45319ec648
woo!
2021-10-04 15:04:07 -07:00
7183b5a43e
chore(testing): fix casing in error messsage
2021-10-04 12:06:33 -07:00
d8c344beda
Refactor vscode endpoints to use fork directly.
2021-09-30 19:14:17 -04:00
6c95f72d2b
refactor: make password param to defaultConfigFile
2021-09-28 16:13:13 -07:00
77c1150b8d
feat(cli): add test for defaultConfigFile
2021-09-28 15:45:44 -07:00
f84757507b
feat: add tests for bindAddrFromArgs
2021-09-21 11:48:20 -07:00
30ade712bf
feat: add tests for shouldRunVsCodeCli
2021-09-20 14:53:09 -07:00
a3cea88f51
feat: add tests for src/node/app.ts
2021-09-20 10:57:31 -07:00
f885b29675
Add vscode via vendor package.
...
- Use yarn for vscode vendoring.
- Grab hash from package.
2021-09-15 14:54:33 -04:00
09440563ca
feat: add tests for src/node/app.ts
...
This adds a couple tests for ensureAddress.
2021-09-09 17:58:36 -07:00
9137816e33
feat: add getAvailablePort helper function
2021-07-29 15:17:04 -07:00
42cfa4a7ca
feat: add tests for proxy
2021-07-29 15:16:28 -07:00
7a6ec202ba
refactor: match /test/unit structure to /src
2021-07-29 09:48:40 -07:00
85d8c14b92
refactor: use Teffen's solution for useEnv
2021-07-26 11:21:30 -07:00
67e9eca942
feat: add tests for shouldEnableProxy
2021-07-23 15:07:23 -07:00
911cb034f5
feat: add registerRequireOnSelf on function
2021-07-21 15:30:54 -07:00
6e33dccb40
feat: add tests for isFile
2021-07-21 11:12:00 -07:00
5c61318592
refactor: only accept string in pathToFsPath
...
CodeQL caught a path where we were passing in req.query.path
to pathToFsPath, which may not have been a string.
So we refactored some things to ensure we only pass it a string
which also let us change the parameter type to string
instead of string | string[].
2021-07-21 11:11:59 -07:00
fc16f7e06d
refactor: clean up testing files
2021-07-12 17:05:44 -07:00
7ce9ee0db6
fix: check path is string in pathToFsPath
...
There's a chance this function can be called with a path that is not a string.
To catch that, we check if path is of a different type and throw an error if it
is.
This also adds a couple tests for this function.
2021-07-12 16:39:42 -07:00
2092f82270
fixup! fix: escape error.message on login failure
2021-07-01 10:43:37 -07:00
c505fc45a8
feat: add escapeHtml function
...
This can be used to escape any special characters in a string with HTML before
sending from the server back to the client. This is important to prevent a
cross-site scripting attack.
2021-07-01 10:43:36 -07:00
7f12fab3ca
fix(isHashMatch): check that hash starts with $
...
Previously, we used argon2 to verify the hash with the password.
If the hash didn't start with a $, then it would enter the catch block.
Now we check the hash before trying to verify it and we also throw an Error if
the verify fails.
This makes the isHashMatch function more robust.
2021-06-30 15:00:21 -07:00
49c44818d9
Move onLine to utilities
...
This way it can be used by the tests when spawning code-server on a
random port to look for the address.
2021-06-29 12:04:31 -05:00
add55ecd62
Import utils as a group in tests
...
This should simplify testing new utils a bit.
2021-06-29 12:03:38 -05:00
1e55a648a5
feat: check for empty str in isHashMatch
2021-06-08 15:10:59 -07:00
3b50bfc17d
fix: sanitize password and cookie key
2021-06-08 14:33:17 -07:00
6020480b30
feat: add isCookieValid function and tests
2021-06-08 14:33:16 -07:00
a14ea39c4a
feat: add handlePasswordValidation + tests
2021-06-08 14:33:15 -07:00
7ff4117531
feat: add getPasswordMethod & test for it
2021-06-08 14:33:15 -07:00
fd3cb6cfa0
refactor: update unit tests for hash fns
...
Since the hash and isHashMatch are now async, I had to update the tests
accordingly. Now everything is working.
2021-06-08 14:33:13 -07:00
fc3326f1f2
feat: add tests using real hashes
2021-06-08 14:33:12 -07:00
aaf044728f
refactor: add functions to check hash password
2021-06-08 14:33:12 -07:00
f35120c0a3
feat: add unit test for hash function
2021-06-08 14:33:12 -07:00
46fe77d464
chore: update CHANGELOG
2021-05-13 12:10:22 -07:00
2a657ab930
feat: add tests for getEnvPaths
2021-05-13 12:10:21 -07:00