git-secret/tests/test_reveal.bats

189 lines
4.7 KiB
Plaintext
Raw Normal View History

2016-02-21 13:26:17 +00:00
#!/usr/bin/env bats
load _test_base
2018-07-14 19:23:17 +00:00
FILE_TO_HIDE="$TEST_DEFAULT_FILENAME"
2016-02-21 13:26:17 +00:00
FILE_CONTENTS="hidden content юникод"
FINGERPRINT=""
2016-02-21 13:26:17 +00:00
function setup {
FINGERPRINT=$(install_fixture_full_key "$TEST_DEFAULT_USER")
2016-02-21 13:26:17 +00:00
set_state_initial
2016-02-21 13:26:17 +00:00
set_state_git
set_state_secret_init
set_state_secret_tell "$TEST_DEFAULT_USER"
set_state_secret_add "$FILE_TO_HIDE" "$FILE_CONTENTS"
set_state_secret_hide
}
function teardown {
rm "$FILE_TO_HIDE"
uninstall_fixture_full_key "$TEST_DEFAULT_USER" "$FINGERPRINT"
2016-02-21 13:26:17 +00:00
unset_current_state
}
@test "run 'reveal' with password argument" {
cp "$FILE_TO_HIDE" "${FILE_TO_HIDE}2"
rm -f "$FILE_TO_HIDE"
local password=$(test_user_password "$TEST_DEFAULT_USER")
run git secret reveal -d "$TEST_GPG_HOMEDIR" -p "$password"
[ "$status" -eq 0 ]
[ -f "$FILE_TO_HIDE" ]
cmp -s "$FILE_TO_HIDE" "${FILE_TO_HIDE}2"
2016-02-21 13:26:17 +00:00
rm "${FILE_TO_HIDE}2"
2016-02-21 13:26:17 +00:00
}
@test "run 'reveal' with bad arg" {
cp "$FILE_TO_HIDE" "${FILE_TO_HIDE}2"
rm -f "$FILE_TO_HIDE"
local password=$(test_user_password "$TEST_DEFAULT_USER")
run git secret reveal -Z k-d "$TEST_GPG_HOMEDIR" -p "$password"
[ "$status" -ne 0 ]
}
2016-02-21 13:26:17 +00:00
@test "run 'reveal' with '-f'" {
rm "$FILE_TO_HIDE"
local password=$(test_user_password "$TEST_DEFAULT_USER")
run git secret reveal -f -d "$TEST_GPG_HOMEDIR" -p "$password"
[ "$status" -eq 0 ]
[ -f "$FILE_TO_HIDE" ]
}
@test "run 'reveal' with '-v'" {
rm "$FILE_TO_HIDE"
local password=$(test_user_password "$TEST_DEFAULT_USER")
run git secret reveal -v -d "$TEST_GPG_HOMEDIR" -p "$password"
[ "$status" -eq 0 ]
[ -f "$FILE_TO_HIDE" ]
}
2018-08-18 14:09:58 +00:00
@test "run 'reveal' with '-P'" {
rm "$FILE_TO_HIDE"
local password=$(test_user_password "$TEST_DEFAULT_USER")
local secret_file=$(_get_encrypted_filename "$FILE_TO_HIDE")
chmod o-rwx "$secret_file"
2018-08-18 14:09:58 +00:00
run git secret reveal -P -d "$TEST_GPG_HOMEDIR" -p "$password"
[ "$status" -eq 0 ]
2018-07-23 02:43:37 +00:00
2018-07-23 03:16:01 +00:00
local secret_perm
local file_perm
secret_perm=$(ls -l "$FILE_TO_HIDE$SECRETS_EXTENSION" | cut -d' ' -f1)
file_perm=$(ls -l "$FILE_TO_HIDE" | cut -d' ' -f1)
2018-08-18 14:31:57 +00:00
# text prefixed with '# ' and sent to file descriptor 3 is 'diagnostic' (debug) output for devs
2018-08-18 14:31:57 +00:00
#echo "# secret_perm: $secret_perm, file_perm: $file_perm" >&3
2018-07-23 02:43:37 +00:00
[ "$secret_perm" = "$file_perm" ]
2018-07-23 02:43:37 +00:00
[ -f "$FILE_TO_HIDE" ]
}
2016-02-21 13:26:17 +00:00
@test "run 'reveal' with wrong password" {
rm "$FILE_TO_HIDE"
2016-02-21 13:26:17 +00:00
run git secret reveal -d "$TEST_GPG_HOMEDIR" -p "WRONG"
[ "$status" -eq 2 ]
[ ! -f "$FILE_TO_HIDE" ]
}
2016-02-21 13:26:17 +00:00
@test "run 'reveal' for attacker" {
# Preparations
rm "$FILE_TO_HIDE"
2016-02-21 13:26:17 +00:00
local attacker_fingerprint=$(install_fixture_full_key "$TEST_ATTACKER_USER")
local password=$(test_user_password "$TEST_ATTACKER_USER")
2016-02-21 13:26:17 +00:00
run git secret reveal -d "$TEST_GPG_HOMEDIR" -p "$password"
# This should fail, nothing should be created:
2016-02-21 13:26:17 +00:00
[ "$status" -eq 2 ]
[ ! -f "$FILE_TO_HIDE" ]
# Cleaning up:
uninstall_fixture_full_key "$TEST_ATTACKER_USER" "$attacker_fingerprint"
2016-02-21 13:26:17 +00:00
}
@test "run 'reveal' for attacker with -F (force)" {
# Preparations
rm "$FILE_TO_HIDE"
local attacker_fingerprint=$(install_fixture_full_key "$TEST_ATTACKER_USER")
local password=$(test_user_password "$TEST_ATTACKER_USER")
run git secret reveal -F -d "$TEST_GPG_HOMEDIR" -p "$password"
#echo "# status is $status" >&3
# This should return a status code of 1 also. Not sure how to test that we don't die early
[ "$status" -eq 0 ]
[ ! -f "$FILE_TO_HIDE" ]
touch "$FILE_TO_HIDE" #create this file so uninstall below works
# Cleaning up:
uninstall_fixture_full_key "$TEST_ATTACKER_USER" "$attacker_fingerprint"
}
2016-02-21 13:26:17 +00:00
@test "run 'reveal' for multiple users (with key deletion)" {
# Preparations:
local second_fingerprint=$(install_fixture_full_key "$TEST_SECOND_USER")
local password=$(test_user_password "$TEST_SECOND_USER")
set_state_secret_tell "$TEST_SECOND_USER"
2016-02-21 13:26:17 +00:00
set_state_secret_hide
# We are removing a secret key of the first user to be sure
# that it is not used in decryption:
uninstall_fixture_full_key "$TEST_DEFAULT_USER" "$FINGERPRINT"
2016-02-21 13:26:17 +00:00
# Testing:
run git secret reveal -d "$TEST_GPG_HOMEDIR" -p "$password"
[ "$status" -eq 0 ]
[ -f "$FILE_TO_HIDE" ]
# Cleaning up:
uninstall_fixture_full_key "$TEST_SECOND_USER" "$second_fingerprint"
}
@test "run 'reveal' for multiple users (normally)" {
# Preparations:
local second_fingerprint=$(install_fixture_full_key "$TEST_SECOND_USER")
# bug in gpg v2.0.22, need to use default password
local password=$(test_user_password "$TEST_DEFAULT_USER")
set_state_secret_tell "$TEST_SECOND_USER"
set_state_secret_hide
# Testing:
2016-02-21 13:26:17 +00:00
run git secret reveal -d "$TEST_GPG_HOMEDIR" -p "$password"
[ "$status" -eq 0 ]
[ -f "$FILE_TO_HIDE" ]
# Cleaning up:
uninstall_fixture_full_key "$TEST_SECOND_USER" "$second_fingerprint"
2016-02-21 13:26:17 +00:00
}