diff options
25 files changed, 308 insertions, 109 deletions
diff --git a/benchmarks/load_testing/users.ex b/benchmarks/load_testing/users.ex index 1a8c6e22f..e4d0b22ff 100644 --- a/benchmarks/load_testing/users.ex +++ b/benchmarks/load_testing/users.ex @@ -55,7 +55,7 @@ defmodule Pleroma.LoadTesting.Users do        name: "Test テスト User #{i}",        email: "user#{i}@example.com",        nickname: "nick#{i}", -      password_hash: Comeonin.Pbkdf2.hashpwsalt("test"), +      password_hash: Pbkdf2.hash_pwd_salt("test"),        bio: "Tester Number #{i}",        local: !remote      } diff --git a/lib/pleroma/bbs/authenticator.ex b/lib/pleroma/bbs/authenticator.ex index e5b37f33e..d4494b003 100644 --- a/lib/pleroma/bbs/authenticator.ex +++ b/lib/pleroma/bbs/authenticator.ex @@ -4,7 +4,6 @@  defmodule Pleroma.BBS.Authenticator do    use Sshd.PasswordAuthenticator -  alias Comeonin.Pbkdf2    alias Pleroma.User    def authenticate(username, password) do @@ -12,7 +11,7 @@ defmodule Pleroma.BBS.Authenticator do      password = to_string(password)      with %User{} = user <- User.get_by_nickname(username) do -      Pbkdf2.checkpw(password, user.password_hash) +      Pbkdf2.verify_pass(password, user.password_hash)      else        _e -> false      end diff --git a/lib/pleroma/mfa.ex b/lib/pleroma/mfa.ex index d353a4dad..2b77f5426 100644 --- a/lib/pleroma/mfa.ex +++ b/lib/pleroma/mfa.ex @@ -7,7 +7,6 @@ defmodule Pleroma.MFA do    The MFA context.    """ -  alias Comeonin.Pbkdf2    alias Pleroma.User    alias Pleroma.MFA.BackupCodes @@ -72,7 +71,7 @@ defmodule Pleroma.MFA do    @spec generate_backup_codes(User.t()) :: {:ok, list(binary)} | {:error, String.t()}    def generate_backup_codes(%User{} = user) do      with codes <- BackupCodes.generate(), -         hashed_codes <- Enum.map(codes, &Pbkdf2.hashpwsalt/1), +         hashed_codes <- Enum.map(codes, &Pbkdf2.hash_pwd_salt/1),           changeset <- Changeset.cast_backup_codes(user, hashed_codes),           {:ok, _} <- User.update_and_set_cache(changeset) do        {:ok, codes} diff --git a/lib/pleroma/plugs/authentication_plug.ex b/lib/pleroma/plugs/authentication_plug.ex index 0061c69dc..ae4a235bd 100644 --- a/lib/pleroma/plugs/authentication_plug.ex +++ b/lib/pleroma/plugs/authentication_plug.ex @@ -3,7 +3,6 @@  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Plugs.AuthenticationPlug do -  alias Comeonin.Pbkdf2    alias Pleroma.Plugs.OAuthScopesPlug    alias Pleroma.User @@ -18,7 +17,7 @@ defmodule Pleroma.Plugs.AuthenticationPlug do    end    def checkpw(password, "$pbkdf2" <> _ = password_hash) do -    Pbkdf2.checkpw(password, password_hash) +    Pbkdf2.verify_pass(password, password_hash)    end    def checkpw(_password, _password_hash) do @@ -37,7 +36,7 @@ defmodule Pleroma.Plugs.AuthenticationPlug do          } = conn,          _        ) do -    if Pbkdf2.checkpw(password, password_hash) do +    if Pbkdf2.verify_pass(password, password_hash) do        conn        |> assign(:user, auth_user)        |> OAuthScopesPlug.skip_plug() @@ -47,7 +46,7 @@ defmodule Pleroma.Plugs.AuthenticationPlug do    end    def call(%{assigns: %{auth_credentials: %{password: _}}} = conn, _) do -    Pbkdf2.dummy_checkpw() +    Pbkdf2.no_user_verify()      conn    end diff --git a/lib/pleroma/user.ex b/lib/pleroma/user.ex index a86cc3202..cba391072 100644 --- a/lib/pleroma/user.ex +++ b/lib/pleroma/user.ex @@ -9,7 +9,6 @@ defmodule Pleroma.User do    import Ecto.Query    import Ecto, only: [assoc: 2] -  alias Comeonin.Pbkdf2    alias Ecto.Multi    alias Pleroma.Activity    alias Pleroma.Config @@ -1926,7 +1925,7 @@ defmodule Pleroma.User do    defp put_password_hash(           %Ecto.Changeset{valid?: true, changes: %{password: password}} = changeset         ) do -    change(changeset, password_hash: Pbkdf2.hashpwsalt(password)) +    change(changeset, password_hash: Pbkdf2.hash_pwd_salt(password))    end    defp put_password_hash(changeset), do: changeset diff --git a/lib/pleroma/web/api_spec/operations/timeline_operation.ex b/lib/pleroma/web/api_spec/operations/timeline_operation.ex new file mode 100644 index 000000000..1b89035d4 --- /dev/null +++ b/lib/pleroma/web/api_spec/operations/timeline_operation.ex @@ -0,0 +1,199 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.ApiSpec.TimelineOperation do +  alias OpenApiSpex.Operation +  alias OpenApiSpex.Schema +  alias Pleroma.Web.ApiSpec.Schemas.ApiError +  alias Pleroma.Web.ApiSpec.Schemas.BooleanLike +  alias Pleroma.Web.ApiSpec.Schemas.Status +  alias Pleroma.Web.ApiSpec.Schemas.VisibilityScope + +  import Pleroma.Web.ApiSpec.Helpers + +  def open_api_operation(action) do +    operation = String.to_existing_atom("#{action}_operation") +    apply(__MODULE__, operation, []) +  end + +  def home_operation do +    %Operation{ +      tags: ["Timelines"], +      summary: "Home timeline", +      description: "View statuses from followed users", +      security: [%{"oAuth" => ["read:statuses"]}], +      parameters: [ +        local_param(), +        with_muted_param(), +        exclude_visibilities_param(), +        reply_visibility_param(), +        with_relationships_param() | pagination_params() +      ], +      operationId: "TimelineController.home", +      responses: %{ +        200 => Operation.response("Array of Status", "application/json", array_of_statuses()) +      } +    } +  end + +  def direct_operation do +    %Operation{ +      tags: ["Timelines"], +      summary: "Direct timeline", +      description: +        "View statuses with a “direct” privacy, from your account or in your notifications", +      deprecated: true, +      parameters: pagination_params(), +      security: [%{"oAuth" => ["read:statuses"]}], +      operationId: "TimelineController.direct", +      responses: %{ +        200 => Operation.response("Array of Status", "application/json", array_of_statuses()) +      } +    } +  end + +  def public_operation do +    %Operation{ +      tags: ["Timelines"], +      summary: "Public timeline", +      security: [%{"oAuth" => ["read:statuses"]}], +      parameters: [ +        local_param(), +        only_media_param(), +        with_muted_param(), +        exclude_visibilities_param(), +        reply_visibility_param(), +        with_relationships_param() | pagination_params() +      ], +      operationId: "TimelineController.public", +      responses: %{ +        200 => Operation.response("Array of Status", "application/json", array_of_statuses()), +        401 => Operation.response("Error", "application/json", ApiError) +      } +    } +  end + +  def hashtag_operation do +    %Operation{ +      tags: ["Timelines"], +      summary: "Hashtag timeline", +      description: "View public statuses containing the given hashtag", +      security: [%{"oAuth" => ["read:statuses"]}], +      parameters: [ +        Operation.parameter( +          :tag, +          :path, +          %Schema{type: :string}, +          "Content of a #hashtag, not including # symbol.", +          required: true +        ), +        Operation.parameter( +          :any, +          :query, +          %Schema{type: :array, items: %Schema{type: :string}}, +          "Statuses that also includes any of these tags" +        ), +        Operation.parameter( +          :all, +          :query, +          %Schema{type: :array, items: %Schema{type: :string}}, +          "Statuses that also includes all of these tags" +        ), +        Operation.parameter( +          :none, +          :query, +          %Schema{type: :array, items: %Schema{type: :string}}, +          "Statuses that do not include these tags" +        ), +        local_param(), +        only_media_param(), +        with_muted_param(), +        exclude_visibilities_param(), +        with_relationships_param() | pagination_params() +      ], +      operationId: "TimelineController.hashtag", +      responses: %{ +        200 => Operation.response("Array of Status", "application/json", array_of_statuses()) +      } +    } +  end + +  def list_operation do +    %Operation{ +      tags: ["Timelines"], +      summary: "List timeline", +      description: "View statuses in the given list timeline", +      security: [%{"oAuth" => ["read:lists"]}], +      parameters: [ +        Operation.parameter( +          :list_id, +          :path, +          %Schema{type: :string}, +          "Local ID of the list in the database", +          required: true +        ), +        with_muted_param(), +        exclude_visibilities_param(), +        with_relationships_param() | pagination_params() +      ], +      operationId: "TimelineController.list", +      responses: %{ +        200 => Operation.response("Array of Status", "application/json", array_of_statuses()) +      } +    } +  end + +  defp array_of_statuses do +    %Schema{ +      title: "ArrayOfStatuses", +      type: :array, +      items: Status, +      example: [Status.schema().example] +    } +  end + +  defp with_relationships_param do +    Operation.parameter(:with_relationships, :query, BooleanLike, "Include relationships") +  end + +  defp local_param do +    Operation.parameter( +      :local, +      :query, +      %Schema{allOf: [BooleanLike], default: false}, +      "Show only local statuses?" +    ) +  end + +  defp with_muted_param do +    Operation.parameter(:with_muted, :query, BooleanLike, "Includeactivities by muted users") +  end + +  defp exclude_visibilities_param do +    Operation.parameter( +      :exclude_visibilities, +      :query, +      %Schema{type: :array, items: VisibilityScope}, +      "Exclude the statuses with the given visibilities" +    ) +  end + +  defp reply_visibility_param do +    Operation.parameter( +      :reply_visibility, +      :query, +      %Schema{type: :string, enum: ["following", "self"]}, +      "Filter replies. Possible values: without parameter (default) shows all replies, `following` - replies directed to you or users you follow, `self` - replies directed to you." +    ) +  end + +  defp only_media_param do +    Operation.parameter( +      :only_media, +      :query, +      %Schema{allOf: [BooleanLike], default: false}, +      "Show only statuses with media attached?" +    ) +  end +end diff --git a/lib/pleroma/web/auth/totp_authenticator.ex b/lib/pleroma/web/auth/totp_authenticator.ex index 98aca9a51..04e489c83 100644 --- a/lib/pleroma/web/auth/totp_authenticator.ex +++ b/lib/pleroma/web/auth/totp_authenticator.ex @@ -3,7 +3,6 @@  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.Auth.TOTPAuthenticator do -  alias Comeonin.Pbkdf2    alias Pleroma.MFA    alias Pleroma.MFA.TOTP    alias Pleroma.User @@ -31,7 +30,7 @@ defmodule Pleroma.Web.Auth.TOTPAuthenticator do          code        )        when is_list(codes) and is_binary(code) do -    hash_code = Enum.find(codes, fn hash -> Pbkdf2.checkpw(code, hash) end) +    hash_code = Enum.find(codes, fn hash -> Pbkdf2.verify_pass(code, hash) end)      if hash_code do        MFA.invalidate_backup_code(user, hash_code) diff --git a/lib/pleroma/web/mastodon_api/controllers/timeline_controller.ex b/lib/pleroma/web/mastodon_api/controllers/timeline_controller.ex index 2d67e19da..bbd576ffd 100644 --- a/lib/pleroma/web/mastodon_api/controllers/timeline_controller.ex +++ b/lib/pleroma/web/mastodon_api/controllers/timeline_controller.ex @@ -6,7 +6,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineController do    use Pleroma.Web, :controller    import Pleroma.Web.ControllerHelper, -    only: [add_link_headers: 2, add_link_headers: 3, truthy_param?: 1, skip_relationships?: 1] +    only: [add_link_headers: 2, add_link_headers: 3, skip_relationships?: 1]    alias Pleroma.Pagination    alias Pleroma.Plugs.EnsurePublicOrAuthenticatedPlug @@ -15,6 +15,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineController do    alias Pleroma.User    alias Pleroma.Web.ActivityPub.ActivityPub +  plug(Pleroma.Web.ApiSpec.CastAndValidate)    plug(:skip_plug, EnsurePublicOrAuthenticatedPlug when action in [:public, :hashtag])    # TODO: Replace with a macro when there is a Phoenix release with the following commit in it: @@ -37,10 +38,13 @@ defmodule Pleroma.Web.MastodonAPI.TimelineController do    plug(:put_view, Pleroma.Web.MastodonAPI.StatusView) +  defdelegate open_api_operation(action), to: Pleroma.Web.ApiSpec.TimelineOperation +    # GET /api/v1/timelines/home    def home(%{assigns: %{user: user}} = conn, params) do      params =        params +      |> Map.new(fn {key, value} -> {to_string(key), value} end)        |> Map.put("type", ["Create", "Announce"])        |> Map.put("blocking_user", user)        |> Map.put("muting_user", user) @@ -68,6 +72,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineController do    def direct(%{assigns: %{user: user}} = conn, params) do      params =        params +      |> Map.new(fn {key, value} -> {to_string(key), value} end)        |> Map.put("type", "Create")        |> Map.put("blocking_user", user)        |> Map.put("user", user) @@ -90,7 +95,9 @@ defmodule Pleroma.Web.MastodonAPI.TimelineController do    # GET /api/v1/timelines/public    def public(%{assigns: %{user: user}} = conn, params) do -    local_only = truthy_param?(params["local"]) +    params = Map.new(params, fn {key, value} -> {to_string(key), value} end) + +    local_only = params["local"]      cfg_key =        if local_only do @@ -157,8 +164,8 @@ defmodule Pleroma.Web.MastodonAPI.TimelineController do    # GET /api/v1/timelines/tag/:tag    def hashtag(%{assigns: %{user: user}} = conn, params) do -    local_only = truthy_param?(params["local"]) - +    params = Map.new(params, fn {key, value} -> {to_string(key), value} end) +    local_only = params["local"]      activities = hashtag_fetching(params, user, local_only)      conn @@ -172,10 +179,11 @@ defmodule Pleroma.Web.MastodonAPI.TimelineController do    end    # GET /api/v1/timelines/list/:list_id -  def list(%{assigns: %{user: user}} = conn, %{"list_id" => id} = params) do +  def list(%{assigns: %{user: user}} = conn, %{list_id: id} = params) do      with %Pleroma.List{title: _title, following: following} <- Pleroma.List.get(id, user) do        params =          params +        |> Map.new(fn {key, value} -> {to_string(key), value} end)          |> Map.put("type", "Create")          |> Map.put("blocking_user", user)          |> Map.put("user", user) diff --git a/lib/pleroma/web/mongooseim/mongoose_im_controller.ex b/lib/pleroma/web/mongooseim/mongoose_im_controller.ex index 1ed6ee521..0814b3bc3 100644 --- a/lib/pleroma/web/mongooseim/mongoose_im_controller.ex +++ b/lib/pleroma/web/mongooseim/mongoose_im_controller.ex @@ -5,7 +5,6 @@  defmodule Pleroma.Web.MongooseIM.MongooseIMController do    use Pleroma.Web, :controller -  alias Comeonin.Pbkdf2    alias Pleroma.Plugs.RateLimiter    alias Pleroma.Repo    alias Pleroma.User @@ -28,7 +27,7 @@ defmodule Pleroma.Web.MongooseIM.MongooseIMController do    def check_password(conn, %{"user" => username, "pass" => password}) do      with %User{password_hash: password_hash, deactivated: false} <-             Repo.get_by(User, nickname: username, local: true), -         true <- Pbkdf2.checkpw(password, password_hash) do +         true <- Pbkdf2.verify_pass(password, password_hash) do        conn        |> json(true)      else @@ -126,8 +126,7 @@ defmodule Pleroma.Mixfile do        {:postgrex, ">= 0.13.5"},        {:oban, "~> 1.2"},        {:gettext, "~> 0.15"}, -      {:comeonin, "~> 4.1.1"}, -      {:pbkdf2_elixir, "~> 0.12.3"}, +      {:pbkdf2_elixir, "~> 1.0"},        {:trailing_format_plug, "~> 0.0.7"},        {:fast_sanitize, "~> 0.1"},        {:html_entities, "~> 0.5", override: true}, @@ -199,7 +198,7 @@ defmodule Pleroma.Mixfile do        {:restarter, path: "./restarter"},        {:open_api_spex,         git: "https://git.pleroma.social/pleroma/elixir-libraries/open_api_spex.git", -       ref: "b862ebd78de0df95875cf46feb6e9607130dc2a8"} +       ref: "f296ac0924ba3cf79c7a588c4c252889df4c2edd"}      ] ++ oauth_deps()    end @@ -13,7 +13,7 @@    "castore": {:hex, :castore, "0.1.5", "591c763a637af2cc468a72f006878584bc6c306f8d111ef8ba1d4c10e0684010", [:mix], [], "hexpm", "6db356b2bc6cc22561e051ff545c20ad064af57647e436650aa24d7d06cd941a"},    "certifi": {:hex, :certifi, "2.5.1", "867ce347f7c7d78563450a18a6a28a8090331e77fa02380b4a21962a65d36ee5", [:rebar3], [{:parse_trans, "~>3.3", [hex: :parse_trans, repo: "hexpm", optional: false]}], "hexpm", "805abd97539caf89ec6d4732c91e62ba9da0cda51ac462380bbd28ee697a8c42"},    "combine": {:hex, :combine, "0.10.0", "eff8224eeb56498a2af13011d142c5e7997a80c8f5b97c499f84c841032e429f", [:mix], [], "hexpm", "1b1dbc1790073076580d0d1d64e42eae2366583e7aecd455d1215b0d16f2451b"}, -  "comeonin": {:hex, :comeonin, "4.1.2", "3eb5620fd8e35508991664b4c2b04dd41e52f1620b36957be837c1d7784b7592", [:mix], [{:argon2_elixir, "~> 1.2", [hex: :argon2_elixir, repo: "hexpm", optional: true]}, {:bcrypt_elixir, "~> 0.12.1 or ~> 1.0", [hex: :bcrypt_elixir, repo: "hexpm", optional: true]}, {:pbkdf2_elixir, "~> 0.12", [hex: :pbkdf2_elixir, repo: "hexpm", optional: true]}], "hexpm", "d8700a0ca4dbb616c22c9b3f6dd539d88deaafec3efe66869d6370c9a559b3e9"}, +  "comeonin": {:hex, :comeonin, "5.3.1", "7fe612b739c78c9c1a75186ef2d322ce4d25032d119823269d0aa1e2f1e20025", [:mix], [], "hexpm", "d6222483060c17f0977fad1b7401ef0c5863c985a64352755f366aee3799c245"},    "connection": {:hex, :connection, "1.0.4", "a1cae72211f0eef17705aaededacac3eb30e6625b04a6117c1b2db6ace7d5976", [:mix], [], "hexpm", "4a0850c9be22a43af9920a71ab17c051f5f7d45c209e40269a1938832510e4d9"},    "cors_plug": {:hex, :cors_plug, "1.5.2", "72df63c87e4f94112f458ce9d25800900cc88608c1078f0e4faddf20933eda6e", [:mix], [{:plug, "~> 1.3 or ~> 1.4 or ~> 1.5", [hex: :plug, repo: "hexpm", optional: false]}], "hexpm", "9af027d20dc12dd0c4345a6b87247e0c62965871feea0bfecf9764648b02cc69"},    "cowboy": {:hex, :cowboy, "2.7.0", "91ed100138a764355f43316b1d23d7ff6bdb0de4ea618cb5d8677c93a7a2f115", [:rebar3], [{:cowlib, "~> 2.8.0", [hex: :cowlib, repo: "hexpm", optional: false]}, {:ranch, "~> 1.7.1", [hex: :ranch, repo: "hexpm", optional: false]}], "hexpm", "04fd8c6a39edc6aaa9c26123009200fc61f92a3a94f3178c527b70b767c6e605"}, @@ -74,9 +74,9 @@    "nimble_parsec": {:hex, :nimble_parsec, "0.5.3", "def21c10a9ed70ce22754fdeea0810dafd53c2db3219a0cd54cf5526377af1c6", [:mix], [], "hexpm", "589b5af56f4afca65217a1f3eb3fee7e79b09c40c742fddc1c312b3ac0b3399f"},    "nodex": {:git, "https://git.pleroma.social/pleroma/nodex", "cb6730f943cfc6aad674c92161be23a8411f15d1", [ref: "cb6730f943cfc6aad674c92161be23a8411f15d1"]},    "oban": {:hex, :oban, "1.2.0", "7cca94d341be43d220571e28f69131c4afc21095b25257397f50973d3fc59b07", [:mix], [{:ecto_sql, "~> 3.1", [hex: :ecto_sql, repo: "hexpm", optional: false]}, {:jason, "~> 1.1", [hex: :jason, repo: "hexpm", optional: false]}, {:postgrex, "~> 0.14", [hex: :postgrex, repo: "hexpm", optional: false]}, {:telemetry, "~> 0.4", [hex: :telemetry, repo: "hexpm", optional: false]}], "hexpm", "ba5f8b3f7d76967b3e23cf8014f6a13e4ccb33431e4808f036709a7f822362ee"}, -  "open_api_spex": {:git, "https://git.pleroma.social/pleroma/elixir-libraries/open_api_spex.git", "b862ebd78de0df95875cf46feb6e9607130dc2a8", [ref: "b862ebd78de0df95875cf46feb6e9607130dc2a8"]}, +  "open_api_spex": {:git, "https://git.pleroma.social/pleroma/elixir-libraries/open_api_spex.git", "f296ac0924ba3cf79c7a588c4c252889df4c2edd", [ref: "f296ac0924ba3cf79c7a588c4c252889df4c2edd"]},    "parse_trans": {:hex, :parse_trans, "3.3.0", "09765507a3c7590a784615cfd421d101aec25098d50b89d7aa1d66646bc571c1", [:rebar3], [], "hexpm", "17ef63abde837ad30680ea7f857dd9e7ced9476cdd7b0394432af4bfc241b960"}, -  "pbkdf2_elixir": {:hex, :pbkdf2_elixir, "0.12.4", "8dd29ed783f2e12195d7e0a4640effc0a7c37e6537da491f1db01839eee6d053", [:mix], [], "hexpm", "595d09db74cb093b1903381c9de423276a931a2480a46a1a5dc7f932a2a6375b"}, +  "pbkdf2_elixir": {:hex, :pbkdf2_elixir, "1.2.1", "9cbe354b58121075bd20eb83076900a3832324b7dd171a6895fab57b6bb2752c", [:mix], [{:comeonin, "~> 5.3", [hex: :comeonin, repo: "hexpm", optional: false]}], "hexpm", "d3b40a4a4630f0b442f19eca891fcfeeee4c40871936fed2f68e1c4faa30481f"},    "phoenix": {:hex, :phoenix, "1.4.13", "67271ad69b51f3719354604f4a3f968f83aa61c19199343656c9caee057ff3b8", [:mix], [{:jason, "~> 1.0", [hex: :jason, repo: "hexpm", optional: true]}, {:phoenix_pubsub, "~> 1.1", [hex: :phoenix_pubsub, repo: "hexpm", optional: false]}, {:plug, "~> 1.8.1 or ~> 1.9", [hex: :plug, repo: "hexpm", optional: false]}, {:plug_cowboy, "~> 1.0 or ~> 2.0", [hex: :plug_cowboy, repo: "hexpm", optional: true]}, {:telemetry, "~> 0.4", [hex: :telemetry, repo: "hexpm", optional: false]}], "hexpm", "ab765a0feddb81fc62e2116c827b5f068df85159c162bee760745276ad7ddc1b"},    "phoenix_ecto": {:hex, :phoenix_ecto, "4.1.0", "a044d0756d0464c5a541b4a0bf4bcaf89bffcaf92468862408290682c73ae50d", [:mix], [{:ecto, "~> 3.0", [hex: :ecto, repo: "hexpm", optional: false]}, {:phoenix_html, "~> 2.9", [hex: :phoenix_html, repo: "hexpm", optional: true]}, {:plug, "~> 1.0", [hex: :plug, repo: "hexpm", optional: false]}], "hexpm", "c5e666a341ff104d0399d8f0e4ff094559b2fde13a5985d4cb5023b2c2ac558b"},    "phoenix_html": {:hex, :phoenix_html, "2.14.0", "d8c6bc28acc8e65f8ea0080ee05aa13d912c8758699283b8d3427b655aabe284", [:mix], [{:plug, "~> 1.5", [hex: :plug, repo: "hexpm", optional: false]}], "hexpm", "b0bb30eda478a06dbfbe96728061a93833db3861a49ccb516f839ecb08493fbb"}, diff --git a/test/mfa_test.exs b/test/mfa_test.exs index 94bc48c26..8875cefd9 100644 --- a/test/mfa_test.exs +++ b/test/mfa_test.exs @@ -6,7 +6,6 @@ defmodule Pleroma.MFATest do    use Pleroma.DataCase    import Pleroma.Factory -  alias Comeonin.Pbkdf2    alias Pleroma.MFA    describe "mfa_settings" do @@ -31,8 +30,8 @@ defmodule Pleroma.MFATest do        {:ok, [code1, code2]} = MFA.generate_backup_codes(user)        updated_user = refresh_record(user)        [hash1, hash2] = updated_user.multi_factor_authentication_settings.backup_codes -      assert Pbkdf2.checkpw(code1, hash1) -      assert Pbkdf2.checkpw(code2, hash2) +      assert Pbkdf2.verify_pass(code1, hash1) +      assert Pbkdf2.verify_pass(code2, hash2)      end    end diff --git a/test/plugs/authentication_plug_test.exs b/test/plugs/authentication_plug_test.exs index 646bda9d3..31e20d726 100644 --- a/test/plugs/authentication_plug_test.exs +++ b/test/plugs/authentication_plug_test.exs @@ -16,7 +16,7 @@ defmodule Pleroma.Plugs.AuthenticationPlugTest do      user = %User{        id: 1,        name: "dude", -      password_hash: Comeonin.Pbkdf2.hashpwsalt("guy") +      password_hash: Pbkdf2.hash_pwd_salt("guy")      }      conn = diff --git a/test/support/builders/user_builder.ex b/test/support/builders/user_builder.ex index 0d0490714..0c687c029 100644 --- a/test/support/builders/user_builder.ex +++ b/test/support/builders/user_builder.ex @@ -7,7 +7,7 @@ defmodule Pleroma.Builders.UserBuilder do        email: "test@example.org",        name: "Test Name",        nickname: "testname", -      password_hash: Comeonin.Pbkdf2.hashpwsalt("test"), +      password_hash: Pbkdf2.hash_pwd_salt("test"),        bio: "A tester.",        ap_id: "some id",        last_digest_emailed_at: NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second), diff --git a/test/support/factory.ex b/test/support/factory.ex index c8c45e2a7..d4284831c 100644 --- a/test/support/factory.ex +++ b/test/support/factory.ex @@ -29,7 +29,7 @@ defmodule Pleroma.Factory do        name: sequence(:name, &"Test テスト User #{&1}"),        email: sequence(:email, &"user#{&1}@example.com"),        nickname: sequence(:nickname, &"nick#{&1}"), -      password_hash: Comeonin.Pbkdf2.hashpwsalt("test"), +      password_hash: Pbkdf2.hash_pwd_salt("test"),        bio: sequence(:bio, &"Tester Number #{&1}"),        last_digest_emailed_at: NaiveDateTime.utc_now(),        last_refreshed_at: NaiveDateTime.utc_now(), diff --git a/test/web/auth/basic_auth_test.exs b/test/web/auth/basic_auth_test.exs index 64f8a6863..bf6e3d2fc 100644 --- a/test/web/auth/basic_auth_test.exs +++ b/test/web/auth/basic_auth_test.exs @@ -11,7 +11,7 @@ defmodule Pleroma.Web.Auth.BasicAuthTest do      conn: conn    } do      user = insert(:user) -    assert Comeonin.Pbkdf2.checkpw("test", user.password_hash) +    assert Pbkdf2.verify_pass("test", user.password_hash)      basic_auth_contents =        (URI.encode_www_form(user.nickname) <> ":" <> URI.encode_www_form("test")) diff --git a/test/web/auth/pleroma_authenticator_test.exs b/test/web/auth/pleroma_authenticator_test.exs index 7125c5081..5a421e5ed 100644 --- a/test/web/auth/pleroma_authenticator_test.exs +++ b/test/web/auth/pleroma_authenticator_test.exs @@ -11,7 +11,7 @@ defmodule Pleroma.Web.Auth.PleromaAuthenticatorTest do    setup do      password = "testpassword"      name = "AgentSmith" -    user = insert(:user, nickname: name, password_hash: Comeonin.Pbkdf2.hashpwsalt(password)) +    user = insert(:user, nickname: name, password_hash: Pbkdf2.hash_pwd_salt(password))      {:ok, [user: user, name: name, password: password]}    end diff --git a/test/web/auth/totp_authenticator_test.exs b/test/web/auth/totp_authenticator_test.exs index e08069490..e502e0ae8 100644 --- a/test/web/auth/totp_authenticator_test.exs +++ b/test/web/auth/totp_authenticator_test.exs @@ -34,7 +34,7 @@ defmodule Pleroma.Web.Auth.TOTPAuthenticatorTest do      hashed_codes =        backup_codes -      |> Enum.map(&Comeonin.Pbkdf2.hashpwsalt(&1)) +      |> Enum.map(&Pbkdf2.hash_pwd_salt(&1))      user =        insert(:user, diff --git a/test/web/mastodon_api/controllers/timeline_controller_test.exs b/test/web/mastodon_api/controllers/timeline_controller_test.exs index 6d8f81b75..f8b9289f3 100644 --- a/test/web/mastodon_api/controllers/timeline_controller_test.exs +++ b/test/web/mastodon_api/controllers/timeline_controller_test.exs @@ -34,7 +34,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do          conn          |> assign(:user, user)          |> get("/api/v1/timelines/home") -        |> json_response(200) +        |> json_response_and_validate_schema(200)        assert Enum.all?(response, fn n ->                 get_in(n, ["account", "pleroma", "relationship"]) == %{} @@ -42,7 +42,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do      end      test "the home timeline", %{user: user, conn: conn} do -      uri = "/api/v1/timelines/home?with_relationships=true" +      uri = "/api/v1/timelines/home?with_relationships=1"        following = insert(:user, nickname: "followed")        third_user = insert(:user, nickname: "repeated") @@ -53,7 +53,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        ret_conn = get(conn, uri) -      assert Enum.empty?(json_response(ret_conn, :ok)) +      assert Enum.empty?(json_response_and_validate_schema(ret_conn, :ok))        {:ok, _user} = User.follow(user, following) @@ -78,7 +78,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do                     "pleroma" => %{"relationship" => %{"following" => true}}                   }                 } -             ] = json_response(ret_conn, :ok) +             ] = json_response_and_validate_schema(ret_conn, :ok)        {:ok, _user} = User.follow(third_user, user) @@ -104,7 +104,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do                     "pleroma" => %{"relationship" => %{"following" => true}}                   }                 } -             ] = json_response(ret_conn, :ok) +             ] = json_response_and_validate_schema(ret_conn, :ok)      end      test "the home timeline when the direct messages are excluded", %{user: user, conn: conn} do @@ -115,9 +115,9 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        {:ok, private_activity} = CommonAPI.post(user, %{status: ".", visibility: "private"}) -      conn = get(conn, "/api/v1/timelines/home", %{"exclude_visibilities" => ["direct"]}) +      conn = get(conn, "/api/v1/timelines/home?exclude_visibilities[]=direct") -      assert status_ids = json_response(conn, :ok) |> Enum.map(& &1["id"]) +      assert status_ids = json_response_and_validate_schema(conn, :ok) |> Enum.map(& &1["id"])        assert public_activity.id in status_ids        assert unlisted_activity.id in status_ids        assert private_activity.id in status_ids @@ -134,17 +134,17 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        _activity = insert(:note_activity, local: false) -      conn = get(conn, "/api/v1/timelines/public", %{"local" => "False"}) +      conn = get(conn, "/api/v1/timelines/public?local=False") -      assert length(json_response(conn, :ok)) == 2 +      assert length(json_response_and_validate_schema(conn, :ok)) == 2 -      conn = get(build_conn(), "/api/v1/timelines/public", %{"local" => "True"}) +      conn = get(build_conn(), "/api/v1/timelines/public?local=True") -      assert [%{"content" => "test"}] = json_response(conn, :ok) +      assert [%{"content" => "test"}] = json_response_and_validate_schema(conn, :ok) -      conn = get(build_conn(), "/api/v1/timelines/public", %{"local" => "1"}) +      conn = get(build_conn(), "/api/v1/timelines/public?local=1") -      assert [%{"content" => "test"}] = json_response(conn, :ok) +      assert [%{"content" => "test"}] = json_response_and_validate_schema(conn, :ok)      end      test "the public timeline includes only public statuses for an authenticated user" do @@ -156,7 +156,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        {:ok, _activity} = CommonAPI.post(user, %{status: "test", visibility: "direct"})        res_conn = get(conn, "/api/v1/timelines/public") -      assert length(json_response(res_conn, 200)) == 1 +      assert length(json_response_and_validate_schema(res_conn, 200)) == 1      end    end @@ -174,15 +174,15 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do      setup do: clear_config([:restrict_unauthenticated, :timelines, :federated], true)      test "if user is unauthenticated", %{conn: conn} do -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "true"}) +      res_conn = get(conn, "/api/v1/timelines/public?local=true") -      assert json_response(res_conn, :unauthorized) == %{ +      assert json_response_and_validate_schema(res_conn, :unauthorized) == %{                 "error" => "authorization required for timeline view"               } -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "false"}) +      res_conn = get(conn, "/api/v1/timelines/public?local=false") -      assert json_response(res_conn, :unauthorized) == %{ +      assert json_response_and_validate_schema(res_conn, :unauthorized) == %{                 "error" => "authorization required for timeline view"               }      end @@ -190,11 +190,11 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do      test "if user is authenticated" do        %{conn: conn} = oauth_access(["read:statuses"]) -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "true"}) -      assert length(json_response(res_conn, 200)) == 1 +      res_conn = get(conn, "/api/v1/timelines/public?local=true") +      assert length(json_response_and_validate_schema(res_conn, 200)) == 1 -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "false"}) -      assert length(json_response(res_conn, 200)) == 2 +      res_conn = get(conn, "/api/v1/timelines/public?local=false") +      assert length(json_response_and_validate_schema(res_conn, 200)) == 2      end    end @@ -204,24 +204,24 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do      setup do: clear_config([:restrict_unauthenticated, :timelines, :local], true)      test "if user is unauthenticated", %{conn: conn} do -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "true"}) +      res_conn = get(conn, "/api/v1/timelines/public?local=true") -      assert json_response(res_conn, :unauthorized) == %{ +      assert json_response_and_validate_schema(res_conn, :unauthorized) == %{                 "error" => "authorization required for timeline view"               } -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "false"}) -      assert length(json_response(res_conn, 200)) == 2 +      res_conn = get(conn, "/api/v1/timelines/public?local=false") +      assert length(json_response_and_validate_schema(res_conn, 200)) == 2      end      test "if user is authenticated", %{conn: _conn} do        %{conn: conn} = oauth_access(["read:statuses"]) -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "true"}) -      assert length(json_response(res_conn, 200)) == 1 +      res_conn = get(conn, "/api/v1/timelines/public?local=true") +      assert length(json_response_and_validate_schema(res_conn, 200)) == 1 -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "false"}) -      assert length(json_response(res_conn, 200)) == 2 +      res_conn = get(conn, "/api/v1/timelines/public?local=false") +      assert length(json_response_and_validate_schema(res_conn, 200)) == 2      end    end @@ -231,12 +231,12 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do      setup do: clear_config([:restrict_unauthenticated, :timelines, :federated], true)      test "if user is unauthenticated", %{conn: conn} do -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "true"}) -      assert length(json_response(res_conn, 200)) == 1 +      res_conn = get(conn, "/api/v1/timelines/public?local=true") +      assert length(json_response_and_validate_schema(res_conn, 200)) == 1 -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "false"}) +      res_conn = get(conn, "/api/v1/timelines/public?local=false") -      assert json_response(res_conn, :unauthorized) == %{ +      assert json_response_and_validate_schema(res_conn, :unauthorized) == %{                 "error" => "authorization required for timeline view"               }      end @@ -244,11 +244,11 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do      test "if user is authenticated", %{conn: _conn} do        %{conn: conn} = oauth_access(["read:statuses"]) -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "true"}) -      assert length(json_response(res_conn, 200)) == 1 +      res_conn = get(conn, "/api/v1/timelines/public?local=true") +      assert length(json_response_and_validate_schema(res_conn, 200)) == 1 -      res_conn = get(conn, "/api/v1/timelines/public", %{"local" => "false"}) -      assert length(json_response(res_conn, 200)) == 2 +      res_conn = get(conn, "/api/v1/timelines/public?local=false") +      assert length(json_response_and_validate_schema(res_conn, 200)) == 2      end    end @@ -279,7 +279,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        # Only direct should be visible here        res_conn = get(conn_user_two, "api/v1/timelines/direct") -      [status] = json_response(res_conn, :ok) +      assert [status] = json_response_and_validate_schema(res_conn, :ok)        assert %{"visibility" => "direct"} = status        assert status["url"] != direct.data["id"] @@ -291,14 +291,14 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do          |> assign(:token, insert(:oauth_token, user: user_one, scopes: ["read:statuses"]))          |> get("api/v1/timelines/direct") -      [status] = json_response(res_conn, :ok) +      [status] = json_response_and_validate_schema(res_conn, :ok)        assert %{"visibility" => "direct"} = status        # Both should be visible here        res_conn = get(conn_user_two, "api/v1/timelines/home") -      [_s1, _s2] = json_response(res_conn, :ok) +      [_s1, _s2] = json_response_and_validate_schema(res_conn, :ok)        # Test pagination        Enum.each(1..20, fn _ -> @@ -311,13 +311,14 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        res_conn = get(conn_user_two, "api/v1/timelines/direct") -      statuses = json_response(res_conn, :ok) +      statuses = json_response_and_validate_schema(res_conn, :ok)        assert length(statuses) == 20 -      res_conn = -        get(conn_user_two, "api/v1/timelines/direct", %{max_id: List.last(statuses)["id"]}) +      max_id = List.last(statuses)["id"] + +      res_conn = get(conn_user_two, "api/v1/timelines/direct?max_id=#{max_id}") -      [status] = json_response(res_conn, :ok) +      assert [status] = json_response_and_validate_schema(res_conn, :ok)        assert status["url"] != direct.data["id"]      end @@ -342,7 +343,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        res_conn = get(conn, "api/v1/timelines/direct") -      [status] = json_response(res_conn, :ok) +      [status] = json_response_and_validate_schema(res_conn, :ok)        assert status["id"] == direct.id      end    end @@ -359,7 +360,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        conn = get(conn, "/api/v1/timelines/list/#{list.id}") -      assert [%{"id" => id}] = json_response(conn, :ok) +      assert [%{"id" => id}] = json_response_and_validate_schema(conn, :ok)        assert id == to_string(activity_two.id)      end @@ -382,7 +383,7 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        conn = get(conn, "/api/v1/timelines/list/#{list.id}") -      assert [%{"id" => id}] = json_response(conn, :ok) +      assert [%{"id" => id}] = json_response_and_validate_schema(conn, :ok)        assert id == to_string(activity_one.id)      end @@ -399,14 +400,14 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        nconn = get(conn, "/api/v1/timelines/tag/2hu") -      assert [%{"id" => id}] = json_response(nconn, :ok) +      assert [%{"id" => id}] = json_response_and_validate_schema(nconn, :ok)        assert id == to_string(activity.id)        # works for different capitalization too        nconn = get(conn, "/api/v1/timelines/tag/2HU") -      assert [%{"id" => id}] = json_response(nconn, :ok) +      assert [%{"id" => id}] = json_response_and_validate_schema(nconn, :ok)        assert id == to_string(activity.id)      end @@ -418,22 +419,21 @@ defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do        {:ok, activity_test1} = CommonAPI.post(user, %{status: "#test #test1"})        {:ok, activity_none} = CommonAPI.post(user, %{status: "#test #none"}) -      any_test = get(conn, "/api/v1/timelines/tag/test", %{"any" => ["test1"]}) +      any_test = get(conn, "/api/v1/timelines/tag/test?any[]=test1") -      [status_none, status_test1, status_test] = json_response(any_test, :ok) +      [status_none, status_test1, status_test] = json_response_and_validate_schema(any_test, :ok)        assert to_string(activity_test.id) == status_test["id"]        assert to_string(activity_test1.id) == status_test1["id"]        assert to_string(activity_none.id) == status_none["id"] -      restricted_test = -        get(conn, "/api/v1/timelines/tag/test", %{"all" => ["test1"], "none" => ["none"]}) +      restricted_test = get(conn, "/api/v1/timelines/tag/test?all[]=test1&none[]=none") -      assert [status_test1] == json_response(restricted_test, :ok) +      assert [status_test1] == json_response_and_validate_schema(restricted_test, :ok) -      all_test = get(conn, "/api/v1/timelines/tag/test", %{"all" => ["none"]}) +      all_test = get(conn, "/api/v1/timelines/tag/test?all[]=none") -      assert [status_none] == json_response(all_test, :ok) +      assert [status_none] == json_response_and_validate_schema(all_test, :ok)      end    end  end diff --git a/test/web/mongooseim/mongoose_im_controller_test.exs b/test/web/mongooseim/mongoose_im_controller_test.exs index 1ac2f2c27..5176cde84 100644 --- a/test/web/mongooseim/mongoose_im_controller_test.exs +++ b/test/web/mongooseim/mongoose_im_controller_test.exs @@ -41,13 +41,13 @@ defmodule Pleroma.Web.MongooseIMController do    end    test "/check_password", %{conn: conn} do -    user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt("cool")) +    user = insert(:user, password_hash: Pbkdf2.hash_pwd_salt("cool"))      _deactivated_user =        insert(:user,          nickname: "konata",          deactivated: true, -        password_hash: Comeonin.Pbkdf2.hashpwsalt("cool") +        password_hash: Pbkdf2.hash_pwd_salt("cool")        )      res = diff --git a/test/web/oauth/ldap_authorization_test.exs b/test/web/oauth/ldap_authorization_test.exs index a8fe8a841..011642c08 100644 --- a/test/web/oauth/ldap_authorization_test.exs +++ b/test/web/oauth/ldap_authorization_test.exs @@ -19,7 +19,7 @@ defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do    @tag @skip    test "authorizes the existing user using LDAP credentials" do      password = "testpassword" -    user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt(password)) +    user = insert(:user, password_hash: Pbkdf2.hash_pwd_salt(password))      app = insert(:oauth_app, scopes: ["read", "write"])      host = Pleroma.Config.get([:ldap, :host]) |> to_charlist @@ -104,7 +104,7 @@ defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do    @tag @skip    test "falls back to the default authorization when LDAP is unavailable" do      password = "testpassword" -    user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt(password)) +    user = insert(:user, password_hash: Pbkdf2.hash_pwd_salt(password))      app = insert(:oauth_app, scopes: ["read", "write"])      host = Pleroma.Config.get([:ldap, :host]) |> to_charlist @@ -148,7 +148,7 @@ defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do    @tag @skip    test "disallow authorization for wrong LDAP credentials" do      password = "testpassword" -    user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt(password)) +    user = insert(:user, password_hash: Pbkdf2.hash_pwd_salt(password))      app = insert(:oauth_app, scopes: ["read", "write"])      host = Pleroma.Config.get([:ldap, :host]) |> to_charlist diff --git a/test/web/oauth/mfa_controller_test.exs b/test/web/oauth/mfa_controller_test.exs index ce4a07320..3c341facd 100644 --- a/test/web/oauth/mfa_controller_test.exs +++ b/test/web/oauth/mfa_controller_test.exs @@ -20,7 +20,7 @@ defmodule Pleroma.Web.OAuth.MFAControllerTest do        insert(:user,          multi_factor_authentication_settings: %MFA.Settings{            enabled: true, -          backup_codes: [Comeonin.Pbkdf2.hashpwsalt("test-code")], +          backup_codes: [Pbkdf2.hash_pwd_salt("test-code")],            totp: %MFA.Settings.TOTP{secret: otp_secret, confirmed: true}          }        ) @@ -247,7 +247,7 @@ defmodule Pleroma.Web.OAuth.MFAControllerTest do        hashed_codes =          backup_codes -        |> Enum.map(&Comeonin.Pbkdf2.hashpwsalt(&1)) +        |> Enum.map(&Pbkdf2.hash_pwd_salt(&1))        user =          insert(:user, diff --git a/test/web/oauth/oauth_controller_test.exs b/test/web/oauth/oauth_controller_test.exs index 7a107584d..d389e4ce0 100644 --- a/test/web/oauth/oauth_controller_test.exs +++ b/test/web/oauth/oauth_controller_test.exs @@ -311,7 +311,7 @@ defmodule Pleroma.Web.OAuth.OAuthControllerTest do             app: app,             conn: conn           } do -      user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt("testpassword")) +      user = insert(:user, password_hash: Pbkdf2.hash_pwd_salt("testpassword"))        registration = insert(:registration, user: nil)        redirect_uri = OAuthController.default_redirect_uri(app) @@ -342,7 +342,7 @@ defmodule Pleroma.Web.OAuth.OAuthControllerTest do             app: app,             conn: conn           } do -      user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt("testpassword")) +      user = insert(:user, password_hash: Pbkdf2.hash_pwd_salt("testpassword"))        registration = insert(:registration, user: nil)        unlisted_redirect_uri = "http://cross-site-request.com" @@ -750,7 +750,7 @@ defmodule Pleroma.Web.OAuth.OAuthControllerTest do      test "issues a token for `password` grant_type with valid credentials, with full permissions by default" do        password = "testpassword" -      user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt(password)) +      user = insert(:user, password_hash: Pbkdf2.hash_pwd_salt(password))        app = insert(:oauth_app, scopes: ["read", "write"]) @@ -778,7 +778,7 @@ defmodule Pleroma.Web.OAuth.OAuthControllerTest do        user =          insert(:user, -          password_hash: Comeonin.Pbkdf2.hashpwsalt(password), +          password_hash: Pbkdf2.hash_pwd_salt(password),            multi_factor_authentication_settings: %MFA.Settings{              enabled: true,              totp: %MFA.Settings.TOTP{secret: otp_secret, confirmed: true} @@ -887,7 +887,7 @@ defmodule Pleroma.Web.OAuth.OAuthControllerTest do        password = "testpassword"        {:ok, user} = -        insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt(password)) +        insert(:user, password_hash: Pbkdf2.hash_pwd_salt(password))          |> User.confirmation_changeset(need_confirmation: true)          |> User.update_and_set_cache() @@ -915,7 +915,7 @@ defmodule Pleroma.Web.OAuth.OAuthControllerTest do        user =          insert(:user, -          password_hash: Comeonin.Pbkdf2.hashpwsalt(password), +          password_hash: Pbkdf2.hash_pwd_salt(password),            deactivated: true          ) @@ -943,7 +943,7 @@ defmodule Pleroma.Web.OAuth.OAuthControllerTest do        user =          insert(:user, -          password_hash: Comeonin.Pbkdf2.hashpwsalt(password), +          password_hash: Pbkdf2.hash_pwd_salt(password),            password_reset_pending: true          ) @@ -972,7 +972,7 @@ defmodule Pleroma.Web.OAuth.OAuthControllerTest do        user =          insert(:user, -          password_hash: Comeonin.Pbkdf2.hashpwsalt(password), +          password_hash: Pbkdf2.hash_pwd_salt(password),            confirmation_pending: true          ) diff --git a/test/web/twitter_api/password_controller_test.exs b/test/web/twitter_api/password_controller_test.exs index 0a24860d3..231a46c67 100644 --- a/test/web/twitter_api/password_controller_test.exs +++ b/test/web/twitter_api/password_controller_test.exs @@ -54,7 +54,7 @@ defmodule Pleroma.Web.TwitterAPI.PasswordControllerTest do        assert response =~ "<h2>Password changed!</h2>"        user = refresh_record(user) -      assert Comeonin.Pbkdf2.checkpw("test", user.password_hash) +      assert Pbkdf2.verify_pass("test", user.password_hash)        assert Enum.empty?(Token.get_user_tokens(user))      end diff --git a/test/web/twitter_api/util_controller_test.exs b/test/web/twitter_api/util_controller_test.exs index b701239a0..ad919d341 100644 --- a/test/web/twitter_api/util_controller_test.exs +++ b/test/web/twitter_api/util_controller_test.exs @@ -688,7 +688,7 @@ defmodule Pleroma.Web.TwitterAPI.UtilControllerTest do        assert json_response(conn, 200) == %{"status" => "success"}        fetched_user = User.get_cached_by_id(user.id) -      assert Comeonin.Pbkdf2.checkpw("newpass", fetched_user.password_hash) == true +      assert Pbkdf2.verify_pass("newpass", fetched_user.password_hash) == true      end    end  | 
