2014-10-07 14:32:23 -04:00
|
|
|
'use strict';
|
|
|
|
|
2014-11-25 12:19:40 -05:00
|
|
|
var Auth = require('../../../../src/js/service/auth'),
|
|
|
|
LoginExistingCtrl = require('../../../../src/js/controller/login/login-existing'),
|
|
|
|
EmailDAO = require('../../../../src/js/email/email'),
|
|
|
|
KeychainDAO = require('../../../../src/js/service/keychain');
|
2014-10-07 14:32:23 -04:00
|
|
|
|
|
|
|
describe('Login (existing user) Controller unit test', function() {
|
2014-11-25 12:19:40 -05:00
|
|
|
var scope, location, ctrl, emailDaoMock, authMock,
|
2014-10-07 14:32:23 -04:00
|
|
|
emailAddress = 'fred@foo.com',
|
|
|
|
passphrase = 'asd',
|
|
|
|
keychainMock;
|
|
|
|
|
|
|
|
beforeEach(function() {
|
2014-11-25 12:19:40 -05:00
|
|
|
emailDaoMock = sinon.createStubInstance(EmailDAO);
|
|
|
|
authMock = sinon.createStubInstance(Auth);
|
2014-10-07 14:32:23 -04:00
|
|
|
keychainMock = sinon.createStubInstance(KeychainDAO);
|
|
|
|
|
2014-11-25 12:19:40 -05:00
|
|
|
authMock.emailAddress = emailAddress;
|
2014-10-07 14:32:23 -04:00
|
|
|
|
2014-11-25 12:19:40 -05:00
|
|
|
angular.module('loginexistingtest', ['woServices']);
|
|
|
|
angular.mock.module('loginexistingtest');
|
|
|
|
angular.mock.inject(function($rootScope, $controller, $location) {
|
2014-10-07 14:32:23 -04:00
|
|
|
location = $location;
|
|
|
|
scope = $rootScope.$new();
|
|
|
|
scope.state = {};
|
2014-11-12 10:12:26 -05:00
|
|
|
scope.form = {};
|
2014-10-07 14:32:23 -04:00
|
|
|
ctrl = $controller(LoginExistingCtrl, {
|
|
|
|
$scope: scope,
|
2014-11-25 12:19:40 -05:00
|
|
|
$routeParams: {},
|
|
|
|
email: emailDaoMock,
|
|
|
|
auth: authMock,
|
|
|
|
keychain: keychainMock
|
2013-11-11 11:56:51 -05:00
|
|
|
});
|
|
|
|
});
|
2014-10-07 14:32:23 -04:00
|
|
|
});
|
|
|
|
|
2014-11-25 12:19:40 -05:00
|
|
|
afterEach(function() {});
|
2013-11-11 11:56:51 -05:00
|
|
|
|
2014-10-07 14:32:23 -04:00
|
|
|
describe('initial state', function() {
|
|
|
|
it('should be well defined', function() {
|
2014-11-12 10:12:26 -05:00
|
|
|
expect(scope.incorrect).to.be.undefined;
|
2013-11-11 11:56:51 -05:00
|
|
|
});
|
2014-10-07 14:32:23 -04:00
|
|
|
});
|
2013-11-11 11:56:51 -05:00
|
|
|
|
2014-11-12 10:12:26 -05:00
|
|
|
describe('confirm passphrase', function() {
|
|
|
|
it('should unlock crypto and start', function() {
|
|
|
|
var keypair = {},
|
|
|
|
pathSpy = sinon.spy(location, 'path');
|
|
|
|
scope.passphrase = passphrase;
|
|
|
|
keychainMock.getUserKeyPair.withArgs(emailAddress).yields(null, keypair);
|
|
|
|
emailDaoMock.unlock.withArgs({
|
|
|
|
keypair: keypair,
|
|
|
|
passphrase: passphrase
|
|
|
|
}).yields();
|
|
|
|
authMock.storeCredentials.yields();
|
|
|
|
|
|
|
|
scope.confirmPassphrase();
|
|
|
|
|
|
|
|
expect(keychainMock.getUserKeyPair.calledOnce).to.be.true;
|
|
|
|
expect(emailDaoMock.unlock.calledOnce).to.be.true;
|
|
|
|
expect(pathSpy.calledOnce).to.be.true;
|
2014-12-04 10:24:42 -05:00
|
|
|
expect(pathSpy.calledWith('/account')).to.be.true;
|
2013-11-11 11:56:51 -05:00
|
|
|
});
|
|
|
|
|
2014-11-12 10:12:26 -05:00
|
|
|
it('should not work when keypair unavailable', function() {
|
|
|
|
scope.passphrase = passphrase;
|
|
|
|
keychainMock.getUserKeyPair.withArgs(emailAddress).yields(new Error('asd'));
|
2014-10-07 14:32:23 -04:00
|
|
|
|
2014-11-12 10:12:26 -05:00
|
|
|
scope.confirmPassphrase();
|
|
|
|
expect(scope.errMsg).to.exist;
|
|
|
|
expect(keychainMock.getUserKeyPair.calledOnce).to.be.true;
|
2013-11-11 11:56:51 -05:00
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|