@sparkleideas/security 3.0.0-alpha.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/README.md +234 -0
  2. package/__tests__/acceptance/security-compliance.test.ts +674 -0
  3. package/__tests__/credential-generator.test.ts +310 -0
  4. package/__tests__/fixtures/configurations.ts +419 -0
  5. package/__tests__/fixtures/index.ts +21 -0
  6. package/__tests__/helpers/create-mock.ts +469 -0
  7. package/__tests__/helpers/index.ts +32 -0
  8. package/__tests__/input-validator.test.ts +381 -0
  9. package/__tests__/integration/security-flow.test.ts +606 -0
  10. package/__tests__/password-hasher.test.ts +239 -0
  11. package/__tests__/path-validator.test.ts +302 -0
  12. package/__tests__/safe-executor.test.ts +292 -0
  13. package/__tests__/token-generator.test.ts +371 -0
  14. package/__tests__/unit/credential-generator.test.ts +182 -0
  15. package/__tests__/unit/password-hasher.test.ts +359 -0
  16. package/__tests__/unit/path-validator.test.ts +509 -0
  17. package/__tests__/unit/safe-executor.test.ts +667 -0
  18. package/__tests__/unit/token-generator.test.ts +310 -0
  19. package/package.json +28 -0
  20. package/src/CVE-REMEDIATION.ts +251 -0
  21. package/src/application/index.ts +10 -0
  22. package/src/application/services/security-application-service.ts +193 -0
  23. package/src/credential-generator.ts +368 -0
  24. package/src/domain/entities/security-context.ts +173 -0
  25. package/src/domain/index.ts +17 -0
  26. package/src/domain/services/security-domain-service.ts +296 -0
  27. package/src/index.ts +271 -0
  28. package/src/input-validator.ts +466 -0
  29. package/src/password-hasher.ts +270 -0
  30. package/src/path-validator.ts +525 -0
  31. package/src/safe-executor.ts +525 -0
  32. package/src/token-generator.ts +463 -0
  33. package/tmp.json +0 -0
  34. package/tsconfig.json +9 -0
@@ -0,0 +1,292 @@
1
+ /**
2
+ * Safe Executor Tests - HIGH-1 Remediation Validation
3
+ *
4
+ * Tests verify:
5
+ * - Commands execute without shell
6
+ * - Command allowlist enforcement
7
+ * - Argument sanitization
8
+ * - Dangerous pattern detection
9
+ */
10
+
11
+ import { describe, it, expect, beforeEach } from 'vitest';
12
+ import {
13
+ SafeExecutor,
14
+ SafeExecutorError,
15
+ createDevelopmentExecutor,
16
+ createReadOnlyExecutor,
17
+ } from '../../security/safe-executor.js';
18
+
19
+ describe('SafeExecutor', () => {
20
+ let executor: SafeExecutor;
21
+
22
+ beforeEach(() => {
23
+ executor = new SafeExecutor({
24
+ allowedCommands: ['echo', 'ls', 'git', 'npm', 'node'],
25
+ timeout: 5000,
26
+ });
27
+ });
28
+
29
+ describe('Configuration', () => {
30
+ it('should require at least one allowed command', () => {
31
+ expect(() => new SafeExecutor({
32
+ allowedCommands: [],
33
+ })).toThrow(SafeExecutorError);
34
+ });
35
+
36
+ it('should reject dangerous commands in allowlist', () => {
37
+ expect(() => new SafeExecutor({
38
+ allowedCommands: ['rm'],
39
+ })).toThrow(SafeExecutorError);
40
+ });
41
+
42
+ it('should reject multiple dangerous commands', () => {
43
+ expect(() => new SafeExecutor({
44
+ allowedCommands: ['chmod', 'chown', 'rm'],
45
+ })).toThrow(SafeExecutorError);
46
+ });
47
+
48
+ it('should allow safe commands', () => {
49
+ expect(() => new SafeExecutor({
50
+ allowedCommands: ['git', 'npm', 'node'],
51
+ })).not.toThrow();
52
+ });
53
+ });
54
+
55
+ describe('Command Validation', () => {
56
+ it('should allow commands in allowlist', async () => {
57
+ const result = await executor.execute('echo', ['hello']);
58
+ expect(result.exitCode).toBe(0);
59
+ expect(result.stdout.trim()).toBe('hello');
60
+ });
61
+
62
+ it('should block commands not in allowlist', async () => {
63
+ await expect(executor.execute('cat', ['/etc/passwd'])).rejects.toThrow(SafeExecutorError);
64
+ });
65
+
66
+ it('should block sudo commands by default', async () => {
67
+ const sudoExecutor = new SafeExecutor({
68
+ allowedCommands: ['sudo', 'ls'],
69
+ allowSudo: false,
70
+ });
71
+
72
+ await expect(sudoExecutor.execute('sudo', ['ls'])).rejects.toThrow(SafeExecutorError);
73
+ });
74
+
75
+ it('should allow sudo when configured', async () => {
76
+ const sudoExecutor = new SafeExecutor({
77
+ allowedCommands: ['sudo', 'ls'],
78
+ allowSudo: true,
79
+ });
80
+
81
+ // Will fail due to password requirement, but shouldn't throw allowlist error
82
+ const error = await sudoExecutor.execute('sudo', ['-n', 'ls']).catch(e => e);
83
+ if (error instanceof SafeExecutorError) {
84
+ expect(error.code).not.toBe('SUDO_NOT_ALLOWED');
85
+ }
86
+ });
87
+ });
88
+
89
+ describe('Argument Validation', () => {
90
+ it('should block null bytes in arguments', async () => {
91
+ await expect(executor.execute('echo', ['hello\x00world'])).rejects.toThrow(SafeExecutorError);
92
+ });
93
+
94
+ it('should block semicolon (command chaining)', async () => {
95
+ await expect(executor.execute('echo', ['hello; rm -rf /'])).rejects.toThrow(SafeExecutorError);
96
+ });
97
+
98
+ it('should block && (command chaining)', async () => {
99
+ await expect(executor.execute('echo', ['hello && rm -rf /'])).rejects.toThrow(SafeExecutorError);
100
+ });
101
+
102
+ it('should block || (command chaining)', async () => {
103
+ await expect(executor.execute('echo', ['hello || rm -rf /'])).rejects.toThrow(SafeExecutorError);
104
+ });
105
+
106
+ it('should block pipe character', async () => {
107
+ await expect(executor.execute('echo', ['hello | cat'])).rejects.toThrow(SafeExecutorError);
108
+ });
109
+
110
+ it('should block backticks (command substitution)', async () => {
111
+ await expect(executor.execute('echo', ['`whoami`'])).rejects.toThrow(SafeExecutorError);
112
+ });
113
+
114
+ it('should block $() (command substitution)', async () => {
115
+ await expect(executor.execute('echo', ['$(whoami)'])).rejects.toThrow(SafeExecutorError);
116
+ });
117
+
118
+ it('should block redirect operators', async () => {
119
+ await expect(executor.execute('echo', ['hello > /etc/passwd'])).rejects.toThrow(SafeExecutorError);
120
+ });
121
+
122
+ it('should block newlines', async () => {
123
+ await expect(executor.execute('echo', ['hello\nrm -rf /'])).rejects.toThrow(SafeExecutorError);
124
+ });
125
+
126
+ it('should allow safe arguments', async () => {
127
+ const result = await executor.execute('echo', ['hello', 'world']);
128
+ expect(result.exitCode).toBe(0);
129
+ });
130
+
131
+ it('should allow arguments with dashes', async () => {
132
+ const result = await executor.execute('echo', ['-n', 'hello']);
133
+ expect(result.exitCode).toBe(0);
134
+ });
135
+
136
+ it('should allow arguments with equals', async () => {
137
+ const result = await executor.execute('echo', ['KEY=value']);
138
+ expect(result.exitCode).toBe(0);
139
+ });
140
+ });
141
+
142
+ describe('Argument Sanitization', () => {
143
+ it('should sanitize null bytes', () => {
144
+ const sanitized = executor.sanitizeArgument('hello\x00world');
145
+ expect(sanitized).not.toContain('\x00');
146
+ });
147
+
148
+ it('should sanitize shell metacharacters', () => {
149
+ const sanitized = executor.sanitizeArgument('hello; rm -rf /');
150
+ expect(sanitized).not.toContain(';');
151
+ });
152
+ });
153
+
154
+ describe('Command Execution', () => {
155
+ it('should return stdout', async () => {
156
+ const result = await executor.execute('echo', ['hello']);
157
+ expect(result.stdout.trim()).toBe('hello');
158
+ });
159
+
160
+ it('should return stderr', async () => {
161
+ // Use node to generate stderr
162
+ const result = await executor.execute('node', ['-e', 'console.error("error")']);
163
+ expect(result.stderr.trim()).toBe('error');
164
+ });
165
+
166
+ it('should return exit code', async () => {
167
+ const result = await executor.execute('node', ['-e', 'process.exit(42)']);
168
+ expect(result.exitCode).toBe(42);
169
+ });
170
+
171
+ it('should track execution duration', async () => {
172
+ const result = await executor.execute('echo', ['hello']);
173
+ expect(result.duration).toBeGreaterThanOrEqual(0);
174
+ });
175
+
176
+ it('should include command in result', async () => {
177
+ const result = await executor.execute('echo', ['hello']);
178
+ expect(result.command).toBe('echo');
179
+ expect(result.args).toEqual(['hello']);
180
+ });
181
+ });
182
+
183
+ describe('Timeout Handling', () => {
184
+ it('should timeout long-running commands', async () => {
185
+ const shortTimeoutExecutor = new SafeExecutor({
186
+ allowedCommands: ['node'],
187
+ timeout: 100,
188
+ });
189
+
190
+ await expect(
191
+ shortTimeoutExecutor.execute('node', ['-e', 'setTimeout(() => {}, 10000)'])
192
+ ).rejects.toThrow(SafeExecutorError);
193
+ });
194
+ });
195
+
196
+ describe('Streaming Execution', () => {
197
+ it('should return process handle', () => {
198
+ const streaming = executor.executeStreaming('echo', ['hello']);
199
+ expect(streaming.process).toBeDefined();
200
+ expect(streaming.promise).toBeInstanceOf(Promise);
201
+
202
+ // Clean up
203
+ streaming.process.kill();
204
+ });
205
+
206
+ it('should stream stdout', async () => {
207
+ const streaming = executor.executeStreaming('echo', ['hello']);
208
+ const result = await streaming.promise;
209
+ expect(result.stdout.trim()).toBe('hello');
210
+ });
211
+ });
212
+
213
+ describe('Dynamic Allowlist', () => {
214
+ it('should check if command is allowed', () => {
215
+ expect(executor.isCommandAllowed('echo')).toBe(true);
216
+ expect(executor.isCommandAllowed('cat')).toBe(false);
217
+ });
218
+
219
+ it('should add commands at runtime', () => {
220
+ expect(executor.isCommandAllowed('pwd')).toBe(false);
221
+ executor.allowCommand('pwd');
222
+ expect(executor.isCommandAllowed('pwd')).toBe(true);
223
+ });
224
+
225
+ it('should reject dangerous commands when adding', () => {
226
+ expect(() => executor.allowCommand('rm')).toThrow(SafeExecutorError);
227
+ });
228
+
229
+ it('should return allowed commands', () => {
230
+ const commands = executor.getAllowedCommands();
231
+ expect(commands).toContain('echo');
232
+ expect(commands).toContain('git');
233
+ });
234
+ });
235
+
236
+ describe('Factory Functions', () => {
237
+ it('should create development executor', () => {
238
+ const devExecutor = createDevelopmentExecutor();
239
+ expect(devExecutor.isCommandAllowed('git')).toBe(true);
240
+ expect(devExecutor.isCommandAllowed('npm')).toBe(true);
241
+ expect(devExecutor.isCommandAllowed('node')).toBe(true);
242
+ });
243
+
244
+ it('should create read-only executor', () => {
245
+ const readOnlyExecutor = createReadOnlyExecutor();
246
+ expect(readOnlyExecutor.isCommandAllowed('git')).toBe(true);
247
+ expect(readOnlyExecutor.isCommandAllowed('cat')).toBe(true);
248
+ expect(readOnlyExecutor.isCommandAllowed('ls')).toBe(true);
249
+ });
250
+ });
251
+
252
+ describe('HIGH-1 Security Verification', () => {
253
+ it('should NOT use shell for execution', async () => {
254
+ // If shell were enabled, this would be interpreted as command chaining
255
+ // With shell disabled, it's just a string argument
256
+ const result = await executor.execute('echo', ['hello']);
257
+ expect(result.exitCode).toBe(0);
258
+
259
+ // This should fail validation before reaching execution
260
+ await expect(executor.execute('echo', ['hello; cat /etc/passwd'])).rejects.toThrow();
261
+ });
262
+
263
+ it('should prevent command injection via arguments', async () => {
264
+ // Classic injection attempts
265
+ const injections = [
266
+ 'hello; rm -rf /',
267
+ 'hello && rm -rf /',
268
+ 'hello || rm -rf /',
269
+ 'hello | rm -rf /',
270
+ '`rm -rf /`',
271
+ '$(rm -rf /)',
272
+ 'hello\nrm -rf /',
273
+ 'hello\x00rm -rf /',
274
+ ];
275
+
276
+ for (const injection of injections) {
277
+ await expect(executor.execute('echo', [injection])).rejects.toThrow(SafeExecutorError);
278
+ }
279
+ });
280
+
281
+ it('should prevent environment variable injection', async () => {
282
+ await expect(executor.execute('echo', ['${PATH}'])).rejects.toThrow(SafeExecutorError);
283
+ });
284
+
285
+ it('should not allow arbitrary commands', async () => {
286
+ // Only commands in allowlist should execute
287
+ await expect(executor.execute('wget', ['http://evil.com'])).rejects.toThrow(SafeExecutorError);
288
+ await expect(executor.execute('curl', ['http://evil.com'])).rejects.toThrow(SafeExecutorError);
289
+ await expect(executor.execute('bash', ['-c', 'rm -rf /'])).rejects.toThrow(SafeExecutorError);
290
+ });
291
+ });
292
+ });
@@ -0,0 +1,371 @@
1
+ /**
2
+ * Token Generator Tests
3
+ *
4
+ * Tests verify:
5
+ * - Secure token generation
6
+ * - Token expiration
7
+ * - Signed token verification
8
+ * - Timing-safe comparison
9
+ */
10
+
11
+ import { describe, it, expect, beforeEach } from 'vitest';
12
+ import {
13
+ TokenGenerator,
14
+ TokenGeneratorError,
15
+ createTokenGenerator,
16
+ getDefaultGenerator,
17
+ quickGenerate,
18
+ } from '../../security/token-generator.js';
19
+
20
+ describe('TokenGenerator', () => {
21
+ let generator: TokenGenerator;
22
+
23
+ beforeEach(() => {
24
+ generator = new TokenGenerator({
25
+ hmacSecret: 'test-secret-key-for-hmac-operations',
26
+ defaultExpiration: 3600,
27
+ });
28
+ });
29
+
30
+ describe('Configuration', () => {
31
+ it('should use default configuration', () => {
32
+ expect(() => new TokenGenerator()).not.toThrow();
33
+ });
34
+
35
+ it('should reject token length below 16 bytes', () => {
36
+ expect(() => new TokenGenerator({
37
+ defaultLength: 8,
38
+ })).toThrow(TokenGeneratorError);
39
+ });
40
+
41
+ it('should accept custom encoding', () => {
42
+ const hexGenerator = new TokenGenerator({ encoding: 'hex' });
43
+ const token = hexGenerator.generate(16);
44
+ expect(token).toMatch(/^[0-9a-f]+$/);
45
+ });
46
+ });
47
+
48
+ describe('Token Generation', () => {
49
+ it('should generate token of specified length', () => {
50
+ const token = generator.generate(32);
51
+ // Base64url encoding: 32 bytes = ~43 chars
52
+ expect(token.length).toBeGreaterThan(40);
53
+ });
54
+
55
+ it('should generate unique tokens', () => {
56
+ const tokens = new Set<string>();
57
+ for (let i = 0; i < 100; i++) {
58
+ tokens.add(generator.generate());
59
+ }
60
+ expect(tokens.size).toBe(100);
61
+ });
62
+
63
+ it('should generate URL-safe tokens by default', () => {
64
+ const token = generator.generate();
65
+ // Base64url should not contain +, /, or =
66
+ expect(token).not.toMatch(/[+/=]/);
67
+ });
68
+ });
69
+
70
+ describe('Token with Expiration', () => {
71
+ it('should generate token with expiration', () => {
72
+ const token = generator.generateWithExpiration(3600);
73
+
74
+ expect(token.value).toBeDefined();
75
+ expect(token.createdAt).toBeInstanceOf(Date);
76
+ expect(token.expiresAt).toBeInstanceOf(Date);
77
+ expect(token.expiresAt.getTime()).toBeGreaterThan(token.createdAt.getTime());
78
+ });
79
+
80
+ it('should set correct expiration time', () => {
81
+ const expiration = 3600; // 1 hour
82
+ const token = generator.generateWithExpiration(expiration);
83
+
84
+ const expectedExpiration = Date.now() + expiration * 1000;
85
+ const actualExpiration = token.expiresAt.getTime();
86
+
87
+ expect(Math.abs(actualExpiration - expectedExpiration)).toBeLessThan(100);
88
+ });
89
+
90
+ it('should include metadata when provided', () => {
91
+ const token = generator.generateWithExpiration(3600, { userId: '123' });
92
+ expect(token.metadata).toEqual({ userId: '123' });
93
+ });
94
+ });
95
+
96
+ describe('Session Token', () => {
97
+ it('should generate session token', () => {
98
+ const token = generator.generateSessionToken();
99
+
100
+ expect(token.value).toBeDefined();
101
+ expect(token.expiresAt).toBeInstanceOf(Date);
102
+ });
103
+ });
104
+
105
+ describe('CSRF Token', () => {
106
+ it('should generate CSRF token', () => {
107
+ const token = generator.generateCsrfToken();
108
+
109
+ expect(token.value).toBeDefined();
110
+ // 30 minutes expiration
111
+ const expectedExpiration = Date.now() + 1800 * 1000;
112
+ expect(Math.abs(token.expiresAt.getTime() - expectedExpiration)).toBeLessThan(100);
113
+ });
114
+ });
115
+
116
+ describe('API Token', () => {
117
+ it('should generate API token with prefix', () => {
118
+ const token = generator.generateApiToken('cf_');
119
+
120
+ expect(token.value.startsWith('cf_')).toBe(true);
121
+ });
122
+
123
+ it('should set 1 year expiration', () => {
124
+ const token = generator.generateApiToken();
125
+
126
+ const expectedExpiration = Date.now() + 365 * 24 * 60 * 60 * 1000;
127
+ expect(Math.abs(token.expiresAt.getTime() - expectedExpiration)).toBeLessThan(1000);
128
+ });
129
+ });
130
+
131
+ describe('Verification Code', () => {
132
+ it('should generate numeric code', () => {
133
+ const code = generator.generateVerificationCode();
134
+
135
+ expect(code.code).toMatch(/^\d{6}$/);
136
+ });
137
+
138
+ it('should generate code of specified length', () => {
139
+ const code = generator.generateVerificationCode(8);
140
+
141
+ expect(code.code).toMatch(/^\d{8}$/);
142
+ });
143
+
144
+ it('should set expiration', () => {
145
+ const code = generator.generateVerificationCode(6, 10);
146
+
147
+ const expectedExpiration = Date.now() + 10 * 60 * 1000;
148
+ expect(Math.abs(code.expiresAt.getTime() - expectedExpiration)).toBeLessThan(100);
149
+ });
150
+
151
+ it('should track attempts', () => {
152
+ const code = generator.generateVerificationCode(6, 10, 3);
153
+
154
+ expect(code.attempts).toBe(0);
155
+ expect(code.maxAttempts).toBe(3);
156
+ });
157
+ });
158
+
159
+ describe('Signed Token', () => {
160
+ it('should generate signed token', () => {
161
+ const signed = generator.generateSignedToken({ userId: '123' });
162
+
163
+ expect(signed.token).toBeDefined();
164
+ expect(signed.signature).toBeDefined();
165
+ expect(signed.combined).toBe(`${signed.token}.${signed.signature}`);
166
+ });
167
+
168
+ it('should require HMAC secret', () => {
169
+ const noSecretGenerator = new TokenGenerator();
170
+
171
+ expect(() => noSecretGenerator.generateSignedToken({ userId: '123' }))
172
+ .toThrow(TokenGeneratorError);
173
+ });
174
+
175
+ it('should verify valid signed token', () => {
176
+ const signed = generator.generateSignedToken({ userId: '123' });
177
+ const payload = generator.verifySignedToken(signed.combined);
178
+
179
+ expect(payload).not.toBeNull();
180
+ expect((payload as any).userId).toBe('123');
181
+ });
182
+
183
+ it('should reject tampered token', () => {
184
+ const signed = generator.generateSignedToken({ userId: '123' });
185
+
186
+ // Tamper with the token
187
+ const tampered = 'tampered' + signed.combined.slice(8);
188
+ const payload = generator.verifySignedToken(tampered);
189
+
190
+ expect(payload).toBeNull();
191
+ });
192
+
193
+ it('should reject tampered signature', () => {
194
+ const signed = generator.generateSignedToken({ userId: '123' });
195
+
196
+ // Tamper with signature
197
+ const parts = signed.combined.split('.');
198
+ const tampered = `${parts[0]}.tampered${parts[1].slice(8)}`;
199
+ const payload = generator.verifySignedToken(tampered);
200
+
201
+ expect(payload).toBeNull();
202
+ });
203
+
204
+ it('should reject expired signed token', async () => {
205
+ const signed = generator.generateSignedToken({ userId: '123' }, 1); // 1 second
206
+
207
+ // Wait for expiration
208
+ await new Promise(resolve => setTimeout(resolve, 1100));
209
+
210
+ const payload = generator.verifySignedToken(signed.combined);
211
+ expect(payload).toBeNull();
212
+ });
213
+
214
+ it('should reject malformed token', () => {
215
+ expect(generator.verifySignedToken('not.a.valid.token')).toBeNull();
216
+ expect(generator.verifySignedToken('invalid')).toBeNull();
217
+ expect(generator.verifySignedToken('')).toBeNull();
218
+ });
219
+ });
220
+
221
+ describe('Token Pair', () => {
222
+ it('should generate access and refresh tokens', () => {
223
+ const pair = generator.generateTokenPair();
224
+
225
+ expect(pair.accessToken.value).toBeDefined();
226
+ expect(pair.refreshToken.value).toBeDefined();
227
+ });
228
+
229
+ it('should set different expirations', () => {
230
+ const pair = generator.generateTokenPair();
231
+
232
+ // Access token: 15 minutes
233
+ const accessExpiration = Date.now() + 900 * 1000;
234
+ expect(Math.abs(pair.accessToken.expiresAt.getTime() - accessExpiration)).toBeLessThan(100);
235
+
236
+ // Refresh token: 7 days
237
+ const refreshExpiration = Date.now() + 604800 * 1000;
238
+ expect(Math.abs(pair.refreshToken.expiresAt.getTime() - refreshExpiration)).toBeLessThan(100);
239
+ });
240
+ });
241
+
242
+ describe('Specialized Tokens', () => {
243
+ it('should generate password reset token', () => {
244
+ const token = generator.generatePasswordResetToken();
245
+
246
+ expect(token.value).toBeDefined();
247
+ // 30 minutes
248
+ const expectedExpiration = Date.now() + 1800 * 1000;
249
+ expect(Math.abs(token.expiresAt.getTime() - expectedExpiration)).toBeLessThan(100);
250
+ });
251
+
252
+ it('should generate email verification token', () => {
253
+ const token = generator.generateEmailVerificationToken();
254
+
255
+ expect(token.value).toBeDefined();
256
+ // 24 hours
257
+ const expectedExpiration = Date.now() + 86400 * 1000;
258
+ expect(Math.abs(token.expiresAt.getTime() - expectedExpiration)).toBeLessThan(100);
259
+ });
260
+
261
+ it('should generate request ID', () => {
262
+ const requestId = generator.generateRequestId();
263
+
264
+ expect(requestId).toBeDefined();
265
+ expect(requestId.length).toBeLessThan(20); // Shorter for logging
266
+ });
267
+
268
+ it('should generate correlation ID', () => {
269
+ const correlationId = generator.generateCorrelationId();
270
+
271
+ expect(correlationId).toBeDefined();
272
+ expect(correlationId).toContain('-'); // timestamp-random format
273
+ });
274
+ });
275
+
276
+ describe('Token Expiration Check', () => {
277
+ it('should detect expired token', async () => {
278
+ const token = generator.generateWithExpiration(1); // 1 second
279
+
280
+ expect(generator.isExpired(token)).toBe(false);
281
+
282
+ await new Promise(resolve => setTimeout(resolve, 1100));
283
+
284
+ expect(generator.isExpired(token)).toBe(true);
285
+ });
286
+
287
+ it('should detect valid token', () => {
288
+ const token = generator.generateWithExpiration(3600);
289
+ expect(generator.isExpired(token)).toBe(false);
290
+ });
291
+ });
292
+
293
+ describe('Token Comparison', () => {
294
+ it('should compare equal tokens', () => {
295
+ const token = generator.generate();
296
+ expect(generator.compare(token, token)).toBe(true);
297
+ });
298
+
299
+ it('should reject different tokens', () => {
300
+ const token1 = generator.generate();
301
+ const token2 = generator.generate();
302
+ expect(generator.compare(token1, token2)).toBe(false);
303
+ });
304
+
305
+ it('should reject different length tokens', () => {
306
+ expect(generator.compare('short', 'longer-token')).toBe(false);
307
+ });
308
+
309
+ it('should use timing-safe comparison', () => {
310
+ // This test verifies the comparison takes consistent time
311
+ // regardless of where the mismatch occurs
312
+ const token = generator.generate();
313
+ const mismatchEarly = 'X' + token.slice(1);
314
+ const mismatchLate = token.slice(0, -1) + 'X';
315
+
316
+ // Both comparisons should work (timing consistency is internal)
317
+ expect(generator.compare(token, mismatchEarly)).toBe(false);
318
+ expect(generator.compare(token, mismatchLate)).toBe(false);
319
+ });
320
+ });
321
+
322
+ describe('Factory Functions', () => {
323
+ it('should create generator with factory', () => {
324
+ const gen = createTokenGenerator('secret');
325
+ expect(gen).toBeInstanceOf(TokenGenerator);
326
+ });
327
+
328
+ it('should get default generator singleton', () => {
329
+ const gen1 = getDefaultGenerator();
330
+ const gen2 = getDefaultGenerator();
331
+ expect(gen1).toBe(gen2);
332
+ });
333
+ });
334
+
335
+ describe('Quick Generate Functions', () => {
336
+ it('should generate token', () => {
337
+ const token = quickGenerate.token();
338
+ expect(token).toBeDefined();
339
+ });
340
+
341
+ it('should generate session token', () => {
342
+ const token = quickGenerate.sessionToken();
343
+ expect(token.value).toBeDefined();
344
+ });
345
+
346
+ it('should generate CSRF token', () => {
347
+ const token = quickGenerate.csrfToken();
348
+ expect(token.value).toBeDefined();
349
+ });
350
+
351
+ it('should generate API token', () => {
352
+ const token = quickGenerate.apiToken('cf_');
353
+ expect(token.value.startsWith('cf_')).toBe(true);
354
+ });
355
+
356
+ it('should generate verification code', () => {
357
+ const code = quickGenerate.verificationCode();
358
+ expect(code.code).toMatch(/^\d{6}$/);
359
+ });
360
+
361
+ it('should generate request ID', () => {
362
+ const id = quickGenerate.requestId();
363
+ expect(id).toBeDefined();
364
+ });
365
+
366
+ it('should generate correlation ID', () => {
367
+ const id = quickGenerate.correlationId();
368
+ expect(id).toBeDefined();
369
+ });
370
+ });
371
+ });