UNPKG

@mysql/xdevapi

Version:

MySQL Connector/Node.js - A Node.js driver for MySQL using the X Protocol and X DevAPI.

166 lines (137 loc) 7.46 kB
/* * Copyright (c) 2018, 2021, Oracle and/or its affiliates. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License, version 2.0, as * published by the Free Software Foundation. * * This program is also distributed with certain software (including * but not limited to OpenSSL) that is licensed under separate terms, * as designated in a particular file or component or in included license * documentation. The authors of MySQL hereby grant you an * additional permission to link the program and your derivative works * with the separately licensed software that they have included with * MySQL. * * Without limiting anything contained in the foregoing, this file, * which is part of MySQL Connector/Node.js, is also subject to the * Universal FOSS Exception, version 1.0, a copy of which can be found at * http://oss.oracle.com/licenses/universal-foss-exception. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. * See the GNU General Public License, version 2.0, for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ 'use strict'; /* eslint-env node, mocha */ const expect = require('chai').expect; const td = require('testdouble'); // subject under test needs to be reloaded with replacement fakes let sha256MemoryAuth = require('../../../lib/Authentication/SHA256MemoryAuth'); describe('SHA256MemoryAuth', () => { let crypto; afterEach('reset fakes', () => { td.reset(); }); beforeEach('create fakes', () => { crypto = td.replace('../../../lib/crypto'); sha256MemoryAuth = require('../../../lib/Authentication/SHA256MemoryAuth'); }); it('mixes-in AuthPlugin', () => { expect(sha256MemoryAuth({ user: 'foo' }).getPassword).to.be.a('function'); expect(sha256MemoryAuth({ user: 'foo' }).getSchema).to.be.a('function'); expect(sha256MemoryAuth({ user: 'foo' }).getUser).to.be.a('function'); expect(sha256MemoryAuth({ user: 'foo' }).run).to.be.a('function'); }); context('getInitialAuthData()', () => { it('returns `undefined`', () => { return expect(sha256MemoryAuth({ user: 'foo' }).getInitialAuthData()).to.be.undefined; }); }); context('getName()', () => { it('returns the name assigned to the plugin', () => { expect(sha256MemoryAuth({ user: 'foo' }).getName()).to.equal('SHA256_MEMORY'); }); }); context('getNextAuthData()', () => { it('throws an error if the nonce does not have 20 bytes', () => { expect(() => sha256MemoryAuth({ user: 'foo' }).getNextAuthData('bar')).to.throw(); expect(() => sha256MemoryAuth({ user: 'foo' }).getNextAuthData('bar'.repeat(20))).to.throw(); }); context('without a default schema', () => { it('generates a valid payload without a password', () => { const user = 'foo'; const scramble = 'bar'; const nonce = 'n'.repeat(20); // nonce needs to have 20 bytes const hashWithNonce = 'baz'; const password = ''; const passwordHash = 'qux'; const passwordHashHash = 'quux'; td.when(crypto.xor(hashWithNonce, passwordHash)).thenReturn(scramble); td.when(crypto.sha256(passwordHashHash, nonce), { times: 1 }).thenReturn(hashWithNonce); td.when(crypto.sha256(passwordHash), { times: 1 }).thenReturn(passwordHashHash); td.when(crypto.sha256(password), { times: 2 }).thenReturn(passwordHash); const authData = sha256MemoryAuth({ user }).getNextAuthData(nonce); // eslint-disable-next-line no-control-regex expect(authData.toString()).to.match(/\u0000foo\u0000bar*/); }); it('generates a valid payload with a password', () => { const user = 'foo'; const scramble = 'bar'; const nonce = 'n'.repeat(20); // nonce needs to have 20 bytes const hashWithNonce = 'baz'; const password = 'qux'; const passwordHash = 'quux'; const passwordHashHash = 'quuz'; td.when(crypto.xor(hashWithNonce, passwordHash)).thenReturn(scramble); td.when(crypto.sha256(passwordHashHash, nonce), { times: 1 }).thenReturn(hashWithNonce); td.when(crypto.sha256(passwordHash), { times: 1 }).thenReturn(passwordHashHash); td.when(crypto.sha256(password), { times: 2 }).thenReturn(passwordHash); const authData = sha256MemoryAuth({ user, password }).getNextAuthData(nonce); // eslint-disable-next-line no-control-regex expect(authData.toString()).to.match(/\u0000foo\u0000bar*/); }); }); context('with a default schema', () => { it('generates a valid payload without a password', () => { const user = 'foo'; const scramble = 'bar'; const nonce = 'n'.repeat(20); // nonce needs to have 20 bytes const hashWithNonce = 'baz'; const password = ''; const passwordHash = 'qux'; const passwordHashHash = 'quux'; const schema = 'quuz'; td.when(crypto.xor(hashWithNonce, passwordHash)).thenReturn(scramble); td.when(crypto.sha256(passwordHashHash, nonce), { times: 1 }).thenReturn(hashWithNonce); td.when(crypto.sha256(passwordHash), { times: 1 }).thenReturn(passwordHashHash); td.when(crypto.sha256(password), { times: 2 }).thenReturn(passwordHash); const authData = sha256MemoryAuth({ schema, user }).getNextAuthData(nonce); // eslint-disable-next-line no-control-regex expect(authData.toString()).to.match(/quuz\u0000foo\u0000bar*/); }); it('generates a valid payload with a password', () => { const user = 'foo'; const scramble = 'bar'; const nonce = 'n'.repeat(20); // nonce needs to have 20 bytes const hashWithNonce = 'baz'; const password = 'qux'; const passwordHash = 'quux'; const passwordHashHash = 'quuz'; const schema = 'corge'; td.when(crypto.xor(hashWithNonce, passwordHash)).thenReturn(scramble); td.when(crypto.sha256(passwordHashHash, nonce), { times: 1 }).thenReturn(hashWithNonce); td.when(crypto.sha256(passwordHash), { times: 1 }).thenReturn(passwordHashHash); td.when(crypto.sha256(password), { times: 2 }).thenReturn(passwordHash); const authData = sha256MemoryAuth({ schema, user, password }).getNextAuthData(nonce); // eslint-disable-next-line no-control-regex expect(authData.toString()).to.match(/corge\u0000foo\u0000bar*/); }); }); }); });