/** * Copyright (c) 2015 Lukas Reschke * * This file is licensed under the Affero General Public License version 3 * or later. * * See the COPYING-README file. * */ describe('OC.SetupChecks tests', function() { var suite = this; var protocolStub; beforeEach( function(){ protocolStub = sinon.stub(OC, 'getProtocol'); suite.server = sinon.fakeServer.create(); }); afterEach( function(){ suite.server.restore(); protocolStub.restore(); }); describe('checkWebDAV', function() { it('should fail with another response status code than 201 or 207', function(done) { var async = OC.SetupChecks.checkWebDAV(); suite.server.requests[0].respond(200); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'Your web server is not yet properly set up to allow file synchronization, because the WebDAV interface seems to be broken.', type: OC.SetupChecks.MESSAGE_TYPE_ERROR }]); done(); }); }); it('should return no error with a response status code of 207', function(done) { var async = OC.SetupChecks.checkWebDAV(); suite.server.requests[0].respond(207); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no error with a response status code of 401', function(done) { var async = OC.SetupChecks.checkWebDAV(); suite.server.requests[0].respond(401); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); }); describe('checkWellKnownUrl', function() { it('should fail with another response status code than the expected one', function(done) { var async = OC.SetupChecks.checkWellKnownUrl('PROPFIND', '/.well-known/caldav', 'http://example.org/PLACEHOLDER', true, 207); suite.server.requests[0].respond(200); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'Your web server is not properly set up to resolve "/.well-known/caldav". Further information can be found in the documentation ↗.', type: OC.SetupChecks.MESSAGE_TYPE_INFO }]); done(); }); }); it('should return no error with the expected response status code', function(done) { var async = OC.SetupChecks.checkWellKnownUrl('PROPFIND', '/.well-known/caldav', 'http://example.org/PLACEHOLDER', true, 207); suite.server.requests[0].respond(207); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no error with the default expected response status code', function(done) { var async = OC.SetupChecks.checkWellKnownUrl('PROPFIND', '/.well-known/caldav', 'http://example.org/PLACEHOLDER', true); suite.server.requests[0].respond(207); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no error when no check should be run', function(done) { var async = OC.SetupChecks.checkWellKnownUrl('PROPFIND', '/.well-known/caldav', 'http://example.org/PLACEHOLDER', false); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); }); describe('checkProviderUrl', function() { it('should fail with another response status code than the expected one', function(done) { var async = OC.SetupChecks.checkProviderUrl('/ocm-provider/', 'http://example.org/PLACEHOLDER', true); suite.server.requests[0].respond(302); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'Your web server is not properly set up to resolve "/ocm-provider/". This is most likely related to a web server configuration that was not updated to deliver this folder directly. Please compare your configuration against the shipped rewrite rules in ".htaccess" for Apache or the provided one in the documentation for Nginx at it\'s documentation page ↗. On Nginx those are typically the lines starting with "location ~" that need an update.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }]); done(); }); }); it('should return no error with the expected response status code', function(done) { var async = OC.SetupChecks.checkProviderUrl('/ocm-provider/', 'http://example.org/PLACEHOLDER', true); suite.server.requests[0].respond(200); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no error when no check should be run', function(done) { var async = OC.SetupChecks.checkProviderUrl('/ocm-provider/', 'http://example.org/PLACEHOLDER', false); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); }); describe('checkWOFF2Loading', function() { it('should fail with another response status code than the expected one', function(done) { var async = OC.SetupChecks.checkWOFF2Loading(OC.filePath('core', '', 'fonts/NotoSans-Regular-latin.woff2'), 'http://example.org/PLACEHOLDER'); suite.server.requests[0].respond(302); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'Your web server is not properly set up to deliver .woff2 files. This is typically an issue with the Nginx configuration. For Nextcloud 15 it needs an adjustement to also deliver .woff2 files. Compare your Nginx configuration to the recommended configuration in our documentation ↗.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }]); done(); }); }); it('should return no error with the expected response status code', function(done) { var async = OC.SetupChecks.checkWOFF2Loading(OC.filePath('core', '', 'fonts/NotoSans-Regular-latin.woff2'), 'http://example.org/PLACEHOLDER'); suite.server.requests[0].respond(200); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); }); describe('checkDataProtected', function() { oc_dataURL = "data"; it('should return an error if data directory is not protected', function(done) { var async = OC.SetupChecks.checkDataProtected(); suite.server.requests[0].respond(200, {'Content-Type': 'text/plain'}, ''); async.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'Your data directory and files are probably accessible from the internet. The .htaccess file is not working. It is strongly recommended that you configure your web server so that the data directory is no longer accessible, or move the data directory outside the web server document root.', type: OC.SetupChecks.MESSAGE_TYPE_ERROR }]); done(); }); }); it('should not return an error if data directory is protected', function(done) { var async = OC.SetupChecks.checkDataProtected(); suite.server.requests[0].respond(403); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return an error if data directory is a boolean', function(done) { oc_dataURL = false; var async = OC.SetupChecks.checkDataProtected(); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); }); describe('checkSetup', function() { it('should return an error if server has no internet connection', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json' }, JSON.stringify({ reverseProxyGeneratedURL: 'https://server', generic: { network: { "Internet connectivity": { severity: "warning", description: 'This server has no working internet connection: Multiple endpoints could not be reached. This means that some of the features like mounting external storage, notifications about updates or installation of third-party apps will not work. Accessing files remotely and sending of notification emails might not work, either. Establish a connection from this server to the internet to enjoy all features.', linkToDoc: null } }, }, }) ); async.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'This server has no working internet connection: Multiple endpoints could not be reached. This means that some of the features like mounting external storage, notifications about updates or installation of third-party apps will not work. Accessing files remotely and sending of notification emails might not work, either. Establish a connection from this server to the internet to enjoy all features.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, ]); done(); }); }); it('should return an error if server has no internet connection and data directory is not protected', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json' }, JSON.stringify({ reverseProxyGeneratedURL: 'https://server', generic: { network: { "Internet connectivity": { severity: "warning", description: 'This server has no working internet connection: Multiple endpoints could not be reached. This means that some of the features like mounting external storage, notifications about updates or installation of third-party apps will not work. Accessing files remotely and sending of notification emails might not work, either. Establish a connection from this server to the internet to enjoy all features.', linkToDoc: null } }, }, }) ); async.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'This server has no working internet connection: Multiple endpoints could not be reached. This means that some of the features like mounting external storage, notifications about updates or installation of third-party apps will not work. Accessing files remotely and sending of notification emails might not work, either. Establish a connection from this server to the internet to enjoy all features.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, ]); done(); }); }); it('should return an error if server has no internet connection and data directory is not protected and memcache is available', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json', }, JSON.stringify({ reverseProxyGeneratedURL: 'https://server', generic: { network: { "Internet connectivity": { severity: "warning", description: 'This server has no working internet connection: Multiple endpoints could not be reached. This means that some of the features like mounting external storage, notifications about updates or installation of third-party apps will not work. Accessing files remotely and sending of notification emails might not work, either. Establish a connection from this server to the internet to enjoy all features.', linkToDoc: null } }, }, }) ); async.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'This server has no working internet connection: Multiple endpoints could not be reached. This means that some of the features like mounting external storage, notifications about updates or installation of third-party apps will not work. Accessing files remotely and sending of notification emails might not work, either. Establish a connection from this server to the internet to enjoy all features.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING } ]); done(); }); }); it('should return a warning if the memory limit is below the recommended value', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json', }, JSON.stringify({ reverseProxyDocs: 'https://docs.nextcloud.com/foo/bar.html', reverseProxyGeneratedURL: 'https://server', generic: { network: { "Internet connectivity": { severity: "success", description: null, linkToDoc: null } }, php: { "Internet connectivity": { severity: "success", description: null, linkToDoc: null }, "PHP memory limit": { severity: "error", description: "The PHP memory limit is below the recommended value of 512MB.", linkToDoc: null }, }, }, }) ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'The PHP memory limit is below the recommended value of 512MB.', type: OC.SetupChecks.MESSAGE_TYPE_ERROR }]); done(); }); }); it('should return an error if the response has no statuscode 200', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 500, { 'Content-Type': 'application/json' }, JSON.stringify({data: {serverHasInternetConnectionProblems: true}}) ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'Error occurred while checking server setup', type: OC.SetupChecks.MESSAGE_TYPE_ERROR }]); done(); }); }); it('should return an error if the php version is no longer supported', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json', }, JSON.stringify({ reverseProxyGeneratedURL: 'https://server', generic: { network: { "Internet connectivity": { severity: "success", description: null, linkToDoc: null } }, security: { "Checking for PHP version": { severity: "warning", description: "You are currently running PHP 8.0.30. PHP 8.0 is now deprecated in Nextcloud 27. Nextcloud 28 may require at least PHP 8.1. Please upgrade to one of the officially supported PHP versions provided by the PHP Group as soon as possible.", linkToDoc: "https://secure.php.net/supported-versions.php" } }, }, }) ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'You are currently running PHP 8.0.30. PHP 8.0 is now deprecated in Nextcloud 27. Nextcloud 28 may require at least PHP 8.1. Please upgrade to one of the officially supported PHP versions provided by the PHP Group as soon as possible. For more details see the documentation ↗.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }]); done(); }); }); // THe following test is invalid as the code in core/js/setupchecks.js is calling // window.location.protocol which always return http during tests // if there is a way to trick window.location.protocol during test, then we could re-activate it /* it('should return an error if the protocol is https but the server generates http links', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json', }, JSON.stringify({ reverseProxyDocs: 'https://docs.nextcloud.com/foo/bar.html', reverseProxyGeneratedURL: 'http://server', generic: { network: { "Internet connectivity": { severity: "success", description: null, linkToDoc: null } }, }, }) ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'You are accessing your instance over a secure connection, however your instance is generating insecure URLs. This most likely means that you are behind a reverse proxy and the overwrite config variables are not set correctly. Please read the documentation page about this ↗.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }]); done(); }); }); */ it('should not return an error if the protocol is http and the server generates http links', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json', }, JSON.stringify({ reverseProxyDocs: 'https://docs.nextcloud.com/foo/bar.html', reverseProxyGeneratedURL: 'http://server', generic: { network: { "Internet connectivity": { severity: "success", description: null, linkToDoc: null } }, }, }) ); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return an info if there is no default phone region', function(done) { var async = OC.SetupChecks.checkSetup(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json', }, JSON.stringify({ reverseProxyGeneratedURL: 'https://server', generic: { network: { "Internet connectivity": { severity: "success", description: null, linkToDoc: null } }, config: { "Checking for default phone region": { severity: "info", description: "Your installation has no default phone region set. This is required to validate phone numbers in the profile settings without a country code. To allow numbers without a country code, please add \"default_phone_region\" with the respective ISO 3166-1 code of the region to your config file.", linkToDoc: "https://en.wikipedia.org/wiki/ISO_3166-1_alpha-2#Officially_assigned_code_elements" }, }, }, }) ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'Your installation has no default phone region set. This is required to validate phone numbers in the profile settings without a country code. To allow numbers without a country code, please add "default_phone_region" with the respective ISO 3166-1 code of the region to your config file. For more details see the documentation ↗.', type: OC.SetupChecks.MESSAGE_TYPE_INFO }]); done(); }); }); }); describe('checkGeneric', function() { it('should return an error if the response has no statuscode 200', function(done) { var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond( 500, { 'Content-Type': 'application/json' } ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'Error occurred while checking server setup', type: OC.SetupChecks.MESSAGE_TYPE_ERROR },{ msg: 'Error occurred while checking server setup', type: OC.SetupChecks.MESSAGE_TYPE_ERROR }]); done(); }); }); it('should return all errors if all headers are missing', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond( 200, { 'Content-Type': 'application/json', 'Strict-Transport-Security': 'max-age=15768000' }, '{}' ); async.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'The "X-Content-Type-Options" HTTP header is not set to "nosniff". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { msg: 'The "X-Robots-Tag" HTTP header is not set to "noindex, nofollow". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { msg: 'The "X-Frame-Options" HTTP header is not set to "SAMEORIGIN". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { msg: 'The "X-Permitted-Cross-Domain-Policies" HTTP header is not set to "none". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { msg: 'The "Referrer-Policy" HTTP header is not set to "no-referrer", "no-referrer-when-downgrade", "strict-origin", "strict-origin-when-cross-origin" or "same-origin". This can leak referer information. See the W3C Recommendation ↗.', type: OC.SetupChecks.MESSAGE_TYPE_INFO } ]); done(); }); }); it('should return only some errors if just some headers are missing', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond( 200, { 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'Strict-Transport-Security': 'max-age=15768000;preload', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', } ); async.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'The "X-Content-Type-Options" HTTP header is not set to "nosniff". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }, { msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING, } ]); done(); }); }); it('should return none errors if all headers are there', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond( 200, { 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'Strict-Transport-Security': 'max-age=15768000', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer' } ); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); describe('check X-Robots-Tag header', function() { it('should return no message if X-Robots-Tag is set to noindex,nofollow without space', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex,nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); result.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return a message if X-Robots-Tag is set to none', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'none', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); result.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'The "X-Robots-Tag" HTTP header is not set to "noindex, nofollow". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING } ]); done(); }); }); }); describe('check X-XSS-Protection header', function() { it('should return no message if X-XSS-Protection is set to 1; mode=block; report=https://example.com', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block; report=https://example.com', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); result.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no message if X-XSS-Protection is set to 1; mode=block', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); result.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return a message if X-XSS-Protection is set to 1', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); result.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING } ]); done(); }); }); it('should return a message if X-XSS-Protection is set to 0', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '0', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); result.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'The "X-XSS-Protection" HTTP header does not contain "1; mode=block". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING } ]); done(); }); }); }); describe('check Referrer-Policy header', function() { it('should return no message if Referrer-Policy is set to no-referrer', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); result.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no message if Referrer-Policy is set to no-referrer-when-downgrade', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer-when-downgrade', }); result.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no message if Referrer-Policy is set to strict-origin', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'strict-origin', }); result.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no message if Referrer-Policy is set to strict-origin-when-cross-origin', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'strict-origin-when-cross-origin', }); result.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no message if Referrer-Policy is set to same-origin', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'same-origin', }); result.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return a message if Referrer-Policy is set to origin', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'origin', }); result.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'The "Referrer-Policy" HTTP header is not set to "no-referrer", "no-referrer-when-downgrade", "strict-origin", "strict-origin-when-cross-origin" or "same-origin". This can leak referer information. See the W3C Recommendation ↗.', type: OC.SetupChecks.MESSAGE_TYPE_INFO } ]); done(); }); }); it('should return a message if Referrer-Policy is set to origin-when-cross-origin', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'origin-when-cross-origin', }); result.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'The "Referrer-Policy" HTTP header is not set to "no-referrer", "no-referrer-when-downgrade", "strict-origin", "strict-origin-when-cross-origin" or "same-origin". This can leak referer information. See the W3C Recommendation ↗.', type: OC.SetupChecks.MESSAGE_TYPE_INFO } ]); done(); }); }); it('should return a message if Referrer-Policy is set to unsafe-url', function(done) { protocolStub.returns('https'); var result = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'unsafe-url', }); result.done(function( data, s, x ){ expect(data).toEqual([ { msg: 'The "Referrer-Policy" HTTP header is not set to "no-referrer", "no-referrer-when-downgrade", "strict-origin", "strict-origin-when-cross-origin" or "same-origin". This can leak referer information. See the W3C Recommendation ↗.', type: OC.SetupChecks.MESSAGE_TYPE_INFO } ]); done(); }); }); }); }); it('should return an error if the response has no statuscode 200', function(done) { var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond( 500, { 'Content-Type': 'application/json' }, JSON.stringify({data: {serverHasInternetConnectionProblems: true}}) ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'Error occurred while checking server setup', type: OC.SetupChecks.MESSAGE_TYPE_ERROR }, { msg: 'Error occurred while checking server setup', type: OC.SetupChecks.MESSAGE_TYPE_ERROR }]); done(); }); }); it('should return a SSL warning if SSL used without Strict-Transport-Security-Header', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', } ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'The "Strict-Transport-Security" HTTP header is not set to at least "15552000" seconds. For enhanced security, it is recommended to enable HSTS as described in the security tips ↗.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }]); done(); }); }); it('should return a SSL warning if SSL used with to small Strict-Transport-Security-Header', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15551999', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', } ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'The "Strict-Transport-Security" HTTP header is not set to at least "15552000" seconds. For enhanced security, it is recommended to enable HSTS as described in the security tips ↗.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }]); done(); }); }); it('should return a SSL warning if SSL used with to a bogus Strict-Transport-Security-Header', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'iAmABogusHeader342', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', } ); async.done(function( data, s, x ){ expect(data).toEqual([{ msg: 'The "Strict-Transport-Security" HTTP header is not set to at least "15552000" seconds. For enhanced security, it is recommended to enable HSTS as described in the security tips ↗.', type: OC.SetupChecks.MESSAGE_TYPE_WARNING }]); done(); }); }); it('should return no SSL warning if SSL used with to exact the minimum Strict-Transport-Security-Header', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=15768000', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no SSL warning if SSL used with to more than the minimum Strict-Transport-Security-Header', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=99999999', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no SSL warning if SSL used with to more than the minimum Strict-Transport-Security-Header and includeSubDomains parameter', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=99999999; includeSubDomains', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); it('should return no SSL warning if SSL used with to more than the minimum Strict-Transport-Security-Header and includeSubDomains and preload parameter', function(done) { protocolStub.returns('https'); var async = OC.SetupChecks.checkGeneric(); suite.server.requests[0].respond(200, { 'Strict-Transport-Security': 'max-age=99999999; preload; includeSubDomains', 'X-XSS-Protection': '1; mode=block', 'X-Content-Type-Options': 'nosniff', 'X-Robots-Tag': 'noindex, nofollow', 'X-Frame-Options': 'SAMEORIGIN', 'X-Permitted-Cross-Domain-Policies': 'none', 'Referrer-Policy': 'no-referrer', }); async.done(function( data, s, x ){ expect(data).toEqual([]); done(); }); }); });