6287a200af
This conversion is done by Transpec 2.2.1 with the following command: transpec spec/functions * 345 conversions from: obj.should to: expect(obj).to * 122 conversions from: == expected to: eq(expected) * 85 conversions from: lambda { }.should to: expect { }.to * 22 conversions from: be_true to: be_truthy * 16 conversions from: be_false to: be_falsey * 11 conversions from: pending to: skip * 9 conversions from: it { should ... } to: it { is_expected.to ... } * 5 conversions from: =~ [1, 2] to: match_array([1, 2]) * 2 conversions from: =~ /pattern/ to: match(/pattern/) * 2 conversions from: obj.should_not to: expect(obj).not_to For more details: https://github.com/yujinakayama/transpec#supported-conversions
45 lines
1.7 KiB
Ruby
Executable file
45 lines
1.7 KiB
Ruby
Executable file
#! /usr/bin/env ruby -S rspec
|
|
require 'spec_helper'
|
|
|
|
describe "the str2saltedsha512 function" do
|
|
let(:scope) { PuppetlabsSpec::PuppetInternals.scope }
|
|
|
|
it "should exist" do
|
|
expect(Puppet::Parser::Functions.function("str2saltedsha512")).to eq("function_str2saltedsha512")
|
|
end
|
|
|
|
it "should raise a ParseError if there is less than 1 argument" do
|
|
expect { scope.function_str2saltedsha512([]) }.to( raise_error(Puppet::ParseError) )
|
|
end
|
|
|
|
it "should raise a ParseError if there is more than 1 argument" do
|
|
expect { scope.function_str2saltedsha512(['foo', 'bar', 'baz']) }.to( raise_error(Puppet::ParseError) )
|
|
end
|
|
|
|
it "should return a salted-sha512 password hash 136 characters in length" do
|
|
result = scope.function_str2saltedsha512(["password"])
|
|
expect(result.length).to(eq(136))
|
|
end
|
|
|
|
it "should raise an error if you pass a non-string password" do
|
|
expect { scope.function_str2saltedsha512([1234]) }.to( raise_error(Puppet::ParseError) )
|
|
end
|
|
|
|
it "should generate a valid password" do
|
|
# Allow the function to generate a password based on the string 'password'
|
|
password_hash = scope.function_str2saltedsha512(["password"])
|
|
|
|
# Separate the Salt and Password from the Password Hash
|
|
salt = password_hash[0..7]
|
|
password = password_hash[8..-1]
|
|
|
|
# Convert the Salt and Password from Hex to Binary Data
|
|
str_salt = Array(salt.lines).pack('H*')
|
|
str_password = Array(password.lines).pack('H*')
|
|
|
|
# Combine the Binary Salt with 'password' and compare the end result
|
|
saltedpass = Digest::SHA512.digest(str_salt + 'password')
|
|
result = (str_salt + saltedpass).unpack('H*')[0]
|
|
expect(result).to eq(password_hash)
|
|
end
|
|
end
|