blob: 11485aa0a8136aa5767f2fd303ddf95fd0095ce6 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
|
#!/usr/bin/env rspec
require 'spec_helper'
describe "the str2saltedsha512 function" do
before :all do
Puppet::Parser::Functions.autoloader.loadall
end
before :each do
@scope = Puppet::Parser::Scope.new
end
it "should exist" do
Puppet::Parser::Functions.function("str2saltedsha512").should == "function_str2saltedsha512"
end
it "should raise a ParseError if there is less than 1 argument" do
expect { @scope.function_str2saltedsha512([]) }.should( raise_error(Puppet::ParseError) )
end
it "should raise a ParseError if there is more than 1 argument" do
expect { @scope.function_str2saltedsha512(['foo', 'bar', 'baz']) }.should( raise_error(Puppet::ParseError) )
end
it "should return a salted-sha512 password hash 136 characters in length" do
result = @scope.function_str2saltedsha512(["password"])
result.length.should(eq(136))
end
it "should raise an error if you pass a non-string password" do
expect { @scope.function_str2saltedsha512([1234]) }.should( raise_error(Puppet::ParseError) )
end
it "should generate a valid password" do
# Allow the function to generate a password based on the string 'password'
password_hash = @scope.function_str2saltedsha512(["password"])
# Separate the Salt and Password from the Password Hash
salt = password_hash[0..7]
password = password_hash[8..-1]
# Convert the Salt and Password from Hex to Binary Data
str_salt = Array(salt.lines).pack('H*')
str_password = Array(password.lines).pack('H*')
# Combine the Binary Salt with 'password' and compare the end result
saltedpass = Digest::SHA512.digest(str_salt + 'password')
result = (str_salt + saltedpass).unpack('H*')[0]
result.should == password_hash
end
end
|