signal-desktop/ts/test-both/util/privacy_test.ts

186 lines
6.8 KiB
TypeScript
Raw Normal View History

2023-01-03 19:55:46 +00:00
// Copyright 2018 Signal Messenger, LLC
2020-10-30 20:34:04 +00:00
// SPDX-License-Identifier: AGPL-3.0-only
2021-06-01 18:15:23 +00:00
import { assert } from 'chai';
2018-03-06 21:25:43 +00:00
2021-06-01 18:15:23 +00:00
import * as Privacy from '../../util/privacy';
import { APP_ROOT_PATH } from '../../util/privacy';
2018-03-06 21:25:43 +00:00
2021-06-01 18:15:23 +00:00
Privacy.addSensitivePath('sensitive-path');
2018-03-06 21:25:43 +00:00
describe('Privacy', () => {
describe('redactPhoneNumbers', () => {
it('should redact all phone numbers', () => {
2018-04-27 21:25:04 +00:00
const text =
'This is a log line with a phone number +12223334455\n' +
2018-03-06 21:25:43 +00:00
'and another one +13334445566';
const actual = Privacy.redactPhoneNumbers(text);
2018-04-27 21:25:04 +00:00
const expected =
'This is a log line with a phone number +[REDACTED]455\n' +
2018-03-06 21:25:43 +00:00
'and another one +[REDACTED]566';
assert.equal(actual, expected);
});
});
describe('redactUuids', () => {
it('should redact all uuids', () => {
const text =
'This is a log line with a uuid 9e420799-acdf-4bf4-8dee-353d7e2096b4\n' +
'and another one IN ALL UPPERCASE 340727FB-E43A-413B-941B-AADA033B6CA3';
const actual = Privacy.redactUuids(text);
const expected =
2020-03-20 19:01:15 +00:00
'This is a log line with a uuid [REDACTED]6b4\n' +
'and another one IN ALL UPPERCASE [REDACTED]CA3';
assert.equal(actual, expected);
2018-03-06 21:25:43 +00:00
});
});
describe('redactGroupIds', () => {
it('should redact all group IDs', () => {
2018-04-27 21:25:04 +00:00
const text =
'This is a log line with two group IDs: group(123456789)\n' +
2018-03-06 21:25:43 +00:00
'and group(abcdefghij)';
const actual = Privacy.redactGroupIds(text);
2018-04-27 21:25:04 +00:00
const expected =
'This is a log line with two group IDs: group([REDACTED]789)\n' +
2018-03-06 21:25:43 +00:00
'and group([REDACTED]hij)';
assert.equal(actual, expected);
});
2018-05-03 15:46:21 +00:00
it('should remove newlines from redacted group IDs', () => {
const text =
'This is a log line with two group IDs: group(12345678\n9)\n' +
'and group(abc\ndefghij)';
const actual = Privacy.redactGroupIds(text);
const expected =
'This is a log line with two group IDs: group([REDACTED]789)\n' +
'and group([REDACTED]hij)';
assert.equal(actual, expected);
});
2020-09-09 02:25:05 +00:00
it('should remove newlines from redacted group V2 IDs', () => {
const text =
'This is a log line with three group IDs: groupv2(abcd32341a==)\n' +
'and groupv2(abcd32341ad=) and and groupv2(abcd32341ade)';
const actual = Privacy.redactGroupIds(text);
const expected =
'This is a log line with three group IDs: groupv2([REDACTED]41a==)\n' +
'and groupv2([REDACTED]1ad=) and and groupv2([REDACTED]ade)';
assert.equal(actual, expected);
});
2018-03-06 21:25:43 +00:00
});
describe('redactAll', () => {
it('should redact all sensitive information', () => {
const encodedAppRootPath = APP_ROOT_PATH.replace(/ /g, '%20');
2018-04-27 21:25:04 +00:00
const text =
'This is a log line with sensitive information:\n' +
2018-03-06 21:25:43 +00:00
`path1 ${APP_ROOT_PATH}/main.js\n` +
'phone1 +12223334455 ipsum\n' +
'group1 group(123456789) doloret\n' +
`path2 file:///${encodedAppRootPath}/js/background.js.` +
2018-03-06 21:25:43 +00:00
'phone2 +13334445566 lorem\n' +
2021-06-01 18:15:23 +00:00
'group2 group(abcdefghij) doloret\n' +
'path3 sensitive-path/attachment.noindex\n';
2018-03-06 21:25:43 +00:00
const actual = Privacy.redactAll(text);
2018-04-27 21:25:04 +00:00
const expected =
'This is a log line with sensitive information:\n' +
2018-03-06 21:25:43 +00:00
'path1 [REDACTED]/main.js\n' +
'phone1 +[REDACTED]455 ipsum\n' +
'group1 group([REDACTED]789) doloret\n' +
'path2 file:///[REDACTED]/js/background.js.' +
'phone2 +[REDACTED]566 lorem\n' +
2021-06-01 18:15:23 +00:00
'group2 group([REDACTED]hij) doloret\n' +
'path3 [REDACTED]/attachment.noindex\n';
2018-03-06 21:25:43 +00:00
assert.equal(actual, expected);
});
});
describe('_redactPath', () => {
2018-04-06 17:24:43 +00:00
it('should redact file paths', () => {
const testPath = '/Users/meow/Library/Application Support/Signal Beta';
2018-04-27 21:25:04 +00:00
const text =
'This is a log line with sensitive information:\n' +
2018-04-06 17:24:43 +00:00
`path1 ${testPath}/main.js\n` +
'phone1 +12223334455 ipsum\n';
const actual = Privacy._redactPath(testPath)(text);
2018-04-27 21:25:04 +00:00
const expected =
'This is a log line with sensitive information:\n' +
2018-04-06 17:24:43 +00:00
'path1 [REDACTED]/main.js\n' +
'phone1 +12223334455 ipsum\n';
assert.equal(actual, expected);
});
it('should redact URL-encoded paths', () => {
const testPath = '/Users/meow/Library/Application Support/Signal Beta';
const encodedTestPath = encodeURI(testPath);
2018-04-27 21:25:04 +00:00
const text =
'This is a log line with sensitive information:\n' +
`path1 ${testPath}/main.js\n` +
'phone1 +12223334455 ipsum\n' +
'group1 group(123456789) doloret\n' +
`path2 file:///${encodedTestPath}/js/background.js.`;
const actual = Privacy._redactPath(testPath)(text);
2018-04-27 21:25:04 +00:00
const expected =
'This is a log line with sensitive information:\n' +
'path1 [REDACTED]/main.js\n' +
'phone1 +12223334455 ipsum\n' +
'group1 group(123456789) doloret\n' +
'path2 file:///[REDACTED]/js/background.js.';
assert.equal(actual, expected);
});
it('should redact stack traces with both forward and backslashes', () => {
2018-04-27 21:25:04 +00:00
const testPath =
'C:/Users/Meow/AppData/Local/Programs/signal-desktop-beta';
const modifiedTestPath =
'C:\\Users\\Meow\\AppData\\Local\\Programs\\signal-desktop-beta';
2018-04-27 21:25:04 +00:00
const text =
'This is a log line with sensitive information:\n' +
`path1 ${testPath}\\main.js\n` +
'phone1 +12223334455 ipsum\n' +
'group1 group(123456789) doloret\n' +
`path2 ${modifiedTestPath}\\js\\background.js.`;
const actual = Privacy._redactPath(testPath)(text);
2018-04-27 21:25:04 +00:00
const expected =
'This is a log line with sensitive information:\n' +
'path1 [REDACTED]\\main.js\n' +
'phone1 +12223334455 ipsum\n' +
'group1 group(123456789) doloret\n' +
'path2 [REDACTED]\\js\\background.js.';
assert.equal(actual, expected);
});
2018-04-06 18:25:55 +00:00
it('should redact stack traces with escaped backslashes', () => {
2018-04-27 21:25:04 +00:00
const testPath =
'C:\\Users\\Meow\\AppData\\Local\\Programs\\signal-desktop-beta';
2018-04-06 18:25:55 +00:00
const modifiedTestPath =
'C:\\\\Users\\\\Meow\\\\AppData\\\\Local\\\\Programs\\\\signal-desktop-beta';
2018-04-27 21:25:04 +00:00
const text =
'This is a log line with sensitive information:\n' +
2018-04-06 18:25:55 +00:00
`path1 ${testPath}\\main.js\n` +
'phone1 +12223334455 ipsum\n' +
'group1 group(123456789) doloret\n' +
`path2 ${modifiedTestPath}\\js\\background.js.`;
const actual = Privacy._redactPath(testPath)(text);
2018-04-27 21:25:04 +00:00
const expected =
'This is a log line with sensitive information:\n' +
2018-04-06 18:25:55 +00:00
'path1 [REDACTED]\\main.js\n' +
'phone1 +12223334455 ipsum\n' +
'group1 group(123456789) doloret\n' +
'path2 [REDACTED]\\js\\background.js.';
assert.equal(actual, expected);
});
});
2018-03-06 21:25:43 +00:00
});