2022-02-14 02:49:12 +05:30
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
2022-11-27 23:50:29 +05:30
|
|
|
// SPDX-License-Identifier: MIT
|
2022-02-14 02:49:12 +05:30
|
|
|
|
2022-11-02 14:24:36 +05:30
|
|
|
package v1_16 //nolint
|
2022-02-14 02:49:12 +05:30
|
|
|
|
|
|
|
import (
|
2024-04-05 17:30:36 +05:30
|
|
|
"encoding/hex"
|
2022-02-14 02:49:12 +05:30
|
|
|
"testing"
|
|
|
|
|
2022-11-02 14:24:36 +05:30
|
|
|
"code.gitea.io/gitea/models/migrations/base"
|
2022-02-14 02:49:12 +05:30
|
|
|
"code.gitea.io/gitea/modules/timeutil"
|
2022-02-24 01:46:07 +05:30
|
|
|
|
2022-02-14 02:49:12 +05:30
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"xorm.io/xorm/schemas"
|
|
|
|
)
|
|
|
|
|
2024-04-05 17:30:36 +05:30
|
|
|
func TestParseU2FRegistration(t *testing.T) {
|
|
|
|
// test vectors from https://github.com/tstranex/u2f/blob/d21a03e0b1d9fc1df59ff54e7a513655c1748b0c/register_test.go#L15
|
|
|
|
|
|
|
|
const testRegRespHex = "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"
|
|
|
|
|
|
|
|
regResp, err := hex.DecodeString(testRegRespHex)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
pubKey, keyHandle, err := parseU2FRegistration(regResp)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, "04b174bc49c7ca254b70d2e5c207cee9cf174820ebd77ea3c65508c26da51b657c1cc6b952f8621697936482da0a6d3d3826a59095daf6cd7c03e2e60385d2f6d9", hex.EncodeToString(pubKey.Bytes()))
|
|
|
|
assert.Equal(t, "2a552dfdb7477ed65fd84133f86196010b2215b57da75d315b7b9e8fe2e3925a6019551bab61d16591659cbaf00b4950f7abfe6660e2e006f76868b772d70c25", hex.EncodeToString(keyHandle))
|
|
|
|
}
|
|
|
|
|
2022-11-02 14:24:36 +05:30
|
|
|
func Test_RemigrateU2FCredentials(t *testing.T) {
|
2022-02-14 02:49:12 +05:30
|
|
|
// Create webauthnCredential table
|
|
|
|
type WebauthnCredential struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
Name string
|
|
|
|
LowerName string `xorm:"unique(s)"`
|
|
|
|
UserID int64 `xorm:"INDEX unique(s)"`
|
|
|
|
CredentialID string `xorm:"INDEX VARCHAR(410)"` // CredentalID in U2F is at most 255bytes / 5 * 8 = 408 - add a few extra characters for safety
|
|
|
|
PublicKey []byte
|
|
|
|
AttestationType string
|
|
|
|
SignCount uint32 `xorm:"BIGINT"`
|
|
|
|
CloneWarning bool
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now migrate the old u2f registrations to the new format
|
|
|
|
type U2fRegistration struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
Name string
|
|
|
|
UserID int64 `xorm:"INDEX"`
|
|
|
|
Raw []byte
|
|
|
|
Counter uint32 `xorm:"BIGINT"`
|
|
|
|
CreatedUnix timeutil.TimeStamp `xorm:"INDEX created"`
|
|
|
|
UpdatedUnix timeutil.TimeStamp `xorm:"INDEX updated"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type ExpectedWebauthnCredential struct {
|
|
|
|
ID int64 `xorm:"pk autoincr"`
|
|
|
|
CredentialID string `xorm:"INDEX VARCHAR(410)"` // CredentalID in U2F is at most 255bytes / 5 * 8 = 408 - add a few extra characters for safety
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prepare and load the testing database
|
2022-11-02 14:24:36 +05:30
|
|
|
x, deferable := base.PrepareTestEnv(t, 0, new(WebauthnCredential), new(U2fRegistration), new(ExpectedWebauthnCredential))
|
2022-02-14 02:49:12 +05:30
|
|
|
if x == nil || t.Failed() {
|
|
|
|
defer deferable()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer deferable()
|
|
|
|
|
|
|
|
if x.Dialect().URI().DBType == schemas.SQLITE {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run the migration
|
2022-11-02 14:24:36 +05:30
|
|
|
if err := RemigrateU2FCredentials(x); err != nil {
|
2022-02-14 02:49:12 +05:30
|
|
|
assert.NoError(t, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
expected := []ExpectedWebauthnCredential{}
|
|
|
|
if err := x.Table("expected_webauthn_credential").Asc("id").Find(&expected); !assert.NoError(t, err) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
got := []ExpectedWebauthnCredential{}
|
|
|
|
if err := x.Table("webauthn_credential").Select("id, credential_id").Asc("id").Find(&got); !assert.NoError(t, err) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.EqualValues(t, expected, got)
|
|
|
|
}
|