fix(tfstated): hash passwords instead of relying on the database encryption key

This commit is contained in:
Julien Dessaux 2024-11-16 00:36:17 +01:00
parent 7c96e1b780
commit 5b6da56089
Signed by: adyxax
GPG key ID: F92E51B86E07177E
7 changed files with 66 additions and 40 deletions

View file

@ -19,7 +19,7 @@ var baseURI = url.URL{
Scheme: "http",
}
var db *database.DB
var password string
var adminPassword string
func TestMain(m *testing.M) {
ctx := context.Background()
@ -46,6 +46,9 @@ func TestMain(m *testing.M) {
}
}
database.AdvertiseAdminPassword = func(password string) {
adminPassword = password
}
go run(
ctx,
&config,
@ -59,13 +62,6 @@ func TestMain(m *testing.M) {
os.Exit(1)
}
admin, err := db.LoadAccountByUsername("admin")
if err != nil {
fmt.Fprintf(os.Stderr, "%+v\n", err)
os.Exit(1)
}
password = admin.Password
ret := m.Run()
cancel()
@ -88,7 +84,7 @@ func runHTTPRequest(method string, auth bool, uriRef *url.URL, body io.Reader, t
return
}
if auth {
req.SetBasicAuth("admin", password)
req.SetBasicAuth("admin", adminPassword)
}
resp, err := client.Do(req)
if err != nil {