mirror of
https://github.com/bitwarden/browser.git
synced 2024-10-31 08:20:37 +01:00
df9e6e21c9
* Clean up dangling behaviorSubject
* Handle null in utils
* fix null check
* Await promises, even in async functions
* Add to/fromJSON methods to State and Accounts
This is needed since all storage in manifest v3 is key-value-pair-based
and session storage of most data is actually serialized into an
encrypted string.
* Simplify AccountKeys json parsing
* Fix account key (de)serialization
* Remove unused DecodedToken state
* Correct filename typo
* Simplify keys `toJSON` tests
* Explain AccountKeys `toJSON` return type
* Remove unnecessary `any`s
* Remove unique ArrayBuffer serialization
* Initialize items in MemoryStorageService
* Revert "Fix account key (de)serialization"
This reverts commit b1dffb5c2c
, which was breaking serializations
* Move fromJSON to owning object
* Add DeepJsonify type
* Use Records for storage
* Add new Account Settings to serialized data
* Fix failing serialization tests
* Extract complex type conversion to helper methods
* Remove unnecessary decorator
* Return null from json deserializers
* Remove unnecessary decorators
* Remove obsolete test
* Use type-fest `Jsonify` formatting rules for external library
* Update jsonify comment
Co-authored-by: @eliykat
* Remove erroneous comment
* Fix unintended deep-jsonify changes
* Fix prettierignore
* Fix formatting of deep-jsonify.ts
Co-authored-by: Thomas Rittson <trittson@bitwarden.com>
Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com>
80 lines
3.1 KiB
TypeScript
80 lines
3.1 KiB
TypeScript
import { Utils } from "@bitwarden/common/misc/utils";
|
|
|
|
describe("Utils Service", () => {
|
|
describe("getDomain", () => {
|
|
it("should fail for invalid urls", () => {
|
|
expect(Utils.getDomain(null)).toBeNull();
|
|
expect(Utils.getDomain(undefined)).toBeNull();
|
|
expect(Utils.getDomain(" ")).toBeNull();
|
|
expect(Utils.getDomain('https://bit!:"_&ward.com')).toBeNull();
|
|
expect(Utils.getDomain("bitwarden")).toBeNull();
|
|
});
|
|
|
|
it("should fail for data urls", () => {
|
|
expect(Utils.getDomain("data:image/jpeg;base64,AAA")).toBeNull();
|
|
});
|
|
|
|
it("should handle urls without protocol", () => {
|
|
expect(Utils.getDomain("bitwarden.com")).toBe("bitwarden.com");
|
|
expect(Utils.getDomain("wrong://bitwarden.com")).toBe("bitwarden.com");
|
|
});
|
|
|
|
it("should handle valid urls", () => {
|
|
expect(Utils.getDomain("https://bitwarden")).toBe("bitwarden");
|
|
expect(Utils.getDomain("https://bitwarden.com")).toBe("bitwarden.com");
|
|
expect(Utils.getDomain("http://bitwarden.com")).toBe("bitwarden.com");
|
|
expect(Utils.getDomain("http://vault.bitwarden.com")).toBe("bitwarden.com");
|
|
expect(
|
|
Utils.getDomain("https://user:password@bitwarden.com:8080/password/sites?and&query#hash")
|
|
).toBe("bitwarden.com");
|
|
expect(Utils.getDomain("https://bitwarden.unknown")).toBe("bitwarden.unknown");
|
|
});
|
|
|
|
it("should support localhost and IP", () => {
|
|
expect(Utils.getDomain("https://localhost")).toBe("localhost");
|
|
expect(Utils.getDomain("https://192.168.1.1")).toBe("192.168.1.1");
|
|
});
|
|
|
|
it("should reject invalid hostnames", () => {
|
|
expect(Utils.getDomain("https://mywebsite.com$.mywebsite.com")).toBeNull();
|
|
expect(Utils.getDomain("https://mywebsite.com!.mywebsite.com")).toBeNull();
|
|
});
|
|
});
|
|
|
|
describe("getHostname", () => {
|
|
it("should fail for invalid urls", () => {
|
|
expect(Utils.getHostname(null)).toBeNull();
|
|
expect(Utils.getHostname(undefined)).toBeNull();
|
|
expect(Utils.getHostname(" ")).toBeNull();
|
|
expect(Utils.getHostname('https://bit!:"_&ward.com')).toBeNull();
|
|
expect(Utils.getHostname("bitwarden")).toBeNull();
|
|
});
|
|
|
|
it("should handle valid urls", () => {
|
|
expect(Utils.getHostname("bitwarden.com")).toBe("bitwarden.com");
|
|
expect(Utils.getHostname("https://bitwarden.com")).toBe("bitwarden.com");
|
|
expect(Utils.getHostname("http://bitwarden.com")).toBe("bitwarden.com");
|
|
expect(Utils.getHostname("http://vault.bitwarden.com")).toBe("vault.bitwarden.com");
|
|
});
|
|
|
|
it("should support localhost and IP", () => {
|
|
expect(Utils.getHostname("https://localhost")).toBe("localhost");
|
|
expect(Utils.getHostname("https://192.168.1.1")).toBe("192.168.1.1");
|
|
});
|
|
});
|
|
|
|
describe("newGuid", () => {
|
|
it("should create a valid guid", () => {
|
|
const validGuid =
|
|
/^[0-9a-f]{8}-[0-9a-f]{4}-[1-5][0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$/i;
|
|
expect(Utils.newGuid()).toMatch(validGuid);
|
|
});
|
|
});
|
|
|
|
describe("fromByteStringToArray", () => {
|
|
it("should handle null", () => {
|
|
expect(Utils.fromByteStringToArray(null)).toEqual(null);
|
|
});
|
|
});
|
|
});
|