def gen_pass(*args): h_string = """ generate random password ./honey_client -genpass <master-password> <domain> e.g. ./honey_client -addpass AwesomeS@la google.com """ if len(args) < 2: return h_string mp = args[0] domain_list = args[1:] hv = HoneyVault(VAULT_FILE, mp) return json.dumps(hv.gen_password(mp, domain_list), indent=4)
def gen_pass(*args): h_string = """ generate random password ./honey_client -genpass <master-password> <domain> e.g. ./honey_client -addpass AwesomeS@la google.com """ if len(args) < 2: return h_string mp = args[0] domain_list = args[1:] hv = HoneyVault(VAULT_FILE, mp) return json.dumps(hv.gen_password(mp, domain_list), indent=4)
def test_getpass(self): h_string = """Just a test framework for testing getpass function. """ vault_file = VAULT_FILE + "~test" try: os.remove(vault_file) except OSError: pass mpw = 'Masterpassw0rd12' hv = HoneyVault(vault_file, mpw) u = 'google.com' w = hv.get_password([u])[u] hv.add_password({u: w}) ret_pw = hv.get_password([u])[u] self.assertEqual(w, ret_pw, "PasswordAddFailed: added=<{}>, returned=<{}>"\ .format(w, ret_pw)) # password added correctly. v = hv.gen_password(mpw, [u])[u] self.assertEqual(v, hv.get_password([u])[u], "PasswordGenFailed: expecting={}, returned={}"\ .format(v, hv.get_password([u])[u])) # password generated correctly. d_pws = { 'asdfadsf.com': 'lkjandfa98w3ufh9 awe98fa', 'a': 'a', '123': 'adf', 'tt.com': 'thisismymasterpasswordanditiss', 'fb.com': 'Amazing@#ComplexPassword', } hv.add_password(d_pws) ret_pws = hv.get_password(d_pws.keys()) for k, v in d_pws.items(): self.assertEqual(ret_pws[k],v, "Decoding mismatch @ added: {} <--> returned: {}"\ .format(v, ret_pws[k])) hv.add_password(d_pws) ret_pws = hv.get_password(d_pws.keys()) for k, v in d_pws.items(): self.assertEqual(ret_pws[k],v, "Decoding mismatch @ added: {} <--> returned: {}"\ .format(v, ret_pws[k])) os.remove(vault_file)
def test_getpass(self): h_string = """Just a test framework for testing getpass function. """ vault_file = VAULT_FILE + "~test" try: os.remove(vault_file) except OSError: pass; mpw = 'Masterpassw0rd12' hv = HoneyVault(vault_file, mpw) u = 'google.com' w = hv.get_password([u])[u] hv.add_password({u: w}) ret_pw = hv.get_password([u])[u] self.assertEqual(w, ret_pw, "PasswordAddFailed: added=<{}>, returned=<{}>"\ .format(w, ret_pw)) # password added correctly. v = hv.gen_password(mpw, [u])[u] self.assertEqual(v, hv.get_password([u])[u], "PasswordGenFailed: expecting={}, returned={}"\ .format(v, hv.get_password([u])[u])) # password generated correctly. d_pws = { 'asdfadsf.com': 'lkjandfa98w3ufh9 awe98fa', 'a': 'a', '123': 'adf', 'tt.com': 'thisismymasterpasswordanditiss', 'fb.com': 'Amazing@#ComplexPassword', } hv.add_password(d_pws) ret_pws = hv.get_password(d_pws.keys()) for k,v in d_pws.items(): self.assertEqual(ret_pws[k],v, "Decoding mismatch @ added: {} <--> returned: {}"\ .format(v, ret_pws[k])) hv.add_password(d_pws) ret_pws = hv.get_password(d_pws.keys()) for k,v in d_pws.items(): self.assertEqual(ret_pws[k],v, "Decoding mismatch @ added: {} <--> returned: {}"\ .format(v, ret_pws[k])) os.remove(vault_file)