2020-01-10 08:45:56 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2022-07-28 10:27:38 +08:00
|
|
|
RSpec.describe Webauthn::ChallengeGenerator do
|
2020-01-10 08:45:56 +08:00
|
|
|
it "generates a Webauthn::ChallengeGenerator::ChallengeSession with correct params" do
|
|
|
|
session = Webauthn::ChallengeGenerator.generate
|
|
|
|
expect(session).to be_a(Webauthn::ChallengeGenerator::ChallengeSession)
|
|
|
|
expect(session.challenge).not_to eq(nil)
|
|
|
|
expect(session.rp_id).to eq(Discourse.current_hostname)
|
|
|
|
expect(session.rp_name).to eq(SiteSetting.title)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "ChallengeSession" do
|
|
|
|
describe "#commit_to_session" do
|
|
|
|
let(:user) { Fabricate(:user) }
|
|
|
|
|
2021-05-21 09:43:47 +08:00
|
|
|
it "stores the challenge, rp id, and rp name in the provided session object" do
|
2020-01-10 08:45:56 +08:00
|
|
|
secure_session = {}
|
|
|
|
generated_session = Webauthn::ChallengeGenerator.generate
|
|
|
|
generated_session.commit_to_session(secure_session, user)
|
|
|
|
|
|
|
|
expect(secure_session["staged-webauthn-challenge-#{user&.id}"]).to eq(generated_session.challenge)
|
|
|
|
expect(secure_session["staged-webauthn-rp-id-#{user&.id}"]).to eq(generated_session.rp_id)
|
|
|
|
expect(secure_session["staged-webauthn-rp-name-#{user&.id}"]).to eq(generated_session.rp_name)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|