2023-01-29 09:49:51 -06:00
|
|
|
// Copyright 2023 The Gitea Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
|
|
|
|
package pwn
|
|
|
|
|
|
|
|
import (
|
2025-01-05 06:25:50 +08:00
|
|
|
"errors"
|
|
|
|
"io"
|
2023-01-29 09:49:51 -06:00
|
|
|
"net/http"
|
2025-01-05 06:25:50 +08:00
|
|
|
"strings"
|
2023-01-29 09:49:51 -06:00
|
|
|
"testing"
|
2024-02-04 14:29:09 +01:00
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
2023-01-29 09:49:51 -06:00
|
|
|
)
|
|
|
|
|
2025-01-05 06:25:50 +08:00
|
|
|
type mockTransport struct{}
|
|
|
|
|
|
|
|
func (mockTransport) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
if req.URL.Host != "api.pwnedpasswords.com" {
|
|
|
|
return nil, errors.New("unsupported host")
|
|
|
|
}
|
|
|
|
respMap := map[string]string{
|
|
|
|
"/range/5c1d8": "EAF2F254732680E8AC339B84F3266ECCBB5:1\r\nFC446EB88938834178CB9322C1EE273C2A7:2",
|
|
|
|
"/range/ba189": "FD4CB34F0378BCB15D23F6FFD28F0775C9E:3\r\nFDF342FCD8C3611DAE4D76E8A992A3E4169:4",
|
|
|
|
"/range/a1733": "C4CE0F1F0062B27B9E2F41AF0C08218017C:1\r\nFC446EB88938834178CB9322C1EE273C2A7:2\r\nFE81480327C992FE62065A827429DD1318B:0",
|
|
|
|
"/range/5617b": "FD4CB34F0378BCB15D23F6FFD28F0775C9E:3\r\nFDF342FCD8C3611DAE4D76E8A992A3E4169:4\r\nFE81480327C992FE62065A827429DD1318B:0",
|
|
|
|
"/range/79082": "FDF342FCD8C3611DAE4D76E8A992A3E4169:4\r\nFE81480327C992FE62065A827429DD1318B:0\r\nAFEF386F56EB0B4BE314E07696E5E6E6536:0",
|
|
|
|
}
|
|
|
|
if resp, ok := respMap[req.URL.Path]; ok {
|
|
|
|
return &http.Response{Request: req, Body: io.NopCloser(strings.NewReader(resp))}, nil
|
|
|
|
}
|
|
|
|
return nil, errors.New("unsupported path")
|
|
|
|
}
|
2023-01-29 09:49:51 -06:00
|
|
|
|
|
|
|
func TestPassword(t *testing.T) {
|
2025-01-05 06:25:50 +08:00
|
|
|
client := New(WithHTTP(&http.Client{Transport: mockTransport{}}))
|
2024-05-02 16:43:23 +02:00
|
|
|
|
|
|
|
count, err := client.CheckPassword("", false)
|
2024-02-04 14:29:09 +01:00
|
|
|
assert.ErrorIs(t, err, ErrEmptyPassword, "blank input should return ErrEmptyPassword")
|
2024-05-02 16:43:23 +02:00
|
|
|
assert.Equal(t, -1, count)
|
2023-01-29 09:49:51 -06:00
|
|
|
|
2024-05-02 16:43:23 +02:00
|
|
|
count, err = client.CheckPassword("pwned", false)
|
2024-02-04 14:29:09 +01:00
|
|
|
assert.NoError(t, err)
|
2024-05-02 16:43:23 +02:00
|
|
|
assert.Equal(t, 1, count)
|
2023-01-29 09:49:51 -06:00
|
|
|
|
2024-05-02 16:43:23 +02:00
|
|
|
count, err = client.CheckPassword("notpwned", false)
|
2024-02-04 14:29:09 +01:00
|
|
|
assert.NoError(t, err)
|
2024-05-02 16:43:23 +02:00
|
|
|
assert.Equal(t, 0, count)
|
2023-01-29 09:49:51 -06:00
|
|
|
|
2024-05-02 16:43:23 +02:00
|
|
|
count, err = client.CheckPassword("paddedpwned", true)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, 1, count)
|
2023-01-29 09:49:51 -06:00
|
|
|
|
2024-05-02 16:43:23 +02:00
|
|
|
count, err = client.CheckPassword("paddednotpwned", true)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, 0, count)
|
2023-01-29 09:49:51 -06:00
|
|
|
|
2024-05-02 16:43:23 +02:00
|
|
|
count, err = client.CheckPassword("paddednotpwnedzero", true)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, 0, count)
|
2023-01-29 09:49:51 -06:00
|
|
|
}
|