mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-12-04 23:22:51 +01:00
f8b471ace1
Fixes #28660 Fixes an admin api bug related to `user.LoginSource` Fixed `/user/emails` response not identical to GitHub api This PR unifies the user update methods. The goal is to keep the logic only at one place (having audit logs in mind). For example, do the password checks only in one method not everywhere a password is updated. After that PR is merged, the user creation should be next.
109 lines
2.7 KiB
Go
109 lines
2.7 KiB
Go
// Copyright 2023 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package pwn
|
|
|
|
import (
|
|
"math/rand"
|
|
"net/http"
|
|
"os"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
var client = New(WithHTTP(&http.Client{
|
|
Timeout: time.Second * 2,
|
|
}))
|
|
|
|
func TestMain(m *testing.M) {
|
|
rand.Seed(time.Now().Unix())
|
|
os.Exit(m.Run())
|
|
}
|
|
|
|
func TestPassword(t *testing.T) {
|
|
// Check input error
|
|
_, err := client.CheckPassword("", false)
|
|
assert.ErrorIs(t, err, ErrEmptyPassword, "blank input should return ErrEmptyPassword")
|
|
|
|
// Should fail
|
|
fail := "password1234"
|
|
count, err := client.CheckPassword(fail, false)
|
|
assert.NotEmpty(t, count, "%s should fail as a password", fail)
|
|
assert.NoError(t, err)
|
|
|
|
// Should fail (with padding)
|
|
failPad := "administrator"
|
|
count, err = client.CheckPassword(failPad, true)
|
|
assert.NotEmpty(t, count, "%s should fail as a password", failPad)
|
|
assert.NoError(t, err)
|
|
|
|
// Checking for a "good" password isn't going to be perfect, but we can give it a good try
|
|
// with hopefully minimal error. Try five times?
|
|
assert.Condition(t, func() bool {
|
|
for i := 0; i <= 5; i++ {
|
|
count, err = client.CheckPassword(testPassword(), false)
|
|
assert.NoError(t, err)
|
|
if count == 0 {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}, "no generated passwords passed. there is a chance this is a fluke")
|
|
|
|
// Again, but with padded responses
|
|
assert.Condition(t, func() bool {
|
|
for i := 0; i <= 5; i++ {
|
|
count, err = client.CheckPassword(testPassword(), true)
|
|
assert.NoError(t, err)
|
|
if count == 0 {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}, "no generated passwords passed. there is a chance this is a fluke")
|
|
}
|
|
|
|
// Credit to https://golangbyexample.com/generate-random-password-golang/
|
|
// DO NOT USE THIS FOR AN ACTUAL PASSWORD GENERATOR
|
|
var (
|
|
lowerCharSet = "abcdedfghijklmnopqrst"
|
|
upperCharSet = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
|
|
specialCharSet = "!@#$%&*"
|
|
numberSet = "0123456789"
|
|
allCharSet = lowerCharSet + upperCharSet + specialCharSet + numberSet
|
|
)
|
|
|
|
func testPassword() string {
|
|
var password strings.Builder
|
|
|
|
// Set special character
|
|
for i := 0; i < 5; i++ {
|
|
random := rand.Intn(len(specialCharSet))
|
|
password.WriteString(string(specialCharSet[random]))
|
|
}
|
|
|
|
// Set numeric
|
|
for i := 0; i < 5; i++ {
|
|
random := rand.Intn(len(numberSet))
|
|
password.WriteString(string(numberSet[random]))
|
|
}
|
|
|
|
// Set uppercase
|
|
for i := 0; i < 5; i++ {
|
|
random := rand.Intn(len(upperCharSet))
|
|
password.WriteString(string(upperCharSet[random]))
|
|
}
|
|
|
|
for i := 0; i < 5; i++ {
|
|
random := rand.Intn(len(allCharSet))
|
|
password.WriteString(string(allCharSet[random]))
|
|
}
|
|
inRune := []rune(password.String())
|
|
rand.Shuffle(len(inRune), func(i, j int) {
|
|
inRune[i], inRune[j] = inRune[j], inRune[i]
|
|
})
|
|
return string(inRune)
|
|
}
|