snappass/tests.py

145 lines
5.4 KiB
Python
Raw Normal View History

2018-05-06 23:28:46 +02:00
from mock import patch
import re
2016-10-25 01:21:08 +02:00
import time
2013-10-05 23:12:31 +02:00
import unittest
import uuid
2013-10-05 23:12:31 +02:00
from unittest import TestCase
from cryptography.fernet import Fernet
from freezegun import freeze_time
2016-07-18 22:36:06 +02:00
from werkzeug.exceptions import BadRequest
from fakeredis import FakeStrictRedis
2020-05-08 23:34:41 +02:00
from six.moves.urllib.parse import unquote
2013-10-05 23:12:31 +02:00
2016-07-18 20:52:37 +02:00
# noinspection PyPep8Naming
2013-10-05 23:12:31 +02:00
import snappass.main as snappass
__author__ = 'davedash'
class SnapPassTestCase(TestCase):
@patch('redis.client.StrictRedis', FakeStrictRedis)
2013-10-05 23:12:31 +02:00
def test_get_password(self):
password = "melatonin overdose 1337!$"
key = snappass.set_password(password, 30)
self.assertEqual(password, snappass.get_password(key))
# Assert that we can't look this up a second time.
self.assertIsNone(snappass.get_password(key))
2013-10-05 23:12:31 +02:00
def test_password_is_not_stored_in_plaintext(self):
password = "trustno1"
token = snappass.set_password(password, 30)
redis_key = token.split(snappass.TOKEN_SEPARATOR)[0]
stored_password_text = snappass.redis_client.get(redis_key).decode('utf-8')
self.assertNotIn(password, stored_password_text)
def test_returned_token_format(self):
password = "trustsome1"
token = snappass.set_password(password, 30)
token_fragments = token.split(snappass.TOKEN_SEPARATOR)
self.assertEqual(2, len(token_fragments))
redis_key, encryption_key = token_fragments
2018-07-01 19:19:56 +02:00
self.assertEqual(32 + len(snappass.REDIS_PREFIX), len(redis_key))
try:
Fernet(encryption_key.encode('utf-8'))
except ValueError:
self.fail('the encryption key is not valid')
def test_encryption_key_is_returned(self):
password = "trustany1"
token = snappass.set_password(password, 30)
token_fragments = token.split(snappass.TOKEN_SEPARATOR)
redis_key, encryption_key = token_fragments
stored_password = snappass.redis_client.get(redis_key)
fernet = Fernet(encryption_key.encode('utf-8'))
decrypted_password = fernet.decrypt(stored_password).decode('utf-8')
self.assertEqual(password, decrypted_password)
def test_unencrypted_passwords_still_work(self):
unencrypted_password = "trustevery1"
storage_key = uuid.uuid4().hex
snappass.redis_client.setex(storage_key, 30, unencrypted_password)
retrieved_password = snappass.get_password(storage_key)
self.assertEqual(unencrypted_password, retrieved_password)
def test_password_is_decoded(self):
password = "correct horse battery staple"
key = snappass.set_password(password, 30)
self.assertFalse(isinstance(snappass.get_password(key), bytes))
2013-10-05 23:12:31 +02:00
def test_clean_input(self):
# Test Bad Data
with snappass.app.test_request_context(
"/", data={'password': 'foo', 'ttl': 'bar'}, method='POST'):
2016-07-18 22:36:06 +02:00
self.assertRaises(BadRequest, snappass.clean_input)
2013-10-05 23:12:31 +02:00
# No Password
with snappass.app.test_request_context(
"/", method='POST'):
2016-07-18 22:36:06 +02:00
self.assertRaises(BadRequest, snappass.clean_input)
2013-10-05 23:12:31 +02:00
# No TTL
with snappass.app.test_request_context(
"/", data={'password': 'foo'}, method='POST'):
2016-07-18 22:36:06 +02:00
self.assertRaises(BadRequest, snappass.clean_input)
2013-10-05 23:12:31 +02:00
with snappass.app.test_request_context(
"/", data={'password': 'foo', 'ttl': 'hour'}, method='POST'):
self.assertEqual((3600, 'foo'), snappass.clean_input())
2016-10-25 01:21:08 +02:00
def test_password_before_expiration(self):
password = 'fidelio'
key = snappass.set_password(password, 1)
self.assertEqual(password, snappass.get_password(key))
def test_password_after_expiration(self):
password = 'open sesame'
key = snappass.set_password(password, 1)
time.sleep(1.5)
self.assertIsNone(snappass.get_password(key))
2016-10-25 01:21:08 +02:00
2013-10-05 23:12:31 +02:00
class SnapPassRoutesTestCase(TestCase):
2016-07-18 20:52:37 +02:00
# noinspection PyPep8Naming
2013-10-05 23:12:31 +02:00
def setUp(self):
snappass.app.config['TESTING'] = True
self.app = snappass.app.test_client()
def test_preview_password(self):
2013-10-05 23:12:31 +02:00
password = "I like novelty kitten statues!"
key = snappass.set_password(password, 30)
rv = self.app.get('/{0}'.format(key))
self.assertNotIn(password, rv.get_data(as_text=True))
2013-10-05 23:12:31 +02:00
def test_show_password(self):
password = "I like novelty kitten statues!"
key = snappass.set_password(password, 30)
rv = self.app.post('/{0}'.format(key))
self.assertIn(password, rv.get_data(as_text=True))
def test_url_prefix(self):
password = "I like novelty kitten statues!"
snappass.URL_PREFIX = "/test/prefix"
rv = self.app.post('/', data={'password': password, 'ttl': 'hour'})
self.assertIn("localhost/test/prefix/", rv.get_data(as_text=True))
2013-10-05 23:12:31 +02:00
def test_set_password(self):
with freeze_time("2020-05-08 12:00:00") as frozen_time:
password = 'my name is my passport. verify me.'
rv = self.app.post('/', data={'password': password, 'ttl': 'two weeks'})
html_content = rv.data.decode("ascii")
key = re.search(r'id="password-link" value="https://localhost/([^"]+)', html_content).group(1)
key = unquote(key)
frozen_time.move_to("2020-05-22 11:59:59")
self.assertEqual(snappass.get_password(key), password)
frozen_time.move_to("2020-05-22 12:00:00")
self.assertIsNone(snappass.get_password(key))
2013-10-05 23:12:31 +02:00
if __name__ == '__main__':
unittest.main()