zulip/frontend_tests/node_tests/password.js

76 lines
2.2 KiB
JavaScript
Raw Normal View History

zrequire('zxcvbn', 'node_modules/zxcvbn/dist/zxcvbn');
zrequire('common');
2017-01-09 21:51:22 +01:00
set_global('i18n', global.stub_i18n);
run_test('basics', () => {
2017-01-09 21:51:22 +01:00
var accepted;
var password;
var warning;
2017-01-09 21:51:22 +01:00
var bar = (function () {
var self = {};
self.width = function (width) {
self.w = width;
return self;
};
self.removeClass = function (arg) {
assert.equal(arg, 'bar-success bar-danger');
return self;
};
self.addClass = function (arg) {
self.added_class = arg;
return self;
};
return self;
}());
function password_field(min_length, min_guesses) {
2017-01-09 21:51:22 +01:00
var self = {};
self.data = function (field) {
if (field === 'minLength') {
return min_length;
} else if (field === 'minGuesses') {
return min_guesses;
2017-01-09 21:51:22 +01:00
}
};
return self;
}
password = 'z!X4@S_&';
accepted = common.password_quality(password, bar, password_field(10, 80000));
2017-01-09 21:51:22 +01:00
assert(!accepted);
assert.equal(bar.w, '39.7%');
assert.equal(bar.added_class, 'bar-danger');
warning = common.password_warning(password, password_field(10));
assert.equal(warning, 'translated: Password should be at least 10 characters long');
2017-01-09 21:51:22 +01:00
password = 'foo';
accepted = common.password_quality(password, bar, password_field(2, 200));
2017-01-09 21:51:22 +01:00
assert(accepted);
assert.equal(bar.w, '10.390277164940581%');
assert.equal(bar.added_class, 'bar-success');
warning = common.password_warning(password, password_field(2));
assert.equal(warning, 'translated: Password is too weak');
password = 'aaaaaaaa';
accepted = common.password_quality(password, bar, password_field(6, 1e100));
assert(!accepted);
assert.equal(bar.added_class, 'bar-danger');
warning = common.password_warning(password, password_field(6));
assert.equal(warning, 'Repeats like "aaa" are easy to guess');
delete global.zxcvbn;
password = 'aaaaaaaa';
accepted = common.password_quality(password, bar, password_field(6, 1e100));
assert(accepted === undefined);
warning = common.password_warning(password, password_field(6));
assert(warning === undefined);
});