mirror of
https://akkoma.dev/AkkomaGang/akkoma.git
synced 2024-12-15 06:39:05 +00:00
98cb255d12
OTP builds to 1.15
Changelog entry
Ensure policies are fully loaded
Fix :warn
use main branch for linkify
Fix warn in tests
Migrations for phoenix 1.17
Revert "Migrations for phoenix 1.17"
This reverts commit 6a3b2f15b7
.
Oban upgrade
Add default empty whitelist
mix format
limit test to amd64
OTP 26 tests for 1.15
use OTP_VERSION tag
baka
just 1.15
Massive deps update
Update locale, deps
Mix format
shell????
multiline???
?
max cases 1
use assert_recieve
don't put_env in async tests
don't async conn/fs tests
mix format
FIx some uploader issues
Fix tests
52 lines
1.5 KiB
Elixir
52 lines
1.5 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Web.Auth.TOTPAuthenticatorTest do
|
|
use Pleroma.Web.ConnCase, async: false
|
|
|
|
alias Pleroma.MFA
|
|
alias Pleroma.MFA.BackupCodes
|
|
alias Pleroma.MFA.TOTP
|
|
alias Pleroma.Web.Auth.TOTPAuthenticator
|
|
|
|
import Pleroma.Factory
|
|
|
|
test "verify token" do
|
|
otp_secret = TOTP.generate_secret()
|
|
otp_token = TOTP.generate_token(otp_secret)
|
|
|
|
user =
|
|
insert(:user,
|
|
multi_factor_authentication_settings: %MFA.Settings{
|
|
enabled: true,
|
|
totp: %MFA.Settings.TOTP{secret: otp_secret, confirmed: true}
|
|
}
|
|
)
|
|
|
|
assert TOTPAuthenticator.verify(otp_token, user) == {:ok, :pass}
|
|
assert TOTPAuthenticator.verify(nil, user) == {:error, :invalid_token}
|
|
assert TOTPAuthenticator.verify("", user) == {:error, :invalid_token}
|
|
end
|
|
|
|
test "checks backup codes" do
|
|
[code | _] = backup_codes = BackupCodes.generate()
|
|
|
|
hashed_codes =
|
|
backup_codes
|
|
|> Enum.map(&Pleroma.Password.hash_pwd_salt(&1))
|
|
|
|
user =
|
|
insert(:user,
|
|
multi_factor_authentication_settings: %MFA.Settings{
|
|
enabled: true,
|
|
backup_codes: hashed_codes,
|
|
totp: %MFA.Settings.TOTP{secret: "otp_secret", confirmed: true}
|
|
}
|
|
)
|
|
|
|
assert TOTPAuthenticator.verify_recovery_code(user, code) == {:ok, :pass}
|
|
refute TOTPAuthenticator.verify_recovery_code(code, refresh_record(user)) == {:ok, :pass}
|
|
end
|
|
end
|