mirror of
https://github.com/keepassxreboot/keepassxc.git
synced 2025-04-03 20:47:37 +03:00
Add 1Password 1PUX and Bitwarden JSON Importers
* Closes #7545 - Support 1Password 1PUX import format based on https://support.1password.com/1pux-format/ * Closes #8367 - Support Bitwarden JSON import format (both unencrypted and encrypted) based on https://bitwarden.com/help/encrypted-export/ * Fixes #9577 - OPVault import when fields have the same name or type * Introduce the import wizard to handle all import tasks (CSV, KDBX1, OPVault, 1PUX, JSON) * Clean up CSV parser code to make it much more efficient and easier to read * Combine all importer tests (except CSV) into one test file
This commit is contained in:
parent
a02bceabd2
commit
e700195f0a
70 changed files with 3562 additions and 1876 deletions
|
@ -142,7 +142,7 @@ add_unit_test(NAME testdeletedobjects SOURCES TestDeletedObjects.cpp
|
|||
add_unit_test(NAME testkeepass1reader SOURCES TestKeePass1Reader.cpp
|
||||
LIBS ${TEST_LIBRARIES})
|
||||
|
||||
add_unit_test(NAME testopvaultreader SOURCES TestOpVaultReader.cpp
|
||||
add_unit_test(NAME testimports SOURCES TestImports.cpp
|
||||
LIBS ${TEST_LIBRARIES})
|
||||
|
||||
if(WITH_XC_NETWORKING)
|
||||
|
|
267
tests/TestImports.cpp
Normal file
267
tests/TestImports.cpp
Normal file
|
@ -0,0 +1,267 @@
|
|||
/*
|
||||
* Copyright (C) 2022 KeePassXC Team <team@keepassxc.org>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 2 or (at your option)
|
||||
* version 3 of the License.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#include "TestImports.h"
|
||||
|
||||
#include "config-keepassx-tests.h"
|
||||
#include "core/Group.h"
|
||||
#include "core/Metadata.h"
|
||||
#include "core/Totp.h"
|
||||
#include "crypto/Crypto.h"
|
||||
#include "format/BitwardenReader.h"
|
||||
#include "format/OPUXReader.h"
|
||||
#include "format/OpVaultReader.h"
|
||||
|
||||
#include <QJsonObject>
|
||||
#include <QList>
|
||||
#include <QTest>
|
||||
|
||||
QTEST_GUILESS_MAIN(TestImports)
|
||||
|
||||
void TestImports::initTestCase()
|
||||
{
|
||||
QVERIFY(Crypto::init());
|
||||
}
|
||||
|
||||
void TestImports::testOPUX()
|
||||
{
|
||||
auto opuxPath = QStringLiteral("%1/%2").arg(KEEPASSX_TEST_DATA_DIR, QStringLiteral("/1PasswordExport.1pux"));
|
||||
|
||||
OPUXReader reader;
|
||||
auto db = reader.convert(opuxPath);
|
||||
QVERIFY2(!reader.hasError(), qPrintable(reader.errorString()));
|
||||
QVERIFY(db);
|
||||
|
||||
// Confirm specific entry details are valid
|
||||
auto entry = db->rootGroup()->findEntryByPath("/Personal/Login");
|
||||
QVERIFY(entry);
|
||||
QCOMPARE(entry->title(), QStringLiteral("Login"));
|
||||
QCOMPARE(entry->username(), QStringLiteral("team@keepassxc.org"));
|
||||
QCOMPARE(entry->password(), QStringLiteral("password"));
|
||||
QCOMPARE(entry->url(), QStringLiteral("https://keepassxc.org"));
|
||||
QCOMPARE(entry->notes(), QStringLiteral("Note to self"));
|
||||
// Check extra URL's
|
||||
QCOMPARE(entry->attribute("KP2A_URL_1"), QStringLiteral("https://twitter.com"));
|
||||
// Check TOTP
|
||||
QVERIFY(entry->hasTotp());
|
||||
QVERIFY(!entry->attribute("otp_1").isEmpty());
|
||||
// Check tags
|
||||
QVERIFY(entry->tagList().contains("Favorite"));
|
||||
QVERIFY(entry->tagList().contains("website"));
|
||||
|
||||
// Check attachments
|
||||
entry = db->rootGroup()->findEntryByPath("/Personal/KeePassXC Logo");
|
||||
auto attachments = entry->attachments();
|
||||
QCOMPARE(attachments->keys().count(), 1);
|
||||
QCOMPARE(attachments->keys()[0], QString("keepassxc.png"));
|
||||
|
||||
// Confirm advanced attributes
|
||||
// NOTE: 1PUX does not support an explicit expiration field
|
||||
entry = db->rootGroup()->findEntryByPath("/Personal/Credit Card");
|
||||
QVERIFY(entry);
|
||||
auto tmpl = QString("Credit Card Fields_%1");
|
||||
auto attr = entry->attributes();
|
||||
QCOMPARE(attr->value(tmpl.arg("cardholder name")), QStringLiteral("KeePassXC"));
|
||||
QCOMPARE(attr->value(tmpl.arg("expiry date")), QStringLiteral("202206"));
|
||||
QCOMPARE(attr->value(tmpl.arg("verification number")), QStringLiteral("123"));
|
||||
QVERIFY(attr->isProtected(tmpl.arg("verification number")));
|
||||
|
||||
// Confirm address fields
|
||||
entry = db->rootGroup()->findEntryByPath("/Personal/Identity");
|
||||
QVERIFY(entry);
|
||||
attr = entry->attributes();
|
||||
QCOMPARE(attr->value("Address_address"), QStringLiteral("123 Avenue Rd\nBoston, MA 12345\nus"));
|
||||
|
||||
// Check archived entries
|
||||
entry = db->rootGroup()->findEntryByPath("/Personal/Login Archived");
|
||||
QVERIFY(entry);
|
||||
QVERIFY(entry->tagList().contains("Archived"));
|
||||
|
||||
// Check vault to group structure
|
||||
entry = db->rootGroup()->findEntryByPath("/Shared/Bank Account");
|
||||
QVERIFY(entry);
|
||||
// Check custom group icon
|
||||
QVERIFY(!entry->group()->iconUuid().isNull());
|
||||
}
|
||||
|
||||
void TestImports::testOPVault()
|
||||
{
|
||||
auto opVaultPath = QStringLiteral("%1/%2").arg(KEEPASSX_TEST_DATA_DIR, QStringLiteral("/keepassxc.opvault"));
|
||||
|
||||
auto categories = QStringList({QStringLiteral("Login"),
|
||||
QStringLiteral("Credit Card"),
|
||||
QStringLiteral("Secure Note"),
|
||||
QStringLiteral("Identity"),
|
||||
QStringLiteral("Password"),
|
||||
QStringLiteral("Tombstone"),
|
||||
QStringLiteral("Software License"),
|
||||
QStringLiteral("Bank Account"),
|
||||
QStringLiteral("Database"),
|
||||
QStringLiteral("Driver License"),
|
||||
QStringLiteral("Outdoor License"),
|
||||
QStringLiteral("Membership"),
|
||||
QStringLiteral("Passport"),
|
||||
QStringLiteral("Rewards"),
|
||||
QStringLiteral("SSN"),
|
||||
QStringLiteral("Router"),
|
||||
QStringLiteral("Server"),
|
||||
QStringLiteral("Email")});
|
||||
|
||||
QDir opVaultDir(opVaultPath);
|
||||
|
||||
OpVaultReader reader;
|
||||
auto db = reader.convert(opVaultDir, "a");
|
||||
QVERIFY2(!reader.hasError(), qPrintable(reader.errorString()));
|
||||
QVERIFY(db);
|
||||
|
||||
// Confirm specific entry details are valid
|
||||
auto entry = db->rootGroup()->findEntryByPath("/Login/KeePassXC");
|
||||
QVERIFY(entry);
|
||||
QCOMPARE(entry->title(), QStringLiteral("KeePassXC"));
|
||||
QCOMPARE(entry->username(), QStringLiteral("keepassxc"));
|
||||
QCOMPARE(entry->password(), QStringLiteral("opvault"));
|
||||
QCOMPARE(entry->url(), QStringLiteral("https://www.keepassxc.org"));
|
||||
QCOMPARE(entry->notes(), QStringLiteral("KeePassXC Account"));
|
||||
// Check extra URL's
|
||||
QCOMPARE(entry->attribute("KP2A_URL_1"), QStringLiteral("https://snapshot.keepassxc.org"));
|
||||
// Check TOTP
|
||||
QVERIFY(entry->hasTotp());
|
||||
// Check attachments
|
||||
auto attachments = entry->attachments();
|
||||
QCOMPARE(attachments->keys().count(), 1);
|
||||
QCOMPARE(*attachments->values().begin(), QByteArray("attachment"));
|
||||
|
||||
// Confirm expired entries
|
||||
entry = db->rootGroup()->findEntryByPath("/Login/Expired Login");
|
||||
QVERIFY(entry->isExpired());
|
||||
|
||||
// Confirm advanced attributes
|
||||
entry = db->rootGroup()->findEntryByPath("/Credit Card/My Credit Card");
|
||||
QVERIFY(entry);
|
||||
auto attr = entry->attributes();
|
||||
QCOMPARE(attr->value("cardholder name"), QStringLiteral("Team KeePassXC"));
|
||||
QVERIFY(!attr->value("valid from").isEmpty());
|
||||
QCOMPARE(attr->value("Additional Details_PIN"), QStringLiteral("1234"));
|
||||
QVERIFY(attr->isProtected("Additional Details_PIN"));
|
||||
|
||||
// Confirm address fields
|
||||
entry = db->rootGroup()->findEntryByPath("/Identity/Team KeePassXC");
|
||||
QVERIFY(entry);
|
||||
attr = entry->attributes();
|
||||
QCOMPARE(attr->value("address_street"), QStringLiteral("123 Password Lane"));
|
||||
|
||||
// Confirm complex passwords
|
||||
entry = db->rootGroup()->findEntryByPath("/Password/Complex Password");
|
||||
QVERIFY(entry);
|
||||
QCOMPARE(entry->password(), QStringLiteral("HfgcHjEL}iO}^3N!?*cv~O:9GJZQ0>oC"));
|
||||
QVERIFY(entry->hasTotp());
|
||||
auto totpSettings = entry->totpSettings();
|
||||
QCOMPARE(totpSettings->digits, static_cast<unsigned int>(8));
|
||||
QCOMPARE(totpSettings->step, static_cast<unsigned int>(45));
|
||||
|
||||
// Add another OTP to this entry to confirm it doesn't overwrite the existing one
|
||||
auto field = QJsonObject::fromVariantMap({{"n", "TOTP_SETTINGS"}, {"v", "otpauth://test.url?digits=6"}});
|
||||
reader.fillFromSectionField(entry, "", field);
|
||||
QVERIFY(entry->hasTotp());
|
||||
totpSettings = entry->totpSettings();
|
||||
QCOMPARE(totpSettings->digits, static_cast<unsigned int>(8));
|
||||
QCOMPARE(totpSettings->step, static_cast<unsigned int>(45));
|
||||
QVERIFY(entry->attributes()->contains("otp_1"));
|
||||
|
||||
// Confirm trashed entries are sent to the recycle bin
|
||||
auto recycleBin = db->metadata()->recycleBin();
|
||||
QVERIFY(recycleBin);
|
||||
QVERIFY(!recycleBin->isEmpty());
|
||||
QVERIFY(recycleBin->findEntryByPath("Trashed Password"));
|
||||
|
||||
// Confirm created groups align with category names
|
||||
for (const auto group : db->rootGroup()->children()) {
|
||||
if (group == recycleBin) {
|
||||
continue;
|
||||
}
|
||||
QVERIFY2(categories.contains(group->name()),
|
||||
qPrintable(QStringLiteral("Invalid group name: %1").arg(group->name())));
|
||||
// Confirm each group is not empty
|
||||
QVERIFY2(!group->isEmpty(), qPrintable(QStringLiteral("Group %1 is empty").arg(group->name())));
|
||||
}
|
||||
}
|
||||
|
||||
void TestImports::testBitwarden()
|
||||
{
|
||||
auto bitwardenPath = QStringLiteral("%1/%2").arg(KEEPASSX_TEST_DATA_DIR, QStringLiteral("/bitwarden_export.json"));
|
||||
|
||||
BitwardenReader reader;
|
||||
auto db = reader.convert(bitwardenPath);
|
||||
QVERIFY2(!reader.hasError(), qPrintable(reader.errorString()));
|
||||
QVERIFY(db);
|
||||
|
||||
// Confirm Login fields
|
||||
auto entry = db->rootGroup()->findEntryByPath("/My Folder/Login Name");
|
||||
QVERIFY(entry);
|
||||
QCOMPARE(entry->title(), QStringLiteral("Login Name"));
|
||||
QCOMPARE(entry->username(), QStringLiteral("myusername@gmail.com"));
|
||||
QCOMPARE(entry->password(), QStringLiteral("mypassword"));
|
||||
QCOMPARE(entry->url(), QStringLiteral("https://mail.google.com"));
|
||||
QCOMPARE(entry->notes(), QStringLiteral("1st line of note text\n2nd Line of note text"));
|
||||
// Check extra URL's
|
||||
QCOMPARE(entry->attribute("KP2A_URL_1"), QStringLiteral("https://google.com"));
|
||||
QCOMPARE(entry->attribute("KP2A_URL_2"), QStringLiteral("https://gmail.com"));
|
||||
// Check TOTP
|
||||
QVERIFY(entry->hasTotp());
|
||||
// NOTE: Bitwarden does not export attachments
|
||||
// NOTE: Bitwarden does not export expiration dates
|
||||
|
||||
// Confirm Identity fields
|
||||
entry = db->rootGroup()->findEntryByPath("/My Folder/My Identity");
|
||||
QVERIFY(entry);
|
||||
auto attr = entry->attributes();
|
||||
// NOTE: The extra spaces are deliberate to test unmodified ingest of data
|
||||
QCOMPARE(attr->value("identity_address"),
|
||||
QStringLiteral(" 1 North Calle Cesar Chavez \nSanta Barbara, CA 93103\nUnited States "));
|
||||
QCOMPARE(attr->value("identity_name"), QStringLiteral("Mrs Jane A Doe"));
|
||||
QCOMPARE(attr->value("identity_ssn"), QStringLiteral("123-12-1234"));
|
||||
QVERIFY(attr->isProtected("identity_ssn"));
|
||||
|
||||
// Confirm Secure Note
|
||||
entry = db->rootGroup()->findEntryByPath("/My Folder/My Secure Note");
|
||||
QVERIFY(entry);
|
||||
QCOMPARE(entry->notes(),
|
||||
QStringLiteral("1st line of secure note\n2nd line of secure note\n3rd line of secure note"));
|
||||
|
||||
// Confirm Credit Card
|
||||
entry = db->rootGroup()->findEntryByPath("/Second Folder/Card Name");
|
||||
QVERIFY(entry);
|
||||
attr = entry->attributes();
|
||||
QCOMPARE(attr->value("card_cardholderName"), QStringLiteral("Jane Doe"));
|
||||
QCOMPARE(attr->value("card_number"), QStringLiteral("1234567891011121"));
|
||||
QCOMPARE(attr->value("card_code"), QStringLiteral("123"));
|
||||
QVERIFY(attr->isProtected("card_code"));
|
||||
}
|
||||
|
||||
void TestImports::testBitwardenEncrypted()
|
||||
{
|
||||
// We already tested the parser so just test that decryption works properly
|
||||
auto bitwardenPath =
|
||||
QStringLiteral("%1/%2").arg(KEEPASSX_TEST_DATA_DIR, QStringLiteral("/bitwarden_encrypted_export.json"));
|
||||
|
||||
BitwardenReader reader;
|
||||
auto db = reader.convert(bitwardenPath, "a");
|
||||
if (reader.hasError()) {
|
||||
QFAIL(qPrintable(reader.errorString()));
|
||||
}
|
||||
QVERIFY(db);
|
||||
}
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Copyright (C) 2019 KeePassXC Team <team@keepassxc.org>
|
||||
* Copyright (C) 2022 KeePassXC Team <team@keepassxc.org>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
|
@ -15,31 +15,21 @@
|
|||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#ifndef TEST_OPVAULT_READER_H_
|
||||
#define TEST_OPVAULT_READER_H_
|
||||
#ifndef TEST_IMPORTS_H
|
||||
#define TEST_IMPORTS_H
|
||||
|
||||
#include <QMap>
|
||||
#include <QObject>
|
||||
|
||||
class TestOpVaultReader : public QObject
|
||||
class TestImports : public QObject
|
||||
{
|
||||
Q_OBJECT
|
||||
|
||||
private slots:
|
||||
void initTestCase();
|
||||
void testReadIntoDatabase();
|
||||
|
||||
private:
|
||||
// absolute path to the .opvault directory
|
||||
QString m_opVaultPath;
|
||||
|
||||
/*
|
||||
* Points to the file made by using the 1Password GUI to "Export all"
|
||||
* to its text file format, which are almost key=value pairs
|
||||
* except for multi-line strings.
|
||||
*/
|
||||
QString m_opVaultTextExportPath;
|
||||
QStringList m_categories;
|
||||
void testOPUX();
|
||||
void testOPVault();
|
||||
void testBitwarden();
|
||||
void testBitwardenEncrypted();
|
||||
};
|
||||
|
||||
#endif /* TEST_OPVAULT_READER_H_ */
|
||||
#endif /* TEST_IMPORTS_H */
|
|
@ -1,139 +0,0 @@
|
|||
/*
|
||||
* Copyright (C) 2019 KeePassXC Team <team@keepassxc.org>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 2 or (at your option)
|
||||
* version 3 of the License.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#include "TestOpVaultReader.h"
|
||||
|
||||
#include "config-keepassx-tests.h"
|
||||
#include "core/Group.h"
|
||||
#include "core/Metadata.h"
|
||||
#include "core/Totp.h"
|
||||
#include "crypto/Crypto.h"
|
||||
#include "format/OpVaultReader.h"
|
||||
|
||||
#include <QJsonObject>
|
||||
#include <QList>
|
||||
#include <QStringList>
|
||||
#include <QTest>
|
||||
|
||||
QTEST_GUILESS_MAIN(TestOpVaultReader)
|
||||
|
||||
void TestOpVaultReader::initTestCase()
|
||||
{
|
||||
QVERIFY(Crypto::init());
|
||||
|
||||
m_opVaultPath = QStringLiteral("%1/%2").arg(KEEPASSX_TEST_DATA_DIR, QStringLiteral("/keepassxc.opvault"));
|
||||
|
||||
m_categories = QStringList({QStringLiteral("Login"),
|
||||
QStringLiteral("Credit Card"),
|
||||
QStringLiteral("Secure Note"),
|
||||
QStringLiteral("Identity"),
|
||||
QStringLiteral("Password"),
|
||||
QStringLiteral("Tombstone"),
|
||||
QStringLiteral("Software License"),
|
||||
QStringLiteral("Bank Account"),
|
||||
QStringLiteral("Database"),
|
||||
QStringLiteral("Driver License"),
|
||||
QStringLiteral("Outdoor License"),
|
||||
QStringLiteral("Membership"),
|
||||
QStringLiteral("Passport"),
|
||||
QStringLiteral("Rewards"),
|
||||
QStringLiteral("SSN"),
|
||||
QStringLiteral("Router"),
|
||||
QStringLiteral("Server"),
|
||||
QStringLiteral("Email")});
|
||||
}
|
||||
|
||||
void TestOpVaultReader::testReadIntoDatabase()
|
||||
{
|
||||
QDir opVaultDir(m_opVaultPath);
|
||||
|
||||
OpVaultReader reader;
|
||||
QScopedPointer<Database> db(reader.readDatabase(opVaultDir, "a"));
|
||||
QVERIFY(db);
|
||||
QVERIFY2(!reader.hasError(), qPrintable(reader.errorString()));
|
||||
|
||||
// Confirm specific entry details are valid
|
||||
auto entry = db->rootGroup()->findEntryByPath("/Login/KeePassXC");
|
||||
QVERIFY(entry);
|
||||
QCOMPARE(entry->title(), QStringLiteral("KeePassXC"));
|
||||
QCOMPARE(entry->username(), QStringLiteral("keepassxc"));
|
||||
QCOMPARE(entry->password(), QStringLiteral("opvault"));
|
||||
QCOMPARE(entry->url(), QStringLiteral("https://www.keepassxc.org"));
|
||||
QCOMPARE(entry->notes(), QStringLiteral("KeePassXC Account"));
|
||||
// Check extra URL's
|
||||
QCOMPARE(entry->attribute("KP2A_URL_1"), QStringLiteral("https://snapshot.keepassxc.org"));
|
||||
// Check TOTP
|
||||
QVERIFY(entry->hasTotp());
|
||||
// Check attachments
|
||||
auto attachments = entry->attachments();
|
||||
QCOMPARE(attachments->keys().count(), 1);
|
||||
QCOMPARE(*attachments->values().begin(), QByteArray("attachment"));
|
||||
|
||||
// Confirm expired entries
|
||||
entry = db->rootGroup()->findEntryByPath("/Login/Expired Login");
|
||||
QVERIFY(entry->isExpired());
|
||||
|
||||
// Confirm advanced attributes
|
||||
entry = db->rootGroup()->findEntryByPath("/Credit Card/My Credit Card");
|
||||
QVERIFY(entry);
|
||||
auto attr = entry->attributes();
|
||||
QCOMPARE(attr->value("cardholder name"), QStringLiteral("Team KeePassXC"));
|
||||
QVERIFY(!attr->value("valid from").isEmpty());
|
||||
QCOMPARE(attr->value("Additional Details_PIN"), QStringLiteral("1234"));
|
||||
QVERIFY(attr->isProtected("Additional Details_PIN"));
|
||||
|
||||
// Confirm address fields
|
||||
entry = db->rootGroup()->findEntryByPath("/Identity/Team KeePassXC");
|
||||
QVERIFY(entry);
|
||||
attr = entry->attributes();
|
||||
QCOMPARE(attr->value("address_street"), QStringLiteral("123 Password Lane"));
|
||||
|
||||
// Confirm complex passwords
|
||||
entry = db->rootGroup()->findEntryByPath("/Password/Complex Password");
|
||||
QVERIFY(entry);
|
||||
QCOMPARE(entry->password(), QStringLiteral("HfgcHjEL}iO}^3N!?*cv~O:9GJZQ0>oC"));
|
||||
QVERIFY(entry->hasTotp());
|
||||
auto totpSettings = entry->totpSettings();
|
||||
QCOMPARE(totpSettings->digits, static_cast<unsigned int>(8));
|
||||
QCOMPARE(totpSettings->step, static_cast<unsigned int>(45));
|
||||
|
||||
// Add another OTP to this entry to confirm it doesn't overwrite the existing one
|
||||
auto field = QJsonObject::fromVariantMap({{"n", "TOTP_SETTINGS"}, {"v", "otpauth://test.url?digits=6"}});
|
||||
reader.fillFromSectionField(entry, "", field);
|
||||
QVERIFY(entry->hasTotp());
|
||||
totpSettings = entry->totpSettings();
|
||||
QCOMPARE(totpSettings->digits, static_cast<unsigned int>(8));
|
||||
QCOMPARE(totpSettings->step, static_cast<unsigned int>(45));
|
||||
QVERIFY(entry->attributes()->contains("otp_1"));
|
||||
|
||||
// Confirm trashed entries are sent to the recycle bin
|
||||
auto recycleBin = db->metadata()->recycleBin();
|
||||
QVERIFY(recycleBin);
|
||||
QVERIFY(!recycleBin->isEmpty());
|
||||
QVERIFY(recycleBin->findEntryByPath("Trashed Password"));
|
||||
|
||||
// Confirm created groups align with category names
|
||||
for (const auto group : db->rootGroup()->children()) {
|
||||
if (group == recycleBin) {
|
||||
continue;
|
||||
}
|
||||
QVERIFY2(m_categories.contains(group->name()),
|
||||
qPrintable(QStringLiteral("Invalid group name: %1").arg(group->name())));
|
||||
// Confirm each group is not empty
|
||||
QVERIFY2(!group->isEmpty(), qPrintable(QStringLiteral("Group %1 is empty").arg(group->name())));
|
||||
}
|
||||
}
|
BIN
tests/data/1PasswordExport.1pux
Normal file
BIN
tests/data/1PasswordExport.1pux
Normal file
Binary file not shown.
11
tests/data/bitwarden_encrypted_export.json
Normal file
11
tests/data/bitwarden_encrypted_export.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
{
|
||||
"encrypted": true,
|
||||
"passwordProtected": true,
|
||||
"salt": "jxJdzv853aLmu0y/mCgSxg==",
|
||||
"kdfType": 0,
|
||||
"kdfIterations": 100000,
|
||||
"kdfMemory": null,
|
||||
"kdfParallelism": null,
|
||||
"encKeyValidation_DO_NOT_EDIT": "2.6O5+RkqPRTCxGIjEIyqukQ==|J7Ks4QhjfOyt7qMU82XEuJoGw0GpQabv0vGerKC+YjSQWmaqbbyMDgba78vyRvSU|f0nwbY+JRc2KfkU6mY0dmiKNiDb00A0CngpF4TEEM0c=",
|
||||
"data": "2.OA/bDI14kq+642rwmWYWxg==|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|ASjBD0/F6Z61WSWc++RXhA6iQv8AziJO+/EXrj7GSVY="
|
||||
}
|
180
tests/data/bitwarden_export.json
Normal file
180
tests/data/bitwarden_export.json
Normal file
|
@ -0,0 +1,180 @@
|
|||
{
|
||||
"folders": [
|
||||
{
|
||||
"id": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
|
||||
"name": "My Folder"
|
||||
},
|
||||
{
|
||||
"id": "yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyyyyyyy",
|
||||
"name": "Second Folder"
|
||||
}
|
||||
],
|
||||
"items": [
|
||||
{
|
||||
"id": "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaa",
|
||||
"organizationId": null,
|
||||
"folderId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
|
||||
"type": 2,
|
||||
"name": "My Secure Note",
|
||||
"notes": "1st line of secure note\n2nd line of secure note\n3rd line of secure note",
|
||||
"favorite": false,
|
||||
"fields": [
|
||||
{
|
||||
"name": "Text Field",
|
||||
"value": "text-field-value",
|
||||
"type": 0
|
||||
},
|
||||
{
|
||||
"name": "Hidden Field",
|
||||
"value": "hidden-field-value",
|
||||
"type": 1
|
||||
},
|
||||
{
|
||||
"name": "Boolean Field",
|
||||
"value": "false",
|
||||
"type": 2
|
||||
}
|
||||
],
|
||||
"secureNote": {
|
||||
"type": 0
|
||||
},
|
||||
"collectionIds": [
|
||||
null
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb",
|
||||
"organizationId": null,
|
||||
"folderId": "yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyyyyyyy",
|
||||
"type": 3,
|
||||
"name": "Card Name",
|
||||
"notes": "1st line of note text\n2nd line of note text",
|
||||
"favorite": false,
|
||||
"fields": [
|
||||
{
|
||||
"name": "Text Field",
|
||||
"value": "text-field-value",
|
||||
"type": 0
|
||||
},
|
||||
{
|
||||
"name": "Hidden Field",
|
||||
"value": "hidden-field-value",
|
||||
"type": 1
|
||||
},
|
||||
{
|
||||
"name": "Boolean Field",
|
||||
"value": "false",
|
||||
"type": 2
|
||||
}
|
||||
],
|
||||
"card": {
|
||||
"cardholderName": "Jane Doe",
|
||||
"brand": "Visa",
|
||||
"number": "1234567891011121",
|
||||
"expMonth": "10",
|
||||
"expYear": "2021",
|
||||
"code": "123"
|
||||
},
|
||||
"collectionIds": [
|
||||
null
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "cccccccc-cccc-cccc-cccc-cccccccccccc",
|
||||
"organizationId": null,
|
||||
"folderId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
|
||||
"type": 4,
|
||||
"name": "My Identity",
|
||||
"notes": "1st line of a note\n2nd line of a note",
|
||||
"favorite": false,
|
||||
"fields": [
|
||||
{
|
||||
"name": "Text Field",
|
||||
"value": "text-field-value",
|
||||
"type": 0
|
||||
},
|
||||
{
|
||||
"name": "Hidden Field",
|
||||
"value": "hidden-field-value",
|
||||
"type": 1
|
||||
},
|
||||
{
|
||||
"name": "Boolean Field",
|
||||
"value": "true",
|
||||
"type": 2
|
||||
}
|
||||
],
|
||||
"identity": {
|
||||
"title": "Mrs",
|
||||
"firstName": "Jane",
|
||||
"middleName": "A",
|
||||
"lastName": "Doe",
|
||||
"address1": " 1 North Calle Cesar Chavez ",
|
||||
"address2": null,
|
||||
"address3": null,
|
||||
"city": "Santa Barbara",
|
||||
"state": "CA",
|
||||
"postalCode": "93103",
|
||||
"country": "United States ",
|
||||
"company": "My Employer",
|
||||
"email": "myemail@gmail.com",
|
||||
"phone": "123-123-1234",
|
||||
"ssn": "123-12-1234",
|
||||
"username": "myusername",
|
||||
"passportNumber": "123456789",
|
||||
"licenseNumber": "123456789"
|
||||
},
|
||||
"collectionIds": [
|
||||
null
|
||||
]
|
||||
},
|
||||
{
|
||||
"id": "dddddddd-dddd-dddd-dddd-dddddddddddd",
|
||||
"organizationId": null,
|
||||
"folderId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
|
||||
"type": 1,
|
||||
"name": "Login Name",
|
||||
"notes": "1st line of note text\n2nd Line of note text",
|
||||
"favorite": true,
|
||||
"fields": [
|
||||
{
|
||||
"name": "Text Field",
|
||||
"value": "text-field-value",
|
||||
"type": 0
|
||||
},
|
||||
{
|
||||
"name": "Hidden Field",
|
||||
"value": "hidden-field-value",
|
||||
"type": 1
|
||||
},
|
||||
{
|
||||
"name": "Boolean Field",
|
||||
"value": "true",
|
||||
"type": 2
|
||||
}
|
||||
],
|
||||
"login": {
|
||||
"uris": [
|
||||
{
|
||||
"match": null,
|
||||
"uri": "https://mail.google.com"
|
||||
},
|
||||
{
|
||||
"match": null,
|
||||
"uri": "https://google.com"
|
||||
},
|
||||
{
|
||||
"match": null,
|
||||
"uri": "https://gmail.com"
|
||||
}
|
||||
],
|
||||
"username": "myusername@gmail.com",
|
||||
"password": "mypassword",
|
||||
"totp": "otpauth://totp/Google:myusername%40gmail.com?secret=DFDFDEF%3D&period=30&digits=6&issuer=Google"
|
||||
},
|
||||
"collectionIds": [
|
||||
null
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
|
@ -1640,28 +1640,6 @@ void TestGui::testDatabaseSettings()
|
|||
config()->set(Config::AutoSaveAfterEveryChange, false);
|
||||
}
|
||||
|
||||
void TestGui::testKeePass1Import()
|
||||
{
|
||||
fileDialog()->setNextFileName(QString(KEEPASSX_TEST_DATA_DIR).append("/basic.kdb"));
|
||||
triggerAction("actionImportKeePass1");
|
||||
|
||||
auto* keepass1OpenWidget = m_tabWidget->currentDatabaseWidget()->findChild<QWidget*>("keepass1OpenWidget");
|
||||
auto* editPassword =
|
||||
keepass1OpenWidget->findChild<PasswordWidget*>("editPassword")->findChild<QLineEdit*>("passwordEdit");
|
||||
QVERIFY(editPassword);
|
||||
|
||||
QTest::keyClicks(editPassword, "masterpw");
|
||||
QTest::keyClick(editPassword, Qt::Key_Enter);
|
||||
|
||||
QTRY_COMPARE(m_tabWidget->count(), 2);
|
||||
QTRY_COMPARE(m_tabWidget->tabText(m_tabWidget->currentIndex()), QString("basic [New Database]*"));
|
||||
|
||||
// Close the KeePass1 Database
|
||||
MessageBox::setNextAnswer(MessageBox::No);
|
||||
triggerAction("actionDatabaseClose");
|
||||
QApplication::processEvents();
|
||||
}
|
||||
|
||||
void TestGui::testDatabaseLocking()
|
||||
{
|
||||
QString origDbName = m_tabWidget->tabText(0);
|
||||
|
|
|
@ -61,7 +61,6 @@ private slots:
|
|||
void testSaveBackupPath();
|
||||
void testSaveBackupPath_data();
|
||||
void testDatabaseSettings();
|
||||
void testKeePass1Import();
|
||||
void testDatabaseLocking();
|
||||
void testDragAndDropKdbxFiles();
|
||||
void testSortGroups();
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue