c4c480a068
* Implement last opened functionality Fixes https://github.com/cdr/code-server/issues/4619 * Fix test temp dirs not being cleaned up * Mock logger everywhere This suppresses all the error and debug output we generate which makes it hard to actually find which test has failed. It also gives us a standard way to test logging for the few places we do that. * Use separate data directories for unit test instances Exactly as we do for the e2e tests. * Add integration tests for vscode route * Make settings use --user-data-dir Without this test instances step on each other feet and they also clobber your own non-test settings. * Make redirects consistent They will preserve the trailing slash if there is one. * Remove compilation check If you do a regular non-watch build there are no compilation stats so this bricks VS Code in CI when running the unit tests. I am not sure how best to fix this for the case where you have a build that has not been packaged yet so I just removed it for now and added a message to check if VS Code is compiling when in dev mode. * Update code-server update endpoint name
97 lines
2.9 KiB
TypeScript
97 lines
2.9 KiB
TypeScript
import { RateLimiter } from "../../../../src/node/routes/login"
|
|
import { mockLogger } from "../../../utils/helpers"
|
|
import * as httpserver from "../../../utils/httpserver"
|
|
import * as integration from "../../../utils/integration"
|
|
|
|
describe("login", () => {
|
|
beforeAll(() => {
|
|
mockLogger()
|
|
})
|
|
|
|
describe("RateLimiter", () => {
|
|
it("should allow one try ", () => {
|
|
const limiter = new RateLimiter()
|
|
expect(limiter.removeToken()).toBe(true)
|
|
})
|
|
|
|
it("should pull tokens from both limiters (minute & hour)", () => {
|
|
const limiter = new RateLimiter()
|
|
|
|
// Try twice, which pulls two from the minute bucket
|
|
limiter.removeToken()
|
|
limiter.removeToken()
|
|
|
|
// Check that we can still try
|
|
// which should be true since there are 12 remaining in the hour bucket
|
|
expect(limiter.canTry()).toBe(true)
|
|
expect(limiter.removeToken()).toBe(true)
|
|
})
|
|
|
|
it("should not allow more than 14 tries in less than an hour", () => {
|
|
const limiter = new RateLimiter()
|
|
|
|
// The limiter allows 2 tries per minute plus 12 per hour
|
|
// so if we run it 15 times, 14 should return true and the last
|
|
// should return false
|
|
for (let i = 1; i <= 14; i++) {
|
|
expect(limiter.removeToken()).toBe(true)
|
|
}
|
|
|
|
expect(limiter.canTry()).toBe(false)
|
|
expect(limiter.removeToken()).toBe(false)
|
|
})
|
|
})
|
|
describe("/login", () => {
|
|
let _codeServer: httpserver.HttpServer | undefined
|
|
function codeServer(): httpserver.HttpServer {
|
|
if (!_codeServer) {
|
|
throw new Error("tried to use code-server before setting it up")
|
|
}
|
|
return _codeServer
|
|
}
|
|
|
|
// Store whatever might be in here so we can restore it afterward.
|
|
// TODO: We should probably pass this as an argument somehow instead of
|
|
// manipulating the environment.
|
|
const previousEnvPassword = process.env.PASSWORD
|
|
|
|
beforeEach(async () => {
|
|
process.env.PASSWORD = "test"
|
|
_codeServer = await integration.setup(["--auth=password"], "")
|
|
})
|
|
|
|
afterEach(async () => {
|
|
process.env.PASSWORD = previousEnvPassword
|
|
if (_codeServer) {
|
|
await _codeServer.dispose()
|
|
_codeServer = undefined
|
|
}
|
|
})
|
|
|
|
it("should return HTML with 'Missing password' message", async () => {
|
|
const resp = await codeServer().fetch("/login", { method: "POST" })
|
|
|
|
expect(resp.status).toBe(200)
|
|
|
|
const htmlContent = await resp.text()
|
|
|
|
expect(htmlContent).toContain("Missing password")
|
|
})
|
|
|
|
it("should return HTML with 'Incorrect password' message", async () => {
|
|
const params = new URLSearchParams()
|
|
params.append("password", "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")
|
|
const resp = await codeServer().fetch("/login", {
|
|
method: "POST",
|
|
body: params,
|
|
})
|
|
|
|
expect(resp.status).toBe(200)
|
|
|
|
const htmlContent = await resp.text()
|
|
|
|
expect(htmlContent).toContain("Incorrect password")
|
|
})
|
|
})
|
|
})
|