summaryrefslogtreecommitdiff
path: root/internal/api/client/user/passwordchange_test.go
diff options
context:
space:
mode:
authorLibravatar tobi <31960611+tsmethurst@users.noreply.github.com>2025-04-07 16:14:41 +0200
committerLibravatar GitHub <noreply@github.com>2025-04-07 16:14:41 +0200
commit365b5753419238bb96bc3f9b744d380ff20cbafc (patch)
tree6b8e8b605c4cddeb6e3bc0f574ffbc856657e56c /internal/api/client/user/passwordchange_test.go
parent[bugfix] Don't assume `"manuallyApprovesFollowers": true` if not set (#3978) (diff)
downloadgotosocial-365b5753419238bb96bc3f9b744d380ff20cbafc.tar.xz
[feature] add TOTP two-factor authentication (2FA) (#3960)
* [feature] add TOTP two-factor authentication (2FA) * use byteutil.S2B to avoid allocations when comparing + generating password hashes * don't bother with string conversion for consts * use io.ReadFull * use MustGenerateSecret for backup codes * rename util functions
Diffstat (limited to 'internal/api/client/user/passwordchange_test.go')
-rw-r--r--internal/api/client/user/passwordchange_test.go11
1 files changed, 9 insertions, 2 deletions
diff --git a/internal/api/client/user/passwordchange_test.go b/internal/api/client/user/passwordchange_test.go
index 8a741f96c..baf6f6b8d 100644
--- a/internal/api/client/user/passwordchange_test.go
+++ b/internal/api/client/user/passwordchange_test.go
@@ -23,6 +23,7 @@ import (
"net/http"
"testing"
+ "codeberg.org/gruf/go-byteutil"
"github.com/stretchr/testify/suite"
"github.com/superseriousbusiness/gotosocial/internal/api/client/user"
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
@@ -50,11 +51,17 @@ func (suite *PasswordChangeTestSuite) TestPasswordChangePOST() {
}
// new password should pass
- err = bcrypt.CompareHashAndPassword([]byte(dbUser.EncryptedPassword), []byte("peepeepoopoopassword"))
+ err = bcrypt.CompareHashAndPassword(
+ byteutil.S2B(dbUser.EncryptedPassword),
+ byteutil.S2B("peepeepoopoopassword"),
+ )
suite.NoError(err)
// old password should fail
- err = bcrypt.CompareHashAndPassword([]byte(dbUser.EncryptedPassword), []byte("password"))
+ err = bcrypt.CompareHashAndPassword(
+ byteutil.S2B(dbUser.EncryptedPassword),
+ byteutil.S2B("password"),
+ )
suite.EqualError(err, "crypto/bcrypt: hashedPassword is not the hash of the given password")
}