define(function(require) { 'use strict'; var EmailDAO = require('js/dao/email-dao'), KeychainDAO = require('js/dao/keychain-dao'), ImapClient = require('imap-client'), PgpMailer = require('pgpmailer'), PgpBuilder = require('pgpbuilder'), PGP = require('js/crypto/pgp'), DeviceStorageDAO = require('js/dao/devicestorage-dao'), mailreader = require('mailreader'), appcfg = require('js/app-config'), str = appcfg.string, cfg = appcfg.config, expect = chai.expect; describe('Email DAO unit tests', function() { // show the stack trace when an error occurred chai.Assertion.includeStack = true; // SUT var dao; // mocks var keychainStub, imapClientStub, pgpMailerStub, pgpBuilderStub, pgpStub, devicestorageStub, parseStub; // config var emailAddress, passphrase, asymKeySize, account; // test data var folders, inboxFolder, sentFolder, draftsFolder, outboxFolder, trashFolder, mockKeyPair; beforeEach(function() { // // test data // emailAddress = 'asdf@asdf.com'; passphrase = 'asdf'; asymKeySize = 2048; inboxFolder = { type: 'Inbox', path: 'INBOX', messages: [] }; sentFolder = { type: 'Sent', path: 'SENT', messages: [] }; draftsFolder = { type: 'Drafts', path: 'DRAFTS', messages: [] }; outboxFolder = { type: 'Outbox', path: 'OUTBOX', messages: [] }; trashFolder = { type: 'Trash', path: 'TRASH', messages: [] }; folders = [inboxFolder, outboxFolder, trashFolder]; account = { emailAddress: emailAddress, asymKeySize: asymKeySize, folders: folders, online: true }; mockKeyPair = { publicKey: { _id: 1234, userId: emailAddress, publicKey: 'publicpublicpublicpublic' }, privateKey: { _id: 1234, userId: emailAddress, encryptedKey: 'privateprivateprivateprivate' } }; // // setup the mocks // keychainStub = sinon.createStubInstance(KeychainDAO); imapClientStub = sinon.createStubInstance(ImapClient); pgpMailerStub = sinon.createStubInstance(PgpMailer); pgpBuilderStub = sinon.createStubInstance(PgpBuilder); pgpStub = sinon.createStubInstance(PGP); parseStub = sinon.stub(mailreader, 'parse'); devicestorageStub = sinon.createStubInstance(DeviceStorageDAO); // // setup the SUT // dao = new EmailDAO(keychainStub, pgpStub, devicestorageStub, pgpBuilderStub, mailreader); dao._account = account; dao._pgpMailer = pgpMailerStub; dao._imapClient = imapClientStub; // // check configuration // expect(dao._keychain).to.equal(keychainStub); expect(dao._pgp).to.equal(pgpStub); expect(dao._devicestorage).to.equal(devicestorageStub); expect(dao._mailreader).to.equal(mailreader); expect(dao._pgpbuilder).to.equal(pgpBuilderStub); }); afterEach(function() { mailreader.parse.restore(); }); describe('public API', function() { describe('#init', function() { var initFoldersStub; beforeEach(function() { delete dao._account; initFoldersStub = sinon.stub(dao, '_initFoldersFromDisk'); }); it('should initialize folders and return keypair', function(done) { keychainStub.getUserKeyPair.withArgs(emailAddress).yieldsAsync(null, mockKeyPair); initFoldersStub.yieldsAsync(); dao.init({ account: account }, function(err, keypair) { expect(err).to.not.exist; expect(keypair).to.exist; expect(keychainStub.getUserKeyPair.calledOnce).to.be.true; expect(initFoldersStub.calledOnce).to.be.true; done(); }); }); it('should fail when keychain errors', function(done) { keychainStub.getUserKeyPair.yieldsAsync({}); dao.init({ account: account }, function(err, keypair) { expect(err).to.exist; expect(keypair).to.not.exist; expect(keychainStub.getUserKeyPair.calledOnce).to.be.true; expect(initFoldersStub.called).to.be.false; done(); }); }); }); describe('#unlock', function() { it('should unlock', function(done) { pgpStub.getKeyParams.returns({ _id: mockKeyPair.publicKey._id, userId: emailAddress, userIds: [{ emailAddress: emailAddress }] }); pgpStub.importKeys.withArgs({ passphrase: passphrase, privateKeyArmored: mockKeyPair.privateKey.encryptedKey, publicKeyArmored: mockKeyPair.publicKey.publicKey }).yieldsAsync(); pgpStub._privateKey = { foo: 'bar' }; dao.unlock({ passphrase: passphrase, keypair: mockKeyPair }, function(err) { expect(err).to.not.exist; expect(pgpStub.importKeys.calledOnce).to.be.true; expect(dao._pgpbuilder._privateKey).to.equal(pgpStub._privateKey); done(); }); }); it('should generate a keypair and unlock', function(done) { var keypair = { keyId: 123, publicKeyArmored: mockKeyPair.publicKey.publicKey, privateKeyArmored: mockKeyPair.privateKey.encryptedKey }; pgpStub.generateKeys.withArgs({ emailAddress: emailAddress, keySize: asymKeySize, passphrase: passphrase }).yieldsAsync(null, keypair); pgpStub.importKeys.withArgs({ passphrase: passphrase, privateKeyArmored: mockKeyPair.privateKey.encryptedKey, publicKeyArmored: mockKeyPair.publicKey.publicKey }).yieldsAsync(); keychainStub.putUserKeyPair.withArgs().yieldsAsync(); dao.unlock({ passphrase: passphrase }, function(err) { expect(err).to.not.exist; expect(pgpStub.generateKeys.calledOnce).to.be.true; expect(pgpStub.importKeys.calledOnce).to.be.true; expect(keychainStub.putUserKeyPair.calledOnce).to.be.true; done(); }); }); it('should fail when persisting fails', function(done) { var keypair = { keyId: 123, publicKeyArmored: 'qwerty', privateKeyArmored: 'asdfgh' }; pgpStub.generateKeys.yieldsAsync(null, keypair); pgpStub.importKeys.withArgs().yieldsAsync(); keychainStub.putUserKeyPair.yieldsAsync({}); dao.unlock({ passphrase: passphrase }, function(err) { expect(err).to.exist; expect(pgpStub.generateKeys.calledOnce).to.be.true; expect(pgpStub.importKeys.calledOnce).to.be.true; expect(keychainStub.putUserKeyPair.calledOnce).to.be.true; done(); }); }); it('should fail when import fails', function(done) { var keypair = { keyId: 123, publicKeyArmored: 'qwerty', privateKeyArmored: 'asdfgh' }; pgpStub.generateKeys.withArgs().yieldsAsync(null, keypair); pgpStub.importKeys.withArgs().yieldsAsync({}); dao.unlock({ passphrase: passphrase }, function(err) { expect(err).to.exist; expect(pgpStub.generateKeys.calledOnce).to.be.true; expect(pgpStub.importKeys.calledOnce).to.be.true; done(); }); }); it('should fail when generation fails', function(done) { pgpStub.generateKeys.yieldsAsync({}); dao.unlock({ passphrase: passphrase }, function(err) { expect(err).to.exist; expect(pgpStub.generateKeys.calledOnce).to.be.true; done(); }); }); }); describe('#openFolder', function() { it('should open an imap mailbox', function(done) { imapClientStub.selectMailbox.withArgs({ path: inboxFolder.path }).yieldsAsync(); dao.openFolder({ folder: inboxFolder }, function(err) { expect(err).to.not.exist; expect(imapClientStub.selectMailbox.calledOnce).to.be.true; done(); }); }); it('should not open the virtual outbox folder in imap', function() { dao.openFolder({ folder: outboxFolder }); expect(imapClientStub.selectMailbox.called).to.be.false; }); it('should not do anything in offline mode', function(done) { account.online = false; dao.openFolder({ folder: inboxFolder }, function(err) { expect(err).to.exist; expect(imapClientStub.selectMailbox.called).to.be.false; done(); }); }); }); describe('#refreshFolder', function() { var localListStub, mail; beforeEach(function() { localListStub = sinon.stub(dao, '_localListMessages'); mail = { uid: 123, unread: true }; }); it('should add messages from disk', function(done) { localListStub.withArgs({ folder: inboxFolder }).yieldsAsync(null, [mail]); dao.refreshFolder({ folder: inboxFolder }, function(err) { expect(err).to.not.exist; expect(inboxFolder.count).to.equal(1); expect(inboxFolder.messages).to.contain(mail); done(); }); }); it('should not add messages from disk', function(done) { inboxFolder.messages = [mail]; localListStub.withArgs({ folder: inboxFolder }).yieldsAsync(null, [mail]); dao.refreshFolder({ folder: inboxFolder }, function(err) { expect(err).to.not.exist; expect(inboxFolder.count).to.equal(1); expect(inboxFolder.messages).to.contain(mail); done(); }); }); it('should remove messages from memory', function(done) { inboxFolder.messages = [mail]; localListStub.withArgs({ folder: inboxFolder }).yieldsAsync(null, []); dao.refreshFolder({ folder: inboxFolder }, function(err) { expect(err).to.not.exist; expect(inboxFolder.count).to.equal(0); expect(inboxFolder.messages).to.be.empty; done(); }); }); }); describe('#fetchMessages', function() { var imapListStub, imapGetStub, imapDeleteStub, localStoreStub; var opts, message, validUuid, corruptedUuid, verificationSubject; var notified; beforeEach(function() { imapListStub = sinon.stub(dao, '_imapListMessages'); imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage'); imapGetStub = sinon.stub(dao, '_getBodyParts'); localStoreStub = sinon.stub(dao, '_localStoreMessages'); opts = { folder: inboxFolder, firstUid: 123, lastUid: 123 }; message = { uid: 123, subject: 'asdasd', unread: true, bodyParts: [] }; validUuid = '9A858952-17EE-4273-9E74-D309EAFDFAFB'; corruptedUuid = 'OMFG_FUCKING_BASTARD_UUID_FROM_HELL!'; verificationSubject = "[whiteout] New public key uploaded"; notified = false; dao.onIncomingMessage = function(newMessages) { expect(newMessages).to.contain(message); notified = true; }; }); it('should fetch message downstream', function(done) { imapListStub.withArgs(opts).yieldsAsync(null, [message]); localStoreStub.withArgs({ folder: inboxFolder, emails: [message] }).yieldsAsync(); dao.fetchMessages(opts, function(err) { expect(err).to.not.exist; expect(inboxFolder.messages).to.contain(message); expect(notified).to.be.true; expect(localStoreStub.calledOnce).to.be.true; expect(imapListStub.calledOnce).to.be.true; expect(account.busy).to.be.false; done(); }); }); it('should verify verification mails', function(done) { message.subject = verificationSubject; imapListStub.withArgs(opts).yieldsAsync(null, [message]); imapGetStub.withArgs({ folder: inboxFolder, uid: message.uid, bodyParts: message.bodyParts }).yieldsAsync(null, [{ type: 'text', content: '' + cfg.cloudUrl + cfg.verificationUrl + validUuid }]); keychainStub.verifyPublicKey.withArgs(validUuid).yieldsAsync(); imapDeleteStub.withArgs({ folder: inboxFolder, uid: message.uid }).yieldsAsync(); dao.fetchMessages(opts, function(err) { expect(err).to.not.exist; expect(inboxFolder.messages).to.not.contain(message); expect(notified).to.be.false; expect(imapListStub.calledOnce).to.be.true; expect(imapGetStub.calledOnce).to.be.true; expect(keychainStub.verifyPublicKey.calledOnce).to.be.true; expect(imapDeleteStub.calledOnce).to.be.true; expect(localStoreStub.called).to.be.false; done(); }); }); it('should not verify invalid verification mails', function(done) { message.subject = verificationSubject; imapListStub.withArgs(opts).yieldsAsync(null, [message]); imapGetStub.withArgs({ folder: inboxFolder, uid: message.uid, bodyParts: message.bodyParts }).yieldsAsync(null, [{ type: 'text', content: '' + cfg.cloudUrl + cfg.verificationUrl + corruptedUuid }]); localStoreStub.withArgs({ folder: inboxFolder, emails: [message] }).yieldsAsync(); dao.fetchMessages(opts, function(err) { expect(err).to.not.exist; expect(inboxFolder.messages).to.contain(message); expect(notified).to.be.true; expect(imapListStub.calledOnce).to.be.true; expect(imapGetStub.calledOnce).to.be.true; expect(keychainStub.verifyPublicKey.called).to.be.false; expect(imapDeleteStub.called).to.be.false; expect(localStoreStub.calledOnce).to.be.true; done(); }); }); it('should display verification mail when verification failed', function(done) { message.subject = verificationSubject; imapListStub.withArgs(opts).yieldsAsync(null, [message]); imapGetStub.withArgs({ folder: inboxFolder, uid: message.uid, bodyParts: message.bodyParts }).yieldsAsync(null, [{ type: 'text', content: '' + cfg.cloudUrl + cfg.verificationUrl + validUuid }]); keychainStub.verifyPublicKey.withArgs(validUuid).yieldsAsync({}); localStoreStub.withArgs({ folder: inboxFolder, emails: [message] }).yieldsAsync(); dao.fetchMessages(opts, function(err) { expect(err).to.not.exist; expect(inboxFolder.messages).to.contain(message); expect(notified).to.be.true; expect(imapListStub.calledOnce).to.be.true; expect(imapGetStub.calledOnce).to.be.true; expect(keychainStub.verifyPublicKey.calledOnce).to.be.true; expect(imapDeleteStub.called).to.be.false; expect(localStoreStub.calledOnce).to.be.true; done(); }); }); }); describe('#deleteMessage', function() { var imapDeleteStub, localDeleteStub, message; beforeEach(function() { message = { uid: 1234 }; imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage'); localDeleteStub = sinon.stub(dao, '_localDeleteMessage'); inboxFolder.messages = [message]; outboxFolder.messages = [message]; }); it('should delete from imap, local, memory', function(done) { var deleteOpts = { folder: inboxFolder, uid: message.uid }; imapDeleteStub.withArgs(deleteOpts).yieldsAsync(); localDeleteStub.withArgs(deleteOpts).yieldsAsync(); dao.deleteMessage({ folder: inboxFolder, message: message }, function(err) { expect(err).to.not.exist; expect(imapDeleteStub.calledOnce).to.be.true; expect(localDeleteStub.calledOnce).to.be.true; expect(inboxFolder.messages).to.not.contain(message); done(); }); }); it('should delete from local, memory', function(done) { var deleteOpts = { folder: inboxFolder, uid: message.uid }; localDeleteStub.withArgs(deleteOpts).yieldsAsync(); dao.deleteMessage({ folder: inboxFolder, message: message, localOnly: true }, function(err) { expect(err).to.not.exist; expect(imapDeleteStub.called).to.be.false; expect(localDeleteStub.calledOnce).to.be.true; expect(inboxFolder.messages).to.not.contain(message); done(); }); }); it('should delete from outbox from local, memory', function(done) { var deleteOpts = { folder: outboxFolder, uid: message.uid }; localDeleteStub.withArgs(deleteOpts).yieldsAsync(); dao.deleteMessage({ folder: outboxFolder, message: message }, function(err) { expect(err).to.not.exist; expect(imapDeleteStub.called).to.be.false; expect(localDeleteStub.calledOnce).to.be.true; expect(outboxFolder.messages).to.not.contain(message); done(); }); }); it('should fail at delete from local', function(done) { var deleteOpts = { folder: inboxFolder, uid: message.uid }; imapDeleteStub.withArgs(deleteOpts).yieldsAsync(); localDeleteStub.withArgs(deleteOpts).yieldsAsync({}); dao.deleteMessage({ folder: inboxFolder, message: message }, function(err) { expect(err).to.exist; expect(imapDeleteStub.calledOnce).to.be.true; expect(localDeleteStub.calledOnce).to.be.true; expect(inboxFolder.messages).to.contain(message); done(); }); }); it('should fail at delete from imap', function(done) { var deleteOpts = { folder: inboxFolder, uid: message.uid }; imapDeleteStub.withArgs(deleteOpts).yieldsAsync({}); dao.deleteMessage({ folder: inboxFolder, message: message }, function(err) { expect(err).to.exist; expect(imapDeleteStub.calledOnce).to.be.true; expect(localDeleteStub.called).to.be.false; expect(inboxFolder.messages).to.contain(message); done(); }); }); it('should fail at delete from imap in offline', function(done) { account.online = false; dao.deleteMessage({ folder: inboxFolder, message: message }, function(err) { expect(err).to.exist; expect(imapDeleteStub.called).to.be.false; expect(localDeleteStub.called).to.be.false; expect(inboxFolder.messages).to.contain(message); done(); }); }); }); describe('#setFlags', function() { var imapMark, localListStub, localStoreStub, message; beforeEach(function() { message = { uid: 1234 }; imapMark = sinon.stub(dao, '_imapMark'); localListStub = sinon.stub(dao, '_localListMessages'); localStoreStub = sinon.stub(dao, '_localStoreMessages'); inboxFolder.messages = [message]; outboxFolder.messages = [message]; }); it('should set flags for imap, disk, memory', function(done) { imapMark.withArgs({ folder: inboxFolder, uid: message.uid, unread: message.unread, answered: message.answered }).yieldsAsync(); localListStub.withArgs({ folder: inboxFolder, uid: message.uid }).yieldsAsync(null, [message]); localStoreStub.withArgs({ folder: inboxFolder, emails: [message] }).yieldsAsync(); dao.setFlags({ folder: inboxFolder, message: message }, function(err) { expect(err).to.not.exist; expect(imapMark.calledOnce).to.be.true; expect(localListStub.calledOnce).to.be.true; expect(localStoreStub.calledOnce).to.be.true; done(); }); }); it('should set flags for outbox for disk, memory', function(done) { localListStub.withArgs({ folder: outboxFolder, uid: message.uid }).yieldsAsync(null, [message]); localStoreStub.withArgs({ folder: outboxFolder, emails: [message] }).yieldsAsync(); dao.setFlags({ folder: outboxFolder, message: message }, function(err) { expect(err).to.not.exist; expect(imapMark.called).to.be.false; expect(localListStub.calledOnce).to.be.true; expect(localStoreStub.calledOnce).to.be.true; done(); }); }); it('should set flags for disk, memory', function(done) { localListStub.withArgs({ folder: inboxFolder, uid: message.uid }).yieldsAsync(null, [message]); localStoreStub.withArgs({ folder: inboxFolder, emails: [message] }).yieldsAsync(); dao.setFlags({ folder: inboxFolder, message: message, localOnly: true }, function(err) { expect(err).to.not.exist; expect(imapMark.called).to.be.false; expect(localListStub.calledOnce).to.be.true; expect(localStoreStub.calledOnce).to.be.true; done(); }); }); it('should fail to set flags for imap', function(done) { imapMark.yieldsAsync({}); localListStub.yieldsAsync(null, [message]); localStoreStub.yieldsAsync(); dao.setFlags({ folder: inboxFolder, message: message }, function(err) { expect(err).to.exist; expect(imapMark.calledOnce).to.be.true; expect(localListStub.called).to.be.false; expect(localStoreStub.called).to.be.false; done(); }); }); it('should fail to set flags for imap in offline mode', function(done) { account.online = false; localListStub.yieldsAsync(null, [message]); localStoreStub.yieldsAsync(); dao.setFlags({ folder: inboxFolder, message: message }, function(err) { expect(err).to.exist; expect(imapMark.called).to.be.false; expect(localListStub.called).to.be.false; expect(localStoreStub.called).to.be.false; done(); }); }); }); describe('#getBody', function() { var localListStub, localStoreStub, imapGetStub, uid; beforeEach(function() { uid = 12345, localListStub = sinon.stub(dao, '_localListMessages'); localStoreStub = sinon.stub(dao, '_localStoreMessages'); imapGetStub = sinon.stub(dao, '_getBodyParts'); }); it('should not do anything if the message already has content', function() { var message = { body: 'bender is great!' }; dao.getBody({ message: message }); // should do nothing }); it('should read an unencrypted body from the device', function(done) { var message, body; body = 'bender is great! bender is great!'; message = { uid: uid }; localListStub.withArgs({ folder: inboxFolder, uid: uid }).yieldsAsync(null, [{ bodyParts: [{ type: 'text', content: body }] }]); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.not.exist; expect(msg).to.equal(message); expect(msg.body).to.equal(body); expect(msg.loadingBody).to.be.false; expect(localListStub.calledOnce).to.be.true; done(); }); expect(message.loadingBody).to.be.true; }); it('should read a pgp/mime from the device', function(done) { var message, ct, pt; pt = 'bender is great!'; ct = '-----BEGIN PGP MESSAGE-----asdasdasd-----END PGP MESSAGE-----'; message = { uid: uid, encrypted: true }; localListStub.withArgs({ folder: inboxFolder, uid: uid }).yieldsAsync(null, [{ bodyParts: [{ type: 'text', content: pt }, { type: 'encrypted', content: ct }] }]); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.not.exist; expect(msg).to.equal(message); expect(msg.body).to.equal(ct); expect(msg.encrypted).to.be.true; expect(message.loadingBody).to.be.false; expect(localListStub.calledOnce).to.be.true; done(); }); expect(message.loadingBody).to.be.true; }); it('should read a signed pgp/mime from the device', function(done) { var message, signed, pt, signedMimeTree, signature; pt = 'bender is great!'; signed = 'omg signed text'; signedMimeTree = 'trallalalalala'; signature = 'ugauga'; message = { uid: uid, signed: true, from: [{ address: 'asdasdasd' }] }; localListStub.withArgs({ folder: inboxFolder, uid: uid }).yieldsAsync(null, [{ bodyParts: [{ type: 'text', content: pt }, { type: 'signed', content: [{ type: 'text', content: signed }], signedMessage: signedMimeTree, signature: signature }] }]); keychainStub.getReceiverPublicKey.withArgs(message.from[0].address).yieldsAsync(null, mockKeyPair.publicKey); pgpStub.verifySignedMessage.withArgs(signedMimeTree, signature, mockKeyPair.publicKey.publicKey).yieldsAsync(null, true); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.not.exist; expect(msg).to.equal(message); expect(msg.body).to.equal(signed); expect(message.signed).to.be.true; expect(message.signaturesValid).to.be.true; expect(message.loadingBody).to.be.false; expect(localListStub.calledOnce).to.be.true; expect(pgpStub.verifySignedMessage.calledOnce).to.be.true; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; done(); }); expect(message.loadingBody).to.be.true; }); it('should read a pgp/inline from the device', function(done) { var message, ct, pt; ct = '-----BEGIN PGP MESSAGE-----\nasdasdasd\n-----END PGP MESSAGE-----'; pt = 'bla bla yadda yadda'; message = { uid: uid }; localListStub.yieldsAsync(null, [{ bodyParts: [{ type: 'text', content: pt }, { type: 'text', content: ct }, { type: 'text', content: pt }] }]); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.not.exist; expect(msg).to.equal(message); expect(msg.body).to.equal(ct); expect(msg.bodyParts[0].type).to.equal('encrypted'); expect(msg.bodyParts[0].content).to.equal(ct); expect(msg.encrypted).to.be.true; expect(message.loadingBody).to.be.false; expect(localListStub.calledOnce).to.be.true; done(); }); expect(message.loadingBody).to.be.true; }); it('should read a signed pgp/inline from the device', function(done) { var message, pt; pt = '-----BEGIN PGP SIGNED MESSAGE-----\n\ntest6\n-----BEGIN PGP SIGNATURE----------END PGP SIGNATURE-----'; message = { uid: uid, from: [{ address: 'asdasdasd' }] }; localListStub.yieldsAsync(null, [{ bodyParts: [{ type: 'text', content: pt }] }]); keychainStub.getReceiverPublicKey.withArgs(message.from[0].address).yieldsAsync(null, mockKeyPair.publicKey); pgpStub.verifyClearSignedMessage.withArgs(pt, mockKeyPair.publicKey.publicKey).yieldsAsync(null, true); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.not.exist; expect(msg).to.equal(message); expect(msg.body).to.equal('test6'); expect(message.signed).to.be.true; expect(message.signaturesValid).to.be.true; expect(message.loadingBody).to.be.false; expect(localListStub.calledOnce).to.be.true; expect(pgpStub.verifyClearSignedMessage.calledOnce).to.be.true; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; done(); }); expect(message.loadingBody).to.be.true; }); it('should stream from imap and set plain text body', function(done) { var message, body, uid; body = 'bender is great! bender is great!'; uid = 1234; message = { uid: uid, bodyParts: [{ type: 'text' }] }; localListStub.withArgs({ folder: inboxFolder, uid: uid }).yieldsAsync(null, [message]); localStoreStub.withArgs({ folder: inboxFolder, emails: [message] }).yieldsAsync(); imapGetStub.withArgs({ folder: inboxFolder, uid: message.uid, bodyParts: message.bodyParts }).yieldsAsync(null, [{ type: 'text', content: body }]); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.not.exist; expect(msg).to.equal(message); expect(msg.body).to.equal(body); expect(msg.loadingBody).to.be.false; expect(localListStub.calledOnce).to.be.true; expect(imapGetStub.calledOnce).to.be.true; expect(localStoreStub.calledOnce).to.be.true; done(); }); expect(message.loadingBody).to.be.true; }); it('should stream from imap and set encrypted body', function(done) { var message, ct, pt; pt = 'bender is great'; ct = '-----BEGIN PGP MESSAGE-----asdasdasd-----END PGP MESSAGE-----'; message = { uid: uid, encrypted: true, bodyParts: [{ type: 'text' }, { type: 'encrypted' }] }; localListStub.withArgs({ folder: inboxFolder, uid: uid }).yieldsAsync(null, [message]); localStoreStub.withArgs({ folder: inboxFolder, emails: [message] }).yieldsAsync(); imapGetStub.withArgs({ folder: inboxFolder, uid: message.uid, bodyParts: message.bodyParts }).yieldsAsync(null, [{ type: 'text', content: pt }, { type: 'encrypted', content: ct }]); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.not.exist; expect(msg).to.equal(message); expect(msg.body).to.equal(ct); expect(msg.encrypted).to.be.true; expect(msg.loadingBody).to.be.false; expect(localListStub.calledOnce).to.be.true; expect(imapGetStub.calledOnce).to.be.true; expect(localStoreStub.calledOnce).to.be.true; done(); }); expect(message.loadingBody).to.be.true; }); it('fail to stream from imap due to error when persisting', function(done) { var message = { uid: uid, bodyParts: [{ type: 'text' }] }; localListStub.yieldsAsync(null, [message]); localStoreStub.yieldsAsync({}); imapGetStub.yieldsAsync(null, [{ type: 'text', content: 'bender is great! bender is great!' }]); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.exist; expect(msg).to.not.exist; expect(localListStub.calledOnce).to.be.true; expect(imapGetStub.calledOnce).to.be.true; expect(localStoreStub.calledOnce).to.be.true; expect(message.loadingBody).to.be.false; done(); }); }); it('fail to stream from imap due to stream error', function(done) { var message = { uid: uid, bodyParts: [{ type: 'text' }] }; localListStub.yieldsAsync(null, [message]); imapGetStub.yieldsAsync({}); dao.getBody({ message: message, folder: inboxFolder }, function(err, msg) { expect(err).to.exist; expect(msg).to.not.exist; expect(localListStub.calledOnce).to.be.true; expect(imapGetStub.calledOnce).to.be.true; expect(localStoreStub.called).to.be.false; expect(message.loadingBody).to.be.false; done(); }); }); }); describe('#getAttachment', function() { var imapGetStub, uid; beforeEach(function() { uid = 123456; imapGetStub = sinon.stub(dao, '_getBodyParts'); }); it('should fetch an attachment from imap', function(done) { var attmt = {}; imapGetStub.withArgs({ folder: inboxFolder, uid: uid, bodyParts: [attmt] }).yieldsAsync(null, [{ content: 'CONTENT!!!' }]); dao.getAttachment({ folder: inboxFolder, uid: uid, attachment: attmt }, function(err, fetchedAttmt) { expect(err).to.not.exist; expect(fetchedAttmt).to.equal(attmt); expect(attmt.content).to.not.be.empty; expect(imapGetStub.calledOnce).to.be.true; done(); }); }); it('should error during fetch', function(done) { var attmt = {}; imapGetStub.yieldsAsync({}); dao.getAttachment({ folder: inboxFolder, uid: uid, attachment: attmt }, function(err, fetchedAttmt) { expect(err).to.exist; expect(fetchedAttmt).to.not.exist; expect(imapGetStub.calledOnce).to.be.true; done(); }); }); }); describe('#decryptBody', function() { it('should do nothing when the message is not encrypted', function(done) { var message = { encrypted: false, decrypted: true, body: 'asd' }; dao.decryptBody({ message: message }, done); }); it('should do nothing when the message is already decrypted', function(done) { var message = { encrypted: true, decrypted: true, body: 'asd' }; dao.decryptBody({ message: message }, done); }); it('should do nothing when the message has no body', function(done) { var message = { encrypted: true, decrypted: false, body: '' }; dao.decryptBody({ message: message }, done); }); it('should do nothing when the message is decrypting', function(done) { var message = { encrypted: true, decrypted: false, body: 'asd', decryptingBody: true }; dao.decryptBody({ message: message }, done); }); it('decrypt a pgp/mime message', function(done) { var message, ct, pt, parsed; pt = 'bender is great'; ct = '-----BEGIN PGP MESSAGE-----asdasdasd-----END PGP MESSAGE-----'; parsed = 'bender! bender! bender!'; message = { from: [{ address: 'asdasdasd' }], body: ct, encrypted: true, bodyParts: [{ type: 'encrypted', content: ct }] }; keychainStub.getReceiverPublicKey.withArgs(message.from[0].address).yieldsAsync(null, mockKeyPair.publicKey); pgpStub.decrypt.withArgs(ct, mockKeyPair.publicKey.publicKey).yieldsAsync(null, pt, true); parseStub.withArgs({ bodyParts: [{ type: 'encrypted', content: ct, raw: pt }] }).yieldsAsync(null, [{ type: 'encrypted', content: [{ type: 'text', content: parsed }] }]); dao.decryptBody({ message: message }, function(error, msg) { expect(error).to.not.exist; expect(msg).to.equal(message); expect(message.decrypted).to.be.true; expect(message.signed).to.be.true; expect(message.signaturesValid).to.be.true; expect(message.body).to.equal(parsed); expect(message.decryptingBody).to.be.false; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; expect(pgpStub.decrypt.calledOnce).to.be.true; expect(parseStub.calledOnce).to.be.true; done(); }); expect(message.decryptingBody).to.be.true; }); it('decrypt a pgp/mime message with inner signature', function(done) { var message, ct, pt, parsed, signed, signedMimeTree, signature; pt = 'bender is great'; ct = '-----BEGIN PGP MESSAGE-----asdasdasd-----END PGP MESSAGE-----'; signedMimeTree = 'trallalalalala'; signature = 'ugauga'; signed = 'omg signed text'; parsed = 'bender! bender! bender!'; message = { from: [{ address: 'asdasdasd' }], body: ct, encrypted: true, bodyParts: [{ type: 'encrypted', content: ct }] }; keychainStub.getReceiverPublicKey.withArgs(message.from[0].address).yieldsAsync(null, mockKeyPair.publicKey); pgpStub.decrypt.withArgs(ct, mockKeyPair.publicKey.publicKey).yieldsAsync(null, pt, undefined); pgpStub.verifySignedMessage.withArgs(signedMimeTree, signature, mockKeyPair.publicKey.publicKey).yieldsAsync(null, true); parseStub.withArgs({ bodyParts: [{ type: 'encrypted', content: ct, raw: pt }] }).yieldsAsync(null, [{ type: 'encrypted', content: [{ type: 'signed', content: [{ type: 'text', content: signed }], signedMessage: signedMimeTree, signature: signature }] }]); dao.decryptBody({ message: message }, function(error, msg) { expect(error).to.not.exist; expect(msg).to.equal(message); expect(message.decrypted).to.be.true; expect(message.body).to.equal(signed); expect(message.signed).to.be.true; expect(message.signaturesValid).to.be.true; expect(message.decryptingBody).to.be.false; expect(keychainStub.getReceiverPublicKey.calledTwice).to.be.true; expect(pgpStub.decrypt.calledOnce).to.be.true; expect(pgpStub.verifySignedMessage.calledOnce).to.be.true; expect(parseStub.calledOnce).to.be.true; done(); }); expect(message.decryptingBody).to.be.true; }); it('decrypt a pgp/inline message', function(done) { var message, ct, pt; pt = 'bender is great'; ct = '-----BEGIN PGP MESSAGE-----asdasdasd-----END PGP MESSAGE-----'; message = { from: [{ address: 'asdasdasd' }], body: ct, encrypted: true, bodyParts: [{ type: 'encrypted', content: ct, _isPgpInline: true }] }; keychainStub.getReceiverPublicKey.withArgs(message.from[0].address).yieldsAsync(null, mockKeyPair.publicKey); pgpStub.decrypt.withArgs(ct, mockKeyPair.publicKey.publicKey).yieldsAsync(null, pt, true); dao.decryptBody({ message: message }, function(error, msg) { expect(error).to.not.exist; expect(msg).to.equal(message); expect(message.decrypted).to.be.true; expect(message.body).to.equal(pt); expect(message.decryptingBody).to.be.false; expect(message.signed).to.be.true; expect(message.signaturesValid).to.be.true; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; expect(pgpStub.decrypt.calledOnce).to.be.true; expect(parseStub.called).to.be.false; done(); }); expect(message.decryptingBody).to.be.true; }); it('should fail during decryption message', function(done) { var message = { from: [{ address: 'asdasdasd' }], body: 'asdjafuad', encrypted: true, bodyParts: [{ type: 'encrypted', content: '-----BEGIN PGP MESSAGE-----asdasdasd-----END PGP MESSAGE-----' }] }; keychainStub.getReceiverPublicKey.yieldsAsync(null, mockKeyPair.publicKey); pgpStub.decrypt.yieldsAsync(new Error('fail.')); dao.decryptBody({ message: message }, function(error, msg) { expect(error).to.not.exist; expect(msg.body).to.equal('fail.'); expect(msg).to.exist; expect(message.decryptingBody).to.be.false; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; expect(pgpStub.decrypt.calledOnce).to.be.true; expect(parseStub.called).to.be.false; done(); }); }); it('should fail during key export', function(done) { var message = { from: [{ address: 'asdasdasd' }], encrypted: true, body: 'asdjafuad', bodyParts: [{ type: 'encrypted', content: '-----BEGIN PGP MESSAGE-----asdasdasd-----END PGP MESSAGE-----' }] }; keychainStub.getReceiverPublicKey.yieldsAsync({}); dao.decryptBody({ message: message }, function(error, msg) { expect(error).to.exist; expect(msg).to.not.exist; expect(message.decryptingBody).to.be.false; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; expect(pgpStub.decrypt.called).to.be.false; expect(parseStub.called).to.be.false; done(); }); }); }); describe('#sendEncrypted', function() { var publicKeys = ["PUBLIC KEY"], dummyMail = { publicKeysArmored: publicKeys }; it('should send encrypted', function(done) { pgpMailerStub.send.withArgs({ encrypt: true, cleartextMessage: str.message + str.signature, mail: dummyMail, smtpclient: undefined, publicKeysArmored: publicKeys }).yieldsAsync(); dao.sendEncrypted({ email: dummyMail }, function(err) { expect(err).to.not.exist; expect(pgpMailerStub.send.calledOnce).to.be.true; done(); }); }); it('should not send when pgpmailer fails', function(done) { pgpMailerStub.send.yieldsAsync({}); dao.sendEncrypted({ email: dummyMail }, function(err) { expect(err).to.exist; expect(pgpMailerStub.send.calledOnce).to.be.true; done(); }); }); it('should not send in offline mode', function(done) { account.online = false; dao.sendEncrypted({}, function(err) { expect(err).to.exist; expect(pgpMailerStub.send.called).to.be.false; done(); }); }); }); describe('#sendPlaintext', function() { var dummyMail = {}; it('should send in the plain', function(done) { pgpMailerStub.send.withArgs({ smtpclient: undefined, mail: dummyMail }).yieldsAsync(); dao.sendPlaintext({ email: dummyMail }, function(err) { expect(err).to.not.exist; expect(pgpMailerStub.send.calledOnce).to.be.true; done(); }); }); it('should not send due to error', function(done) { pgpMailerStub.send.yieldsAsync({}); dao.sendPlaintext({ email: dummyMail }, function(err) { expect(err).to.exist; expect(pgpMailerStub.send.calledOnce).to.be.true; done(); }); }); it('should not send in offline mode', function(done) { account.online = false; dao.sendPlaintext({}, function(err) { expect(err).to.exist; expect(pgpMailerStub.send.called).to.be.false; done(); }); }); }); describe('#encrypt', function() { it('should encrypt', function(done) { pgpBuilderStub.encrypt.yieldsAsync(); dao.encrypt({}, function() { expect(pgpBuilderStub.encrypt.calledOnce).to.be.true; done(); }); }); }); }); describe('event handlers', function() { describe('#onConnect', function() { var initFoldersStub; beforeEach(function() { initFoldersStub = sinon.stub(dao, '_initFoldersFromImap'); delete dao._imapClient; delete dao._pgpMailer; }); it('should connect', function(done) { inboxFolder.messages = [{ uid: 123, modseq: 123 }]; imapClientStub.login.yieldsAsync(); imapClientStub.listenForChanges.yieldsAsync(); initFoldersStub.yieldsAsync(); dao.onConnect({ imapClient: imapClientStub, pgpMailer: pgpMailerStub }, function(err) { expect(err).to.not.exist; expect(imapClientStub.login.calledOnce).to.be.true; expect(initFoldersStub.calledOnce).to.be.true; expect(imapClientStub.mailboxCache).to.deep.equal({ 'INBOX': { exists: 123, uidNext: 124, uidlist: [123], highestModseq: 123 } }); done(); }); }); }); describe('#onDisconnect', function() { it('should discard imapClient and pgpMailer', function() { dao.onDisconnect(); expect(dao._account.online).to.be.false; expect(dao._imapClient).to.not.exist; expect(dao._pgpMailer).to.not.exist; }); }); describe('#_onSyncUpdate', function() { var fetchMessagesStub, deleteMessagesStub, setFlagsStub, msgs; beforeEach(function() { msgs = [{ uid: 5, flags: ['\\Answered', '\\Seen'] }]; inboxFolder.messages = msgs; fetchMessagesStub = sinon.stub(dao, 'fetchMessages'); deleteMessagesStub = sinon.stub(dao, 'deleteMessage'); setFlagsStub = sinon.stub(dao, 'setFlags'); }); it('should get new message', function(done) { fetchMessagesStub.withArgs({ folder: inboxFolder, firstUid: 1, lastUid: 3 }).yieldsAsync(); dao.onError = function(err) { expect(err).to.not.exist; expect(fetchMessagesStub.calledOnce).to.be.true; done(); }; dao._onSyncUpdate({ type: 'new', path: inboxFolder.path, list: [1, 3] }); }); it('should delete message', function(done) { deleteMessagesStub.withArgs({ folder: inboxFolder, message: msgs[0], localOnly: true }).yieldsAsync(); dao.onError = function(err) { expect(err).to.not.exist; expect(deleteMessagesStub.calledOnce).to.be.true; done(); }; dao._onSyncUpdate({ type: 'deleted', path: inboxFolder.path, list: [5] }); }); it('should fetch flags', function(done) { setFlagsStub.withArgs({ folder: inboxFolder, message: msgs[0], localOnly: true }).yieldsAsync(); dao.onError = function(err) { expect(err).to.not.exist; expect(setFlagsStub.calledOnce).to.be.true; done(); }; dao._onSyncUpdate({ type: 'messages', path: inboxFolder.path, list: msgs }); }); }); }); describe('internal API', function() { describe('#_checkSignatures', function() { it('should check signatures in clearsigned message', function(done) { var message = { from: [{ address: 'asdasdasd' }], clearSignedMessage: 'trallalalalala' }; keychainStub.getReceiverPublicKey.withArgs(message.from[0].address).yieldsAsync(null, mockKeyPair.publicKey); pgpStub.verifyClearSignedMessage.withArgs(message.clearSignedMessage, mockKeyPair.publicKey.publicKey).yieldsAsync(null, true); dao._checkSignatures(message, function(error, signaturesValid) { expect(error).to.not.exist; expect(signaturesValid).to.be.true; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; expect(pgpStub.verifyClearSignedMessage.calledOnce).to.be.true; done(); }); }); it('should check signatures in pgp/mime signed message', function(done) { var message = { from: [{ address: 'asdasdasd' }], signedMessage: 'trallalalalala', signature: 'ugauga' }; keychainStub.getReceiverPublicKey.withArgs(message.from[0].address).yieldsAsync(null, mockKeyPair.publicKey); pgpStub.verifySignedMessage.withArgs(message.signedMessage, message.signature, mockKeyPair.publicKey.publicKey).yieldsAsync(null, true); dao._checkSignatures(message, function(error, signaturesValid) { expect(error).to.not.exist; expect(signaturesValid).to.be.true; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; expect(pgpStub.verifySignedMessage.calledOnce).to.be.true; done(); }); }); it('should error while checking signatures', function(done) { var message = { from: [{ address: 'asdasdasd' }], signedMessage: 'trallalalalala', signature: 'ugauga' }; keychainStub.getReceiverPublicKey.withArgs(message.from[0].address).yieldsAsync(null, mockKeyPair.publicKey); pgpStub.verifySignedMessage.yieldsAsync(new Error()); dao._checkSignatures(message, function(error, signaturesValid) { expect(error).to.exist; expect(signaturesValid).to.not.exist; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; expect(pgpStub.verifySignedMessage.calledOnce).to.be.true; done(); }); }); it('should error while fetching public key', function(done) { var message = { from: [{ address: 'asdasdasd' }], signedMessage: 'trallalalalala', signature: 'ugauga' }; keychainStub.getReceiverPublicKey.yieldsAsync(new Error()); dao._checkSignatures(message, function(error, signaturesValid) { expect(error).to.exist; expect(signaturesValid).to.not.exist; expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true; expect(pgpStub.verifySignedMessage.called).to.be.false; done(); }); }); }); describe('#_initFoldersFromDisk', function() { beforeEach(function() { sinon.stub(dao, 'refreshFolder'); }); it('should initialize from disk if offline and not refresh folder', function(done) { devicestorageStub.listItems.withArgs('folders').yieldsAsync(null, [ [inboxFolder] ]); dao.refreshFolder.withArgs({ folder: inboxFolder }).yieldsAsync(); dao._initFoldersFromDisk(function(err) { expect(err).to.not.exist; expect(devicestorageStub.listItems.calledOnce).to.be.true; expect(dao.refreshFolder.called).to.be.false; done(); }); }); it('should initialize from disk if offline and refresh folder', function(done) { delete inboxFolder.messages; devicestorageStub.listItems.withArgs('folders').yieldsAsync(null, [ [inboxFolder] ]); dao.refreshFolder.withArgs({ folder: inboxFolder }).yieldsAsync(); dao._initFoldersFromDisk(function(err) { expect(err).to.not.exist; expect(devicestorageStub.listItems.calledOnce).to.be.true; expect(dao.refreshFolder.calledOnce).to.be.true; done(); }); }); }); describe('#_initFoldersFromImap', function() { beforeEach(function() { sinon.stub(dao, 'refreshFolder'); }); it('should initialize from imap if online', function(done) { account.folders = []; imapClientStub.listWellKnownFolders.yieldsAsync(null, { inbox: inboxFolder, sent: sentFolder, drafts: draftsFolder, trash: trashFolder }); devicestorageStub.storeList.withArgs(sinon.match(function(arg) { expect(arg[0][0]).to.deep.equal(inboxFolder); expect(arg[0][1]).to.deep.equal(sentFolder); expect(arg[0][2].path).to.deep.equal(outboxFolder.path); expect(arg[0][2].type).to.deep.equal(outboxFolder.type); expect(arg[0][3]).to.deep.equal(draftsFolder); expect(arg[0][4]).to.deep.equal(trashFolder); return true; }), 'folders').yieldsAsync(); dao.refreshFolder.yieldsAsync(); dao._initFoldersFromImap(function(err) { expect(err).to.not.exist; expect(imapClientStub.listWellKnownFolders.calledOnce).to.be.true; expect(devicestorageStub.storeList.calledOnce).to.be.true; done(); }); }); }); describe('#_imapMark', function() { it('should flag a mail', function(done) { imapClientStub.updateFlags.withArgs({ path: inboxFolder.path, folder: inboxFolder, uid: 1, unread: false, answered: false }).yieldsAsync(); dao._imapMark({ folder: inboxFolder, uid: 1, unread: false, answered: false }, function(err) { expect(err).to.not.exist; expect(imapClientStub.updateFlags.calledOnce).to.be.true; done(); }); }); }); describe('#_imapDeleteMessage', function() { var uid = 1337; it('should fail when disconnected', function(done) { dao._account.online = false; dao._imapDeleteMessage({}, function(err) { expect(err.code).to.equal(42); done(); }); }); it('should move to trash', function(done) { imapClientStub.moveMessage.withArgs({ path: inboxFolder.path, uid: uid, destination: trashFolder.path }).yieldsAsync(); dao._imapDeleteMessage({ folder: inboxFolder, uid: uid }, done); }); it('should purge message', function(done) { imapClientStub.deleteMessage.withArgs({ path: trashFolder.path, uid: uid }).yieldsAsync(); dao._imapDeleteMessage({ folder: trashFolder, uid: uid }, done); }); }); describe('#_imapListMessages', function() { var firstUid = 1337, lastUid = 1339; it('should list messages', function(done) { imapClientStub.listMessages.withArgs({ folder: inboxFolder, path: inboxFolder.path, firstUid: firstUid, lastUid: lastUid }).yieldsAsync(null, []); dao._imapListMessages({ folder: inboxFolder, firstUid: firstUid, lastUid: lastUid }, function(err, msgs) { expect(err).to.not.exist; expect(msgs).to.exist; expect(imapClientStub.listMessages.calledOnce).to.be.true; done(); }); }); it('should fail when listMessages fails', function(done) { imapClientStub.listMessages.yieldsAsync({}); dao._imapListMessages({ folder: inboxFolder, firstUid: firstUid, lastUid: lastUid }, function(err, msgs) { expect(err).to.exist; expect(msgs).to.not.exist; expect(imapClientStub.listMessages.calledOnce).to.be.true; done(); }); }); it('should fail when disconnected', function(done) { dao._account.online = false; dao._imapListMessages({}, function(err) { expect(err.code).to.equal(42); done(); }); }); }); describe('#_getBodyParts', function() { it('should get bodyParts', function(done) { imapClientStub.getBodyParts.withArgs({ folder: inboxFolder, path: inboxFolder.path, uid: 123, bodyParts: [] }).yieldsAsync(null, {}); parseStub.yieldsAsync(null, []); dao._getBodyParts({ folder: inboxFolder, uid: 123, bodyParts: [] }, function(err, parts) { expect(err).to.not.exist; expect(parts).to.exist; expect(imapClientStub.getBodyParts.calledOnce).to.be.true; expect(parseStub.calledOnce).to.be.true; done(); }); }); it('should fail when getBody fails', function(done) { imapClientStub.getBodyParts.yieldsAsync({}); dao._getBodyParts({ folder: inboxFolder, uid: 123, bodyParts: [] }, function(err, msg) { expect(err).to.exist; expect(msg).to.not.exist; expect(imapClientStub.getBodyParts.calledOnce).to.be.true; expect(parseStub.called).to.be.false; done(); }); }); it('should fail when disconnected', function(done) { dao._account.online = false; dao._getBodyParts({}, function(err) { expect(err.code).to.equal(42); done(); }); }); }); describe('#_localListMessages', function() { var uid = 123; it('should list without uid', function(done) { devicestorageStub.listItems.withArgs('email_' + inboxFolder.path, 0, null).yieldsAsync(); dao._localListMessages({ folder: inboxFolder }, done); }); it('should list with uid', function(done) { devicestorageStub.listItems.withArgs('email_' + inboxFolder.path + '_' + uid, 0, null).yieldsAsync(); dao._localListMessages({ folder: inboxFolder, uid: uid }, done); }); }); describe('#_localStoreMessages', function() { it('should store messages', function(done) { devicestorageStub.storeList.withArgs([{}], 'email_' + inboxFolder.path).yieldsAsync(); dao._localStoreMessages({ folder: inboxFolder, emails: [{}] }, done); }); }); describe('#_localDeleteMessage', function() { var uid = 1337; it('should delete message', function(done) { devicestorageStub.removeList.withArgs('email_' + inboxFolder.path + '_' + uid).yieldsAsync(); dao._localDeleteMessage({ folder: inboxFolder, uid: uid }, done); }); it('should fail when uid is missing', function(done) { dao._localDeleteMessage({ folder: inboxFolder }, function(err) { expect(err).to.exist; done(); }); }); }); }); }); });