mirror of
https://github.com/zulip/zulip.git
synced 2025-11-04 22:13:26 +00:00
This run_test helper sets up a convention that allows us to give really short tracebacks for errors, and eventually we can have more control over running individual tests. (The latter goal has some complications, since we often intentionally leak setup in tests.)
76 lines
2.2 KiB
JavaScript
76 lines
2.2 KiB
JavaScript
zrequire('zxcvbn', 'node_modules/zxcvbn/dist/zxcvbn');
|
|
zrequire('common');
|
|
|
|
set_global('i18n', global.stub_i18n);
|
|
|
|
run_test('basics', () => {
|
|
var accepted;
|
|
var password;
|
|
var warning;
|
|
|
|
var bar = (function () {
|
|
var self = {};
|
|
|
|
self.width = function (width) {
|
|
self.w = width;
|
|
return self;
|
|
};
|
|
|
|
self.removeClass = function (arg) {
|
|
assert.equal(arg, 'bar-success bar-danger');
|
|
return self;
|
|
};
|
|
|
|
self.addClass = function (arg) {
|
|
self.added_class = arg;
|
|
return self;
|
|
};
|
|
|
|
return self;
|
|
}());
|
|
|
|
function password_field(min_length, min_guesses) {
|
|
var self = {};
|
|
|
|
self.data = function (field) {
|
|
if (field === 'minLength') {
|
|
return min_length;
|
|
} else if (field === 'minGuesses') {
|
|
return min_guesses;
|
|
}
|
|
};
|
|
|
|
return self;
|
|
}
|
|
|
|
password = 'z!X4@S_&';
|
|
accepted = common.password_quality(password, bar, password_field(10, 80000));
|
|
assert(!accepted);
|
|
assert.equal(bar.w, '39.7%');
|
|
assert.equal(bar.added_class, 'bar-danger');
|
|
warning = common.password_warning(password, password_field(10));
|
|
assert.equal(warning, 'translated: Password should be at least 10 characters long');
|
|
|
|
password = 'foo';
|
|
accepted = common.password_quality(password, bar, password_field(2, 200));
|
|
assert(accepted);
|
|
assert.equal(bar.w, '10.390277164940581%');
|
|
assert.equal(bar.added_class, 'bar-success');
|
|
warning = common.password_warning(password, password_field(2));
|
|
assert.equal(warning, 'translated: Password is too weak');
|
|
|
|
password = 'aaaaaaaa';
|
|
accepted = common.password_quality(password, bar, password_field(6, 1e100));
|
|
assert(!accepted);
|
|
assert.equal(bar.added_class, 'bar-danger');
|
|
warning = common.password_warning(password, password_field(6));
|
|
assert.equal(warning, 'Repeats like "aaa" are easy to guess');
|
|
|
|
delete global.zxcvbn;
|
|
password = 'aaaaaaaa';
|
|
accepted = common.password_quality(password, bar, password_field(6, 1e100));
|
|
assert(accepted === undefined);
|
|
warning = common.password_warning(password, password_field(6));
|
|
assert(warning === undefined);
|
|
});
|