add_dependencies({ zxcvbn: 'node_modules/zxcvbn/dist/zxcvbn.js', }); set_global('i18n', global.stub_i18n); var common = require("js/common.js"); (function test_basics() { var accepted; var password; var warning; var bar = (function () { var self = {}; self.width = function (width) { self.w = width; return self; }; self.removeClass = function (arg) { assert.equal(arg, 'bar-success bar-danger'); return self; }; self.addClass = function (arg) { self.added_class = arg; return self; }; return self; }()); function password_field(min_length, min_guesses) { var self = {}; self.data = function (field) { if (field === 'minLength') { return min_length; } else if (field === 'minGuesses') { return min_guesses; } }; return self; } password = 'z!X4@S_&'; accepted = common.password_quality(password, bar, password_field(10, 80000)); assert(!accepted); assert.equal(bar.w, '39.7%'); assert.equal(bar.added_class, 'bar-danger'); warning = common.password_warning(password, password_field(10)); assert.equal(warning, 'translated: Password should be at least 10 characters long'); password = 'foo'; accepted = common.password_quality(password, bar, password_field(2, 200)); assert(accepted); assert.equal(bar.w, '10.390277164940581%'); assert.equal(bar.added_class, 'bar-success'); warning = common.password_warning(password, password_field(2)); assert.equal(warning, 'translated: Password is too weak'); password = 'aaaaaaaa'; accepted = common.password_quality(password, bar, password_field(6, 1e100)); assert(!accepted); assert.equal(bar.added_class, 'bar-danger'); warning = common.password_warning(password, password_field(6)); assert.equal(warning, 'Repeats like "aaa" are easy to guess'); delete global.zxcvbn; password = 'aaaaaaaa'; accepted = common.password_quality(password, bar, password_field(6, 1e100)); assert(accepted === undefined); warning = common.password_warning(password, password_field(6)); assert(warning === undefined); }());