diff options
| author | Freya Murphy <freya@freyacat.org> | 2026-03-02 16:05:12 -0500 |
|---|---|---|
| committer | Freya Murphy <freya@freyacat.org> | 2026-03-02 18:39:22 -0500 |
| commit | 24734d408700a72d45c3ff4a679606cab3ec544f (patch) | |
| tree | d0fee0bcf508f3c631f7c26724bb5cd94dfc88a0 /packages/backend/test/e2e/2fa.ts | |
| parent | merge: Release/2025.4.5 (!1258) (diff) | |
| download | sharkey-stable.tar.gz sharkey-stable.tar.bz2 sharkey-stable.zip | |
split url into webUrl and localUrl (like mastodon)stable
Diffstat (limited to '')
| -rw-r--r-- | packages/backend/test/e2e/2fa.ts | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/packages/backend/test/e2e/2fa.ts b/packages/backend/test/e2e/2fa.ts index 289359a2ce..756a720652 100644 --- a/packages/backend/test/e2e/2fa.ts +++ b/packages/backend/test/e2e/2fa.ts @@ -53,7 +53,7 @@ describe('2要素認証', () => { const rpIdHash = (): Buffer => { return crypto.createHash('sha256') - .update(Buffer.from(config.host, 'utf-8')) + .update(Buffer.from(config.webHost, 'utf-8')) .digest(); }; @@ -103,7 +103,7 @@ describe('2要素認証', () => { clientDataJSON: Buffer.from(JSON.stringify({ type: 'webauthn.create', challenge: param.creationOptions.challenge, - origin: config.scheme + '://' + config.host, + origin: config.scheme + '://' + config.webHost, androidPackageName: 'org.mozilla.firefox', }), 'utf-8').toString('base64url'), attestationObject: cbor.encode({ @@ -149,7 +149,7 @@ describe('2要素認証', () => { const clientDataJSONBuffer = Buffer.from(JSON.stringify({ type: 'webauthn.get', challenge: param.requestOptions.challenge, - origin: config.scheme + '://' + config.host, + origin: config.scheme + '://' + config.webHost, androidPackageName: 'org.mozilla.firefox', }), 'utf-8'); const hashedclientDataJSON = crypto.createHash('sha256') @@ -191,7 +191,7 @@ describe('2要素認証', () => { assert.notEqual(registerResponse.body.url, undefined); assert.notEqual(registerResponse.body.secret, undefined); assert.strictEqual(registerResponse.body.label, username); - assert.strictEqual(registerResponse.body.issuer, config.host); + assert.strictEqual(registerResponse.body.issuer, config.webHost); const doneResponse = await api('i/2fa/done', { token: otpToken(registerResponse.body.secret), |