mirror of
				https://github.com/louislam/uptime-kuma.git
				synced 2025-11-04 13:46:13 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			167 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			167 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
const { genSecret, sleep } = require("../src/util");
 | 
						|
const utilServerRewire = require("../server/util-server");
 | 
						|
 | 
						|
describe("Test parseCertificateInfo", () => {
 | 
						|
    it("should handle undefined", async () => {
 | 
						|
        const parseCertificateInfo = utilServerRewire.__get__("parseCertificateInfo");
 | 
						|
        const info = parseCertificateInfo(undefined);
 | 
						|
        expect(info).toEqual(undefined);
 | 
						|
    }, 5000);
 | 
						|
 | 
						|
    it("should handle normal cert chain", async () => {
 | 
						|
        const parseCertificateInfo = utilServerRewire.__get__("parseCertificateInfo");
 | 
						|
 | 
						|
        const chain1 = {
 | 
						|
            fingerprint: "CF:2C:F3:6A:FE:6B:10:EC:44:77:C8:95:BB:96:2E:06:1F:0E:15:DA",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        const chain2 = {
 | 
						|
            fingerprint: "A0:31:C4:67:82:E6:E6:C6:62:C2:C8:7C:76:DA:9A:A6:2C:CA:BD:8E",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        const chain3 = {
 | 
						|
            fingerprint: "5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        chain1.issuerCertificate = chain2;
 | 
						|
        chain2.issuerCertificate = chain3;
 | 
						|
        chain3.issuerCertificate = chain3;
 | 
						|
 | 
						|
        const info = parseCertificateInfo(chain1);
 | 
						|
        expect(chain1).toEqual(info);
 | 
						|
    }, 5000);
 | 
						|
 | 
						|
    it("should handle cert chain with strange circle", async () => {
 | 
						|
        const parseCertificateInfo = utilServerRewire.__get__("parseCertificateInfo");
 | 
						|
 | 
						|
        const chain1 = {
 | 
						|
            fingerprint: "CF:2C:F3:6A:FE:6B:10:EC:44:77:C8:95:BB:96:2E:06:1F:0E:15:DA",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        const chain2 = {
 | 
						|
            fingerprint: "A0:31:C4:67:82:E6:E6:C6:62:C2:C8:7C:76:DA:9A:A6:2C:CA:BD:8E",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        const chain3 = {
 | 
						|
            fingerprint: "5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        const chain4 = {
 | 
						|
            fingerprint: "haha",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        chain1.issuerCertificate = chain2;
 | 
						|
        chain2.issuerCertificate = chain3;
 | 
						|
        chain3.issuerCertificate = chain4;
 | 
						|
        chain4.issuerCertificate = chain2;
 | 
						|
 | 
						|
        const info = parseCertificateInfo(chain1);
 | 
						|
        expect(chain1).toEqual(info);
 | 
						|
    }, 5000);
 | 
						|
 | 
						|
    it("should handle cert chain with last undefined (should be happen in real, but just in case)", async () => {
 | 
						|
        const parseCertificateInfo = utilServerRewire.__get__("parseCertificateInfo");
 | 
						|
 | 
						|
        const chain1 = {
 | 
						|
            fingerprint: "CF:2C:F3:6A:FE:6B:10:EC:44:77:C8:95:BB:96:2E:06:1F:0E:15:DA",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        const chain2 = {
 | 
						|
            fingerprint: "A0:31:C4:67:82:E6:E6:C6:62:C2:C8:7C:76:DA:9A:A6:2C:CA:BD:8E",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        const chain3 = {
 | 
						|
            fingerprint: "5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        const chain4 = {
 | 
						|
            fingerprint: "haha",
 | 
						|
            valid_from: "Oct 22 12:00:00 2013 GMT",
 | 
						|
            valid_to: "Oct 22 12:00:00 2028 GMT",
 | 
						|
            subjectaltname: "DNS:www.example.org, DNS:example.com, DNS:example.edu, DNS:example.net, DNS:example.org, DNS:www.example.com, DNS:www.example.edu, DNS:www.example.net",
 | 
						|
        };
 | 
						|
 | 
						|
        chain1.issuerCertificate = chain2;
 | 
						|
        chain2.issuerCertificate = chain3;
 | 
						|
        chain3.issuerCertificate = chain4;
 | 
						|
        chain4.issuerCertificate = undefined;
 | 
						|
 | 
						|
        const info = parseCertificateInfo(chain1);
 | 
						|
        expect(chain1).toEqual(info);
 | 
						|
    }, 5000);
 | 
						|
});
 | 
						|
 | 
						|
describe("Test genSecret", () => {
 | 
						|
 | 
						|
    beforeAll(() => {
 | 
						|
 | 
						|
    });
 | 
						|
 | 
						|
    it("should be correct length", () => {
 | 
						|
        let secret = genSecret(-1);
 | 
						|
        expect(secret).toEqual("");
 | 
						|
 | 
						|
        secret = genSecret(0);
 | 
						|
        expect(secret).toEqual("");
 | 
						|
 | 
						|
        secret = genSecret(1);
 | 
						|
        expect(secret.length).toEqual(1);
 | 
						|
 | 
						|
        secret = genSecret(2);
 | 
						|
        expect(secret.length).toEqual(2);
 | 
						|
 | 
						|
        secret = genSecret(64);
 | 
						|
        expect(secret.length).toEqual(64);
 | 
						|
 | 
						|
        secret = genSecret(9000);
 | 
						|
        expect(secret.length).toEqual(9000);
 | 
						|
 | 
						|
        secret = genSecret(90000);
 | 
						|
        expect(secret.length).toEqual(90000);
 | 
						|
    });
 | 
						|
 | 
						|
    it("should contain first and last possible chars", () => {
 | 
						|
        let secret = genSecret(90000);
 | 
						|
        expect(secret).toContain("A");
 | 
						|
        expect(secret).toContain("9");
 | 
						|
    });
 | 
						|
 | 
						|
});
 | 
						|
 | 
						|
describe("Test reset-password", () => {
 | 
						|
    it("should able to run", async () => {
 | 
						|
        await require("../extra/reset-password").main();
 | 
						|
    }, 120000);
 | 
						|
});
 | 
						|
 |