mirror of
https://github.com/keepassxreboot/keepassxc.git
synced 2025-04-04 04:57:39 +03:00
CLI: Add Yubikey unlock support
This commit is contained in:
parent
77fcde875e
commit
964478e78f
19 changed files with 816 additions and 529 deletions
|
@ -89,6 +89,11 @@ void TestCli::initTestCase()
|
|||
QVERIFY(sourceDbFile4.open(QIODevice::ReadOnly));
|
||||
QVERIFY(Tools::readAllFromDevice(&sourceDbFile4, m_keyFileProtectedNoPasswordDbData));
|
||||
sourceDbFile4.close();
|
||||
|
||||
QFile sourceDbFileYubiKeyProtected(QString(KEEPASSX_TEST_DATA_DIR).append("/YubiKeyProtectedPasswords.kdbx"));
|
||||
QVERIFY(sourceDbFileYubiKeyProtected.open(QIODevice::ReadOnly));
|
||||
QVERIFY(Tools::readAllFromDevice(&sourceDbFileYubiKeyProtected, m_yubiKeyProtectedDbData));
|
||||
sourceDbFileYubiKeyProtected.close();
|
||||
}
|
||||
|
||||
void TestCli::init()
|
||||
|
@ -113,6 +118,11 @@ void TestCli::init()
|
|||
m_keyFileProtectedNoPasswordDbFile->write(m_keyFileProtectedNoPasswordDbData);
|
||||
m_keyFileProtectedNoPasswordDbFile->close();
|
||||
|
||||
m_yubiKeyProtectedDbFile.reset(new TemporaryFile());
|
||||
m_yubiKeyProtectedDbFile->open();
|
||||
m_yubiKeyProtectedDbFile->write(m_yubiKeyProtectedDbData);
|
||||
m_yubiKeyProtectedDbFile->close();
|
||||
|
||||
m_stdinFile.reset(new TemporaryFile());
|
||||
m_stdinFile->open();
|
||||
m_stdinHandle = fdopen(m_stdinFile->handle(), "r+");
|
||||
|
@ -155,7 +165,7 @@ void TestCli::cleanupTestCase()
|
|||
QSharedPointer<Database> TestCli::readTestDatabase() const
|
||||
{
|
||||
Utils::Test::setNextPassword("a");
|
||||
auto db = QSharedPointer<Database>(Utils::unlockDatabase(m_dbFile->fileName(), true, "", m_stdoutHandle));
|
||||
auto db = QSharedPointer<Database>(Utils::unlockDatabase(m_dbFile->fileName(), true, "", "", m_stdoutHandle));
|
||||
m_stdoutFile->seek(ftell(m_stdoutHandle)); // re-synchronize handles
|
||||
return db;
|
||||
}
|
||||
|
@ -226,14 +236,8 @@ void TestCli::testAdd()
|
|||
|
||||
Utils::Test::setNextPassword("a");
|
||||
Utils::Test::setNextPassword("newpassword");
|
||||
addCmd.execute({"add",
|
||||
"-u",
|
||||
"newuser2",
|
||||
"--url",
|
||||
"https://example.net/",
|
||||
"-p",
|
||||
m_dbFile->fileName(),
|
||||
"/newuser-entry2"});
|
||||
addCmd.execute(
|
||||
{"add", "-u", "newuser2", "--url", "https://example.net/", "-p", m_dbFile->fileName(), "/newuser-entry2"});
|
||||
|
||||
db = readTestDatabase();
|
||||
entry = db->rootGroup()->findEntryByPath("/newuser-entry2");
|
||||
|
@ -246,14 +250,7 @@ void TestCli::testAdd()
|
|||
pos = m_stdoutFile->pos();
|
||||
posErr = m_stderrFile->pos();
|
||||
Utils::Test::setNextPassword("a");
|
||||
addCmd.execute({"add",
|
||||
"-u",
|
||||
"newuser3",
|
||||
"-g",
|
||||
"-L",
|
||||
"34",
|
||||
m_dbFile->fileName(),
|
||||
"/newuser-entry3"});
|
||||
addCmd.execute({"add", "-u", "newuser3", "-g", "-L", "34", m_dbFile->fileName(), "/newuser-entry3"});
|
||||
m_stdoutFile->seek(pos);
|
||||
m_stderrFile->seek(posErr);
|
||||
m_stdoutFile->readLine(); // skip password prompt
|
||||
|
@ -433,7 +430,7 @@ void TestCli::testCreate()
|
|||
QCOMPARE(m_stdoutFile->readLine(), QByteArray("Successfully created new database.\n"));
|
||||
|
||||
Utils::Test::setNextPassword("a");
|
||||
auto db = QSharedPointer<Database>(Utils::unlockDatabase(databaseFilename, true, "", Utils::DEVNULL));
|
||||
auto db = QSharedPointer<Database>(Utils::unlockDatabase(databaseFilename, true, "", "", Utils::DEVNULL));
|
||||
QVERIFY(db);
|
||||
|
||||
// Should refuse to create the database if it already exists.
|
||||
|
@ -462,7 +459,8 @@ void TestCli::testCreate()
|
|||
QCOMPARE(m_stdoutFile->readLine(), QByteArray("Successfully created new database.\n"));
|
||||
|
||||
Utils::Test::setNextPassword("a");
|
||||
auto db2 = QSharedPointer<Database>(Utils::unlockDatabase(databaseFilename2, true, keyfilePath, Utils::DEVNULL));
|
||||
auto db2 =
|
||||
QSharedPointer<Database>(Utils::unlockDatabase(databaseFilename2, true, keyfilePath, "", Utils::DEVNULL));
|
||||
QVERIFY(db2);
|
||||
|
||||
// Testing with existing keyfile
|
||||
|
@ -479,7 +477,8 @@ void TestCli::testCreate()
|
|||
QCOMPARE(m_stdoutFile->readLine(), QByteArray("Successfully created new database.\n"));
|
||||
|
||||
Utils::Test::setNextPassword("a");
|
||||
auto db3 = QSharedPointer<Database>(Utils::unlockDatabase(databaseFilename3, true, keyfilePath, Utils::DEVNULL));
|
||||
auto db3 =
|
||||
QSharedPointer<Database>(Utils::unlockDatabase(databaseFilename3, true, keyfilePath, "", Utils::DEVNULL));
|
||||
QVERIFY(db3);
|
||||
}
|
||||
|
||||
|
@ -1471,5 +1470,78 @@ void TestCli::testInvalidDbFiles()
|
|||
m_stderrFile->seek(pos);
|
||||
QCOMPARE(QString(m_stderrFile->readAll()),
|
||||
QObject::tr("Failed to open database file %1: not readable").arg(path) + "\n");
|
||||
#endif // Q_OS_WIN
|
||||
#endif // Q_OS_WIN
|
||||
}
|
||||
|
||||
/**
|
||||
* Secret key for the YubiKey slot used by the unit test is
|
||||
* 1c e3 0f d7 8d 20 dc fa 40 b5 0c 18 77 9a fb 0f 02 28 8d b7
|
||||
* This secret should be configured at slot 2, and the slot
|
||||
* should be configured as passive.
|
||||
*/
|
||||
void TestCli::testYubiKeyOption()
|
||||
{
|
||||
if (!YubiKey::instance()->init()) {
|
||||
QSKIP("Unable to connect to YubiKey");
|
||||
}
|
||||
|
||||
QString errorMessage;
|
||||
bool isBlocking = YubiKey::instance()->checkSlotIsBlocking(2, errorMessage);
|
||||
if (isBlocking && errorMessage.isEmpty()) {
|
||||
QSKIP("Skipping YubiKey in press mode.");
|
||||
}
|
||||
|
||||
QByteArray challenge("CLITest");
|
||||
QByteArray response;
|
||||
YubiKey::instance()->challenge(2, false, challenge, response);
|
||||
QByteArray expected("\xA2\x3B\x94\x00\xBE\x47\x9A\x30\xA9\xEB\x50\x9B\x85\x56\x5B\x6B\x30\x25\xB4\x8E", 20);
|
||||
QVERIFY2(response == expected, "YubiKey Slot 2 is not configured with correct secret key.");
|
||||
|
||||
List listCmd;
|
||||
Add addCmd;
|
||||
|
||||
Utils::Test::setNextPassword("a");
|
||||
listCmd.execute({"ls", "-y", "2", m_yubiKeyProtectedDbFile->fileName()});
|
||||
m_stdoutFile->reset();
|
||||
m_stderrFile->reset();
|
||||
m_stdoutFile->readLine(); // skip password prompt
|
||||
QCOMPARE(m_stdoutFile->readAll(),
|
||||
QByteArray("entry1\n"
|
||||
"entry2\n"));
|
||||
|
||||
// Should raise an error with no yubikey slot.
|
||||
qint64 pos = m_stdoutFile->pos();
|
||||
qint64 posErr = m_stderrFile->pos();
|
||||
Utils::Test::setNextPassword("a");
|
||||
listCmd.execute({"ls", m_yubiKeyProtectedDbFile->fileName()});
|
||||
m_stdoutFile->seek(pos);
|
||||
m_stdoutFile->readLine(); // skip password prompt
|
||||
m_stderrFile->seek(posErr);
|
||||
QCOMPARE(m_stdoutFile->readAll(), QByteArray(""));
|
||||
QCOMPARE(m_stderrFile->readLine(),
|
||||
QByteArray("Error while reading the database: Invalid credentials were provided, please try again.\n"));
|
||||
QCOMPARE(m_stderrFile->readLine(),
|
||||
QByteArray("If this reoccurs, then your database file may be corrupt. (HMAC mismatch)\n"));
|
||||
|
||||
// Should raise an error if yubikey slot is not a string
|
||||
pos = m_stdoutFile->pos();
|
||||
posErr = m_stderrFile->pos();
|
||||
Utils::Test::setNextPassword("a");
|
||||
listCmd.execute({"ls", "-y", "invalidslot", m_yubiKeyProtectedDbFile->fileName()});
|
||||
m_stdoutFile->seek(pos);
|
||||
m_stdoutFile->readLine(); // skip password prompt
|
||||
m_stderrFile->seek(posErr);
|
||||
QCOMPARE(m_stdoutFile->readAll(), QByteArray(""));
|
||||
QCOMPARE(m_stderrFile->readAll().split(':').at(0), QByteArray("Invalid YubiKey slot invalidslot\n"));
|
||||
|
||||
// Should raise an error if yubikey slot is invalid.
|
||||
pos = m_stdoutFile->pos();
|
||||
posErr = m_stderrFile->pos();
|
||||
Utils::Test::setNextPassword("a");
|
||||
listCmd.execute({"ls", "-y", "3", m_yubiKeyProtectedDbFile->fileName()});
|
||||
m_stdoutFile->seek(pos);
|
||||
m_stdoutFile->readLine(); // skip password prompt
|
||||
m_stderrFile->seek(posErr);
|
||||
QCOMPARE(m_stdoutFile->readAll(), QByteArray(""));
|
||||
QCOMPARE(m_stderrFile->readAll().split(':').at(0), QByteArray("Invalid YubiKey slot 3\n"));
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue