summaryrefslogtreecommitdiff
path: root/spec/functions/str2saltedsha512_spec.rb
blob: ab7f57f113f2ba10900a9b6ea33e090a603af6f5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
#! /usr/bin/env ruby -S rspec
require 'spec_helper'

describe "the str2saltedsha512 function" do
  let(:scope) { PuppetlabsSpec::PuppetInternals.scope }

  it "should exist" do
    expect(Puppet::Parser::Functions.function("str2saltedsha512")).to eq("function_str2saltedsha512")
  end

  it "should raise a ParseError if there is less than 1 argument" do
    expect { scope.function_str2saltedsha512([]) }.to( raise_error(Puppet::ParseError) )
  end

  it "should raise a ParseError if there is more than 1 argument" do
    expect { scope.function_str2saltedsha512(['foo', 'bar', 'baz']) }.to( raise_error(Puppet::ParseError) )
  end

  it "should return a salted-sha512 password hash 136 characters in length" do
    result = scope.function_str2saltedsha512(["password"])
    expect(result.length).to(eq(136))
  end

  it "should raise an error if you pass a non-string password" do
    expect { scope.function_str2saltedsha512([1234]) }.to( raise_error(Puppet::ParseError) )
  end

  it "should generate a valid password" do
    # Allow the function to generate a password based on the string 'password'
    password_hash = scope.function_str2saltedsha512(["password"])

    # Separate the Salt and Password from the Password Hash
    salt     = password_hash[0..7]
    password = password_hash[8..-1]

    # Convert the Salt and Password from Hex to Binary Data
    str_salt     = Array(salt.lines).pack('H*')
    str_password = Array(password.lines).pack('H*')

    # Combine the Binary Salt with 'password' and compare the end result
    saltedpass    = Digest::SHA512.digest(str_salt + 'password')
    result        = (str_salt + saltedpass).unpack('H*')[0]
    expect(result).to eq(password_hash)
  end
end