@@ -337,6 +337,8 @@ tests.package.test_python_cryptography.TestPythonPy2Cryptography: *runtime_test
tests.package.test_python_cryptography.TestPythonPy3Cryptography: *runtime_test
tests.package.test_python_incremental.TestPythonPy2Incremental: *runtime_test
tests.package.test_python_incremental.TestPythonPy3Incremental: *runtime_test
+tests.package.test_python_passlib.TestPythonPy2Passlib: *runtime_test
+tests.package.test_python_passlib.TestPythonPy3Passlib: *runtime_test
tests.package.test_python_twisted.TestPythonPy2Twisted: *runtime_test
tests.package.test_python_twisted.TestPythonPy3Twisted: *runtime_test
tests.package.test_python_txaio.TestPythonPy2Txaio: *runtime_test
new file mode 100644
@@ -0,0 +1,5 @@
+from passlib.hash import pbkdf2_sha256
+
+hash = pbkdf2_sha256.hash("password")
+assert(pbkdf2_sha256.verify("passWord", hash) is False)
+assert(pbkdf2_sha256.verify("password", hash) is True)
new file mode 100644
@@ -0,0 +1,23 @@
+from tests.package.test_python import TestPythonPackageBase
+
+
+class TestPythonPy2Passlib(TestPythonPackageBase):
+ __test__ = True
+ config = TestPythonPackageBase.config + \
+ """
+ BR2_PACKAGE_PYTHON=y
+ BR2_PACKAGE_PYTHON_PASSLIB=y
+ """
+ sample_scripts = ["tests/package/sample_python_passlib.py"]
+ timeout = 30
+
+
+class TestPythonPy3Passlib(TestPythonPackageBase):
+ __test__ = True
+ config = TestPythonPackageBase.config + \
+ """
+ BR2_PACKAGE_PYTHON3=y
+ BR2_PACKAGE_PYTHON_PASSLIB=y
+ """
+ sample_scripts = ["tests/package/sample_python_passlib.py"]
+ timeout = 30
Add a simple test case that creates a hash for a password and verifies it against an incorrect and a correct password. Signed-off-by: Ricardo Martincoski <ricardo.martincoski@gmail.com> --- .gitlab-ci.yml | 2 ++ .../tests/package/sample_python_passlib.py | 5 ++++ .../tests/package/test_python_passlib.py | 23 +++++++++++++++++++ 3 files changed, 30 insertions(+) create mode 100644 support/testing/tests/package/sample_python_passlib.py create mode 100644 support/testing/tests/package/test_python_passlib.py