
|
?>
|
Loading…
Reference in New Issue
Block a user