You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@couchdb.apache.org by ja...@apache.org on 2016/07/12 19:41:31 UTC
[48/50] couchdb commit: updated refs/heads/auth-tests-wip to c34d871
remove upgrade on auth test
Project: http://git-wip-us.apache.org/repos/asf/couchdb/repo
Commit: http://git-wip-us.apache.org/repos/asf/couchdb/commit/c2fd04dd
Tree: http://git-wip-us.apache.org/repos/asf/couchdb/tree/c2fd04dd
Diff: http://git-wip-us.apache.org/repos/asf/couchdb/diff/c2fd04dd
Branch: refs/heads/auth-tests-wip
Commit: c2fd04dd8e515d45cbb552a39b218504e52e0608
Parents: 47a120d
Author: Robert Newson <rn...@apache.org>
Authored: Tue Jun 21 13:23:34 2016 +0100
Committer: Jan Lehnardt <ja...@apache.org>
Committed: Tue Jul 12 20:55:59 2016 +0200
----------------------------------------------------------------------
test/javascript/tests/users_db_security.js | 32 -------------------------
1 file changed, 32 deletions(-)
----------------------------------------------------------------------
http://git-wip-us.apache.org/repos/asf/couchdb/blob/c2fd04dd/test/javascript/tests/users_db_security.js
----------------------------------------------------------------------
diff --git a/test/javascript/tests/users_db_security.js b/test/javascript/tests/users_db_security.js
index 355bb03..e66b3ec 100644
--- a/test/javascript/tests/users_db_security.js
+++ b/test/javascript/tests/users_db_security.js
@@ -148,38 +148,6 @@ couchTests.users_db_security = function(debug) {
TEquals(true, userDoc.derived_key != jchrisDoc.derived_key,
"should have new derived_key");
- // SHA-1 password hashes are upgraded to PBKDF2 on successful
- // authentication
- var rnewsonDoc = {
- _id: "org.couchdb.user:rnewson",
- type: "user",
- name: "rnewson",
- // password: "plaintext_password",
- password_sha: "e29dc3aeed5abf43185c33e479f8998558c59474",
- salt: "24f1e0a87c2e374212bda1073107e8ae",
- roles: []
- };
-
- var password_sha = rnewsonDoc.password_sha,
- salt = rnewsonDoc.salt,
- derived_key,
- iterations;
-
- usersDb.save(rnewsonDoc);
- rnewsonDoc = open_as(usersDb, rnewsonDoc._id, "jan");
- T(!rnewsonDoc.password_scheme);
- T(!rnewsonDoc.derived_key);
- T(!rnewsonDoc.iterations);
-
- // check that we don't upgrade when the password is wrong
- TEquals("unauthorized", CouchDB.login("rnewson", "wrong_password").error);
- rnewsonDoc = open_as(usersDb, rnewsonDoc._id, "jan");
- TEquals(salt, rnewsonDoc.salt);
- TEquals(password_sha, rnewsonDoc.password_sha);
- T(!rnewsonDoc.password_scheme);
- T(!rnewsonDoc.derived_key);
- T(!rnewsonDoc.iterations);
-
wait(5000); // wait for auth cache invalidation
var r = CouchDB.login("rnewson", "plaintext_password")
log(r)