2022-07-30 15:25:26 +02:00
|
|
|
// Copyright 2022 The Gitea Authors. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2022-07-30 15:25:26 +02:00
|
|
|
|
2022-12-08 09:21:37 +01:00
|
|
|
package v1_17 //nolint
|
2022-07-30 15:25:26 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/base32"
|
|
|
|
"testing"
|
|
|
|
|
2024-07-14 15:34:42 +02:00
|
|
|
migration_tests "code.gitea.io/gitea/models/migrations/test"
|
2022-11-02 09:54:36 +01:00
|
|
|
|
2022-07-30 15:25:26 +02:00
|
|
|
"github.com/stretchr/testify/assert"
|
2024-07-30 21:41:10 +02:00
|
|
|
"github.com/stretchr/testify/require"
|
2022-07-30 15:25:26 +02:00
|
|
|
)
|
|
|
|
|
2022-11-02 09:54:36 +01:00
|
|
|
func Test_StoreWebauthnCredentialIDAsBytes(t *testing.T) {
|
2022-07-30 15:25:26 +02:00
|
|
|
// Create webauthnCredential table
|
|
|
|
type WebauthnCredential struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
Name string
|
|
|
|
LowerName string `xorm:"unique(s)"`
|
|
|
|
UserID int64 `xorm:"INDEX unique(s)"`
|
|
|
|
CredentialID string `xorm:"INDEX VARCHAR(410)"`
|
|
|
|
PublicKey []byte
|
|
|
|
AttestationType string
|
|
|
|
AAGUID []byte
|
|
|
|
SignCount uint32 `xorm:"BIGINT"`
|
|
|
|
CloneWarning bool
|
|
|
|
}
|
|
|
|
|
|
|
|
type ExpectedWebauthnCredential struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
CredentialID string // CredentialID is at most 1023 bytes as per spec released 20 July 2022
|
|
|
|
}
|
|
|
|
|
|
|
|
type ConvertedWebauthnCredential struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
CredentialIDBytes []byte `xorm:"VARBINARY(1024)"` // CredentialID is at most 1023 bytes as per spec released 20 July 2022
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prepare and load the testing database
|
2024-07-14 15:34:42 +02:00
|
|
|
x, deferable := migration_tests.PrepareTestEnv(t, 0, new(WebauthnCredential), new(ExpectedWebauthnCredential))
|
2022-07-30 15:25:26 +02:00
|
|
|
defer deferable()
|
|
|
|
if x == nil || t.Failed() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-30 21:41:10 +02:00
|
|
|
err := StoreWebauthnCredentialIDAsBytes(x)
|
|
|
|
require.NoError(t, err)
|
2022-07-30 15:25:26 +02:00
|
|
|
|
|
|
|
expected := []ExpectedWebauthnCredential{}
|
2024-07-30 21:41:10 +02:00
|
|
|
err = x.Table("expected_webauthn_credential").Asc("id").Find(&expected)
|
|
|
|
require.NoError(t, err)
|
2022-07-30 15:25:26 +02:00
|
|
|
|
|
|
|
got := []ConvertedWebauthnCredential{}
|
2024-07-30 21:41:10 +02:00
|
|
|
err = x.Table("webauthn_credential").Select("id, credential_id_bytes").Asc("id").Find(&got)
|
|
|
|
require.NoError(t, err)
|
2022-07-30 15:25:26 +02:00
|
|
|
|
|
|
|
for i, e := range expected {
|
|
|
|
credIDBytes, _ := base32.HexEncoding.DecodeString(e.CredentialID)
|
|
|
|
assert.Equal(t, credIDBytes, got[i].CredentialIDBytes)
|
|
|
|
}
|
|
|
|
}
|