Some checks failed
Go Benchmark / Performance Regression Check (push) Has been cancelled
Cerberus Integration / Cerberus Security Stack Integration (push) Has been cancelled
Upload Coverage to Codecov / Backend Codecov Upload (push) Has been cancelled
Upload Coverage to Codecov / Frontend Codecov Upload (push) Has been cancelled
CodeQL - Analyze / CodeQL analysis (go) (push) Has been cancelled
CodeQL - Analyze / CodeQL analysis (javascript-typescript) (push) Has been cancelled
CrowdSec Integration / CrowdSec Bouncer Integration (push) Has been cancelled
Docker Build, Publish & Test / build-and-push (push) Has been cancelled
Quality Checks / Auth Route Protection Contract (push) Has been cancelled
Quality Checks / Codecov Trigger/Comment Parity Guard (push) Has been cancelled
Quality Checks / Backend (Go) (push) Has been cancelled
Quality Checks / Frontend (React) (push) Has been cancelled
Rate Limit integration / Rate Limiting Integration (push) Has been cancelled
Security Scan (PR) / Trivy Binary Scan (push) Has been cancelled
Supply Chain Verification (PR) / Verify Supply Chain (push) Has been cancelled
WAF integration / Coraza WAF Integration (push) Has been cancelled
Docker Build, Publish & Test / Security Scan PR Image (push) Has been cancelled
Repo Health Check / Repo health (push) Has been cancelled
History Rewrite Dry-Run / Dry-run preview for history rewrite (push) Has been cancelled
Prune Renovate Branches / prune (push) Has been cancelled
Renovate / renovate (push) Has been cancelled
Nightly Build & Package / sync-development-to-nightly (push) Has been cancelled
Nightly Build & Package / Trigger Nightly Validation Workflows (push) Has been cancelled
Nightly Build & Package / build-and-push-nightly (push) Has been cancelled
Nightly Build & Package / test-nightly-image (push) Has been cancelled
Nightly Build & Package / verify-nightly-supply-chain (push) Has been cancelled
Update GeoLite2 Checksum / update-checksum (push) Has been cancelled
Container Registry Prune / prune-ghcr (push) Has been cancelled
Container Registry Prune / prune-dockerhub (push) Has been cancelled
Container Registry Prune / summarize (push) Has been cancelled
Supply Chain Verification / Verify SBOM (push) Has been cancelled
Supply Chain Verification / Verify Release Artifacts (push) Has been cancelled
Supply Chain Verification / Verify Docker Image Supply Chain (push) Has been cancelled
Monitor Caddy Major Release / check-caddy-major (push) Has been cancelled
Weekly Nightly to Main Promotion / Verify Nightly Branch Health (push) Has been cancelled
Weekly Nightly to Main Promotion / Create Promotion PR (push) Has been cancelled
Weekly Nightly to Main Promotion / Trigger Missing Required Checks (push) Has been cancelled
Weekly Nightly to Main Promotion / Notify on Failure (push) Has been cancelled
Weekly Nightly to Main Promotion / Workflow Summary (push) Has been cancelled
Weekly Security Rebuild / Security Rebuild & Scan (push) Has been cancelled
172 lines
3.5 KiB
Go
Executable File
172 lines
3.5 KiB
Go
Executable File
package util
|
|
|
|
import "testing"
|
|
|
|
func TestSanitizeForLog(t *testing.T) {
|
|
t.Parallel()
|
|
tests := []struct {
|
|
name string
|
|
input string
|
|
expected string
|
|
}{
|
|
{
|
|
name: "empty string",
|
|
input: "",
|
|
expected: "",
|
|
},
|
|
{
|
|
name: "clean string",
|
|
input: "Hello World",
|
|
expected: "Hello World",
|
|
},
|
|
{
|
|
name: "string with newline",
|
|
input: "Hello\nWorld",
|
|
expected: "Hello World",
|
|
},
|
|
{
|
|
name: "string with carriage return and newline",
|
|
input: "Hello\r\nWorld",
|
|
expected: "Hello World",
|
|
},
|
|
{
|
|
name: "string with multiple newlines",
|
|
input: "Hello\nWorld\nTest",
|
|
expected: "Hello World Test",
|
|
},
|
|
{
|
|
name: "string with control characters",
|
|
input: "Hello\x00\x01\x1FWorld",
|
|
expected: "Hello World",
|
|
},
|
|
{
|
|
name: "string with DEL character (0x7F)",
|
|
input: "Hello\x7FWorld",
|
|
expected: "Hello World",
|
|
},
|
|
{
|
|
name: "complex string with mixed control chars",
|
|
input: "Line1\r\nLine2\nLine3\x00\x01\x7F",
|
|
expected: "Line1 Line2 Line3 ",
|
|
},
|
|
{
|
|
name: "string with tabs (0x09 is control char)",
|
|
input: "Hello\tWorld",
|
|
expected: "Hello World",
|
|
},
|
|
{
|
|
name: "string with only control chars",
|
|
input: "\x00\x01\x02\x1F\x7F",
|
|
expected: " ",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
result := SanitizeForLog(tt.input)
|
|
if result != tt.expected {
|
|
t.Errorf("SanitizeForLog(%q) = %q, want %q", tt.input, result, tt.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCanonicalizeIPForSecurity(t *testing.T) {
|
|
t.Parallel()
|
|
tests := []struct {
|
|
name string
|
|
input string
|
|
expected string
|
|
}{
|
|
{
|
|
name: "empty string",
|
|
input: "",
|
|
expected: "",
|
|
},
|
|
{
|
|
name: "IPv4 standard",
|
|
input: "192.168.1.1",
|
|
expected: "192.168.1.1",
|
|
},
|
|
{
|
|
name: "IPv4 with port (should strip port)",
|
|
input: "192.168.1.1:8080",
|
|
expected: "192.168.1.1",
|
|
},
|
|
{
|
|
name: "IPv6 standard",
|
|
input: "2001:db8::1",
|
|
expected: "2001:db8::1",
|
|
},
|
|
{
|
|
name: "IPv6 loopback (::1) normalizes to 127.0.0.1",
|
|
input: "::1",
|
|
expected: "127.0.0.1",
|
|
},
|
|
{
|
|
name: "IPv6 loopback with brackets",
|
|
input: "[::1]",
|
|
expected: "127.0.0.1",
|
|
},
|
|
{
|
|
name: "IPv6 loopback with brackets and port",
|
|
input: "[::1]:8080",
|
|
expected: "127.0.0.1",
|
|
},
|
|
{
|
|
name: "IPv4-mapped IPv6 address",
|
|
input: "::ffff:192.168.1.1",
|
|
expected: "192.168.1.1",
|
|
},
|
|
{
|
|
name: "IPv4-mapped IPv6 with brackets",
|
|
input: "[::ffff:192.168.1.1]",
|
|
expected: "192.168.1.1",
|
|
},
|
|
{
|
|
name: "IPv4 localhost",
|
|
input: "127.0.0.1",
|
|
expected: "127.0.0.1",
|
|
},
|
|
{
|
|
name: "IPv4 0.0.0.0",
|
|
input: "0.0.0.0",
|
|
expected: "0.0.0.0",
|
|
},
|
|
{
|
|
name: "invalid IP format",
|
|
input: "invalid",
|
|
expected: "invalid",
|
|
},
|
|
{
|
|
name: "comma-separated (should take first)",
|
|
input: "192.168.1.1, 10.0.0.1",
|
|
expected: "192.168.1.1",
|
|
},
|
|
{
|
|
name: "whitespace",
|
|
input: " 192.168.1.1 ",
|
|
expected: "192.168.1.1",
|
|
},
|
|
{
|
|
name: "IPv6 full form",
|
|
input: "2001:0db8:0000:0000:0000:0000:0000:0001",
|
|
expected: "2001:db8::1",
|
|
},
|
|
{
|
|
name: "IPv6 with zone",
|
|
input: "fe80::1%eth0",
|
|
expected: "fe80::1%eth0",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
result := CanonicalizeIPForSecurity(tt.input)
|
|
if result != tt.expected {
|
|
t.Errorf("CanonicalizeIPForSecurity(%q) = %q, want %q", tt.input, result, tt.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|