Files
pn-new-crm/tests/unit/security-sensitive-data.test.ts

150 lines
5.5 KiB
TypeScript
Raw Normal View History

/**
* Security: Sensitive Data Masking
*
* Verifies the maskSensitiveFields() function from @/lib/audit correctly
* redacts PII and secrets from audit log payloads.
*
* Sensitive fields per SECURITY-GUIDELINES.md §5.2:
* email, phone, password, credentials_enc, token
*
* Masking format:
* - len > 4 first 2 chars + "***" + last 2 chars (e.g. "al***om")
* - len 4 "***"
*/
import { describe, expect, it } from 'vitest';
import { maskSensitiveFields } from '@/lib/audit';
// ─────────────────────────────────────────────────────────────────────────────
describe('Sensitive data masking — field detection', () => {
it('masks "email" field', () => {
const result = maskSensitiveFields({ email: 'user@example.com' });
expect(result?.email).not.toBe('user@example.com');
expect(result?.email).toContain('***');
});
it('masks "phone" field', () => {
const result = maskSensitiveFields({ phone: '+61400000000' });
expect(result?.phone).not.toBe('+61400000000');
expect(result?.phone).toContain('***');
});
it('masks "password" field', () => {
const result = maskSensitiveFields({ password: 'MySecretPassword123' });
expect(result?.password).not.toBe('MySecretPassword123');
expect(result?.password).toContain('***');
});
it('masks "credentials_enc" field', () => {
const result = maskSensitiveFields({ credentials_enc: 'encrypted-secret-data' });
expect(result?.credentials_enc).not.toBe('encrypted-secret-data');
expect(result?.credentials_enc).toContain('***');
});
it('masks "token" field', () => {
const result = maskSensitiveFields({ token: 'eyJhbGciOiJIUzI1NiJ9.test' });
expect(result?.token).not.toBe('eyJhbGciOiJIUzI1NiJ9.test');
expect(result?.token).toContain('***');
});
});
describe('Sensitive data masking — masking format', () => {
it('long email (len > 4) uses partial mask: first 2 + *** + last 2', () => {
// 'user@example.com' → 'us***om'
const result = maskSensitiveFields({ email: 'user@example.com' });
expect(result?.email).toBe('us***om');
});
it('short sensitive value (len ≤ 4) is fully replaced with ***', () => {
const result = maskSensitiveFields({ email: 'ab' });
expect(result?.email).toBe('***');
});
it('exactly 4-char sensitive value is fully masked', () => {
const result = maskSensitiveFields({ email: 'abcd' });
expect(result?.email).toBe('***');
});
it('5-char sensitive value uses partial mask', () => {
// 'abcde' → 'ab***de'
const result = maskSensitiveFields({ password: 'abcde' });
expect(result?.password).toBe('ab***de');
});
it('single char sensitive value becomes ***', () => {
const result = maskSensitiveFields({ token: 'x' });
expect(result?.token).toBe('***');
});
it('partial mask exposes only 2 leading and 2 trailing characters', () => {
const result = maskSensitiveFields({ password: 'SuperSecret2025!' });
const masked = result?.password as string;
// 'SuperSecret2025!' → first 2 = 'Su', last 2 = '5!', mask = 'Su***5!'
expect(masked).toMatch(/^Su\*{3}5!$/);
});
});
describe('Sensitive data masking — non-sensitive fields', () => {
it('preserves string non-sensitive fields unchanged', () => {
const result = maskSensitiveFields({ name: 'John Smith', status: 'active' });
expect(result?.name).toBe('John Smith');
expect(result?.status).toBe('active');
});
it('preserves numeric non-sensitive fields unchanged', () => {
const result = maskSensitiveFields({ count: 42, score: 9.5 });
expect(result?.count).toBe(42);
expect(result?.score).toBe(9.5);
});
it('preserves boolean non-sensitive fields unchanged', () => {
const result = maskSensitiveFields({ isProxy: true, isActive: false });
expect(result?.isProxy).toBe(true);
expect(result?.isActive).toBe(false);
});
it('preserves null non-sensitive fields unchanged', () => {
const result = maskSensitiveFields({ companyName: null });
expect(result?.companyName).toBeNull();
});
it('mixed record: masks sensitive, preserves non-sensitive', () => {
const result = maskSensitiveFields({
name: 'John',
email: 'john@example.com',
status: 'active',
password: 'hunter2',
});
expect(result?.name).toBe('John');
expect(result?.status).toBe('active');
expect(result?.email).toContain('***');
expect(result?.password).toContain('***');
});
});
describe('Sensitive data masking — edge cases', () => {
it('returns undefined for undefined input', () => {
expect(maskSensitiveFields(undefined)).toBeUndefined();
});
it('returns empty object for empty object input', () => {
const result = maskSensitiveFields({});
expect(result).toEqual({});
});
it('does not mutate the original object', () => {
const original = { email: 'alice@example.com', name: 'Alice' };
const originalEmail = original.email;
maskSensitiveFields(original);
expect(original.email).toBe(originalEmail);
});
it('only masks string values — non-string sensitive fields are left as-is', () => {
// e.g. if someone stores a number in an "email" field (type error upstream),
// the masking logic gracefully skips it (typeof check)
const result = maskSensitiveFields({ email: 12345 as unknown as string });
// The implementation only masks if typeof === 'string', so a number stays
expect(result?.email).toBe(12345);
});
});