UNPKG

@theia/core

Version:

Theia is a cloud & desktop IDE framework implemented in TypeScript.

289 lines (242 loc) • 13.9 kB
// ***************************************************************************** // Copyright (C) 2025 STMicroelectronics GmbH. // // This program and the accompanying materials are made available under the // terms of the Eclipse Public License v. 2.0 which is available at // http://www.eclipse.org/legal/epl-2.0. // // This Source Code may also be made available under the following Secondary // Licenses when the conditions for such availability set forth in the Eclipse // Public License v. 2.0 are satisfied: GNU General Public License, version 2 // with the GNU Classpath Exception which is available at // https://www.gnu.org/software/classpath/license.html. // // SPDX-License-Identifier: EPL-2.0 OR GPL-2.0-only WITH Classpath-exception-2.0 // ***************************************************************************** import { expect } from 'chai'; import { DefaultLoggerSanitizer } from './logger-sanitizer'; describe('DefaultLoggerSanitizer', () => { let sanitizer: DefaultLoggerSanitizer; beforeEach(() => { sanitizer = new DefaultLoggerSanitizer(); }); describe('sanitize', () => { it('should mask credentials in http URL', () => { const message = 'http://username:password@proxy.example.com:8080'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('http://****:****@proxy.example.com:8080'); }); it('should mask credentials in https URL', () => { const message = 'https://user:pass@secure-proxy.com:443/path'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('https://****:****@secure-proxy.com:443/path'); }); it('should return URL unchanged if no credentials present', () => { const message = 'http://proxy.example.com:8080'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('http://proxy.example.com:8080'); }); it('should return empty string for empty string input', () => { const sanitized = sanitizer.sanitize(''); expect(sanitized).to.equal(''); }); it('should handle complex passwords with special characters', () => { const message = 'http://user:p%40ss%20word@proxy.com:8080'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('http://****:****@proxy.com:8080'); }); it('should handle URL with path and query parameters', () => { const message = 'http://user:pass@proxy.com:8080/path?query=value'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('http://****:****@proxy.com:8080/path?query=value'); }); it('should mask credentials in ftp URL', () => { const message = 'ftp://user:pass@ftp.example.com'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('ftp://****:****@ftp.example.com'); }); it('should mask credentials in URL without port', () => { const message = 'https://user:pass@example.com/path'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('https://****:****@example.com/path'); }); it('should mask credentials in URL with port', () => { const message = 'https://user:pass@example.com:8080/path'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('https://****:****@example.com:8080/path'); }); it('should not over-match when text after URL contains @ symbol', () => { const message = '\"uri\": \"file:///some/path/my.llamafile\" ... \"@modelcontextprotocol/server-filesystem@latest\"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('\"uri\": \"file:///some/path/my.llamafile\" ... \"@modelcontextprotocol/server-filesystem@latest\"'); }); it('should mask credentials in sftp URL', () => { const message = 'sftp://user:pass@sftp.example.com:22/path'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('sftp://****:****@sftp.example.com:22/path'); }); it('should mask credentials in ssh URL', () => { const message = 'ssh://git:token@github.com/repo'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('ssh://****:****@github.com/repo'); }); it('should mask credentials in ws URL', () => { const message = 'ws://user:pass@websocket.example.com'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('ws://****:****@websocket.example.com'); }); it('should mask credentials in wss URL', () => { const message = 'wss://user:pass@secure-websocket.example.com'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('wss://****:****@secure-websocket.example.com'); }); it('should mask credentials in socks proxy URL', () => { const message = 'socks://user:pass@socks-proxy.com:1080'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('socks://****:****@socks-proxy.com:1080'); }); it('should mask credentials in socks4 proxy URL', () => { const message = 'socks4://user:pass@socks4-proxy.com:1080'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('socks4://****:****@socks4-proxy.com:1080'); }); it('should mask credentials in socks5 proxy URL', () => { const message = 'socks5://user:pass@socks5-proxy.com:1080'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('socks5://****:****@socks5-proxy.com:1080'); }); it('should mask credentials in git URL', () => { const message = 'git://user:token@github.com/org/repo.git'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('git://****:****@github.com/org/repo.git'); }); it('should not mask mailto links (no credentials format)', () => { const message = 'mailto:user@example.com'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('mailto:user@example.com'); }); it('should mask credentials in any protocol with standard URL format', () => { const message = 'customprotocol://user:pass@custom.server.com'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('customprotocol://****:****@custom.server.com'); }); it('should be case-insensitive for protocol', () => { const message = 'HTTP://user:pass@proxy.com:8080'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('HTTP://****:****@proxy.com:8080'); }); it('should mask multiple URLs in a single string', () => { const message = 'Connecting to http://user1:pass1@proxy1.com and http://user2:pass2@proxy2.com'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('Connecting to http://****:****@proxy1.com and http://****:****@proxy2.com'); }); it('should mask multiple URLs with different protocols', () => { const message = 'HTTP: http://u:p@h1.com, SOCKS: socks5://u:p@h2.com, Git: git://u:p@h3.com'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('HTTP: http://****:****@h1.com, SOCKS: socks5://****:****@h2.com, Git: git://****:****@h3.com'); }); it('should mask credentials in log messages containing URLs', () => { const message = 'Failed to connect to http://admin:secret@internal-proxy.com:8080'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('Failed to connect to http://****:****@internal-proxy.com:8080'); }); it('should handle error stack traces with URLs', () => { const stack = `Error: Connection failed at Request.http://user:pass@proxy.com:8080/api at processRequest (index.js:10:5)`; const sanitized = sanitizer.sanitize(stack); expect(sanitized).to.contain('http://****:****@proxy.com:8080'); expect(sanitized).not.to.contain('user:pass'); }); it('should return message unchanged if no sensitive data', () => { const message = 'Normal log message without sensitive data'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal(message); }); it('should mask api_key values in JSON format', () => { const message = '"api_key": "secret123"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"api_key": "****"'); }); it('should mask API_KEY values in JSON format (case-insensitive)', () => { const message = '"API_KEY": "SECRET123"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"API_KEY": "****"'); }); it('should mask api-key values in JSON format with hyphen separator', () => { const message = '"api-key": "my-token"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"api-key": "****"'); }); it('should mask apikey values in JSON format without separator', () => { const message = '"apikey": "token123"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"apikey": "****"'); }); it('should mask api key in JSON with single quotes', () => { const message = "'api_key': 'secret123'"; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal("'api_key': '****'"); }); it('should mask prefixed api keys like anthropic_api_key in JSON', () => { const message = '"anthropic_api_key": "sk-ant-123456"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"anthropic_api_key": "****"'); }); it('should mask prefixed api keys like openai_api_key in JSON', () => { const message = '"openai_api_key": "sk-abc123"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"openai_api_key": "****"'); }); it('should mask prefixed api keys like GOOGLE_API_KEY in JSON', () => { const message = '"GOOGLE_API_KEY": "AIzaSy123"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"GOOGLE_API_KEY": "****"'); }); it('should mask multiple api keys in JSON object', () => { const message = '{ "anthropic_api_key": "sk-123", "openai_api_key": "sk-456" }'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('{ "anthropic_api_key": "****", "openai_api_key": "****" }'); }); it('should mask authtoken values in JSON format without separator', () => { const message = '"authtoken": "github_pat_zxzxzxzxzxzxzxzxz"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"authtoken": "****"'); }); it('should mask auth_token values in JSON format with underscore separator', () => { const message = '"auth_token": "github_pat_zxzxzxzxzxzxzxzxz"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"auth_token": "****"'); }); it('should mask auth-token values in JSON format with hyphen separator', () => { const message = '"auth-token": "github_pat_zxzxzxzxzxzxzxzxz"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"auth-token": "****"'); }); it('should mask serverAuthToken in JSON format', () => { const message = '"serverAuthToken": "github_pat_zxzxzxzxzxzxzxzxz"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"serverAuthToken": "****"'); }); it('should mask escaped quotes from JSON.stringify', () => { const message = '\\"api_key\\": \\"secret123\\"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('\\"api_key\\": \\"****\\"'); }); it('should mask dot-notation settings apiKey in JSON', () => { const message = '"ai-features.huggingFace.apiKey": "hf_xxxxxxxxxxxx"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"ai-features.huggingFace.apiKey": "****"'); }); it('should mask nested settings with apiKey in JSON', () => { const message = '"ai-features.openAiOfficial.openAiApiKey": "sk-xxxxxxxx"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"ai-features.openAiOfficial.openAiApiKey": "****"'); }); it('should mask settings serverAuthToken in JSON', () => { const message = '"serverAuthToken": "ghp_xxxxxxxxxxxx"'; const sanitized = sanitizer.sanitize(message); expect(sanitized).to.equal('"serverAuthToken": "****"'); }); }); });