mirror of
https://github.com/moparisthebest/mail
synced 2024-11-29 20:32:15 -05:00
b7a4c13766
Use all pgp (sub) keys when en/decrypting a pgp message Improve input validation for key import Mark manually imported keys so that key refresh does not revoke them
625 lines
24 KiB
JavaScript
625 lines
24 KiB
JavaScript
define(function(require) {
|
|
'use strict';
|
|
|
|
var LawnchairDAO = require('js/dao/lawnchair-dao'),
|
|
PublicKeyDAO = require('js/dao/publickey-dao'),
|
|
KeychainDAO = require('js/dao/keychain-dao'),
|
|
expect = chai.expect;
|
|
|
|
var testUser = 'test@example.com';
|
|
|
|
describe('Keychain DAO unit tests', function() {
|
|
|
|
var keychainDao, lawnchairDaoStub, pubkeyDaoStub;
|
|
|
|
beforeEach(function() {
|
|
lawnchairDaoStub = sinon.createStubInstance(LawnchairDAO);
|
|
pubkeyDaoStub = sinon.createStubInstance(PublicKeyDAO);
|
|
keychainDao = new KeychainDAO(lawnchairDaoStub, pubkeyDaoStub);
|
|
});
|
|
|
|
afterEach(function() {});
|
|
|
|
describe('verify public key', function() {
|
|
it('should verify public key', function(done) {
|
|
var uuid = 'asdfasdfasdfasdf';
|
|
pubkeyDaoStub.verify.yields();
|
|
|
|
keychainDao.verifyPublicKey(uuid, function() {
|
|
expect(pubkeyDaoStub.verify.calledWith(uuid)).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('listLocalPublicKeys', function() {
|
|
it('should work', function(done) {
|
|
lawnchairDaoStub.list.withArgs('publickey', 0, null).yields();
|
|
|
|
keychainDao.listLocalPublicKeys(function() {
|
|
expect(lawnchairDaoStub.list.callCount).to.equal(1);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('removeLocalPublicKey', function() {
|
|
it('should work', function(done) {
|
|
var id = 'asdf';
|
|
|
|
lawnchairDaoStub.remove.withArgs('publickey_' + id).yields();
|
|
|
|
keychainDao.removeLocalPublicKey(id, function() {
|
|
expect(lawnchairDaoStub.remove.callCount).to.equal(1);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('refreshKeyForUserId', function() {
|
|
var getPubKeyStub,
|
|
oldKey = {
|
|
_id: 123
|
|
},
|
|
newKey = {
|
|
_id: 456
|
|
},
|
|
importedKey = {
|
|
_id: 789,
|
|
imported: true
|
|
};
|
|
|
|
beforeEach(function() {
|
|
getPubKeyStub = sinon.stub(keychainDao, 'getReceiverPublicKey');
|
|
});
|
|
|
|
afterEach(function() {
|
|
keychainDao.getReceiverPublicKey.restore();
|
|
delete keychainDao.requestPermissionForKeyUpdate;
|
|
});
|
|
|
|
it('should not find a key', function(done) {
|
|
getPubKeyStub.yields();
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.not.exist;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not update the key when up to date', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields(null, oldKey);
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.to.equal(oldKey);
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should update key', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields();
|
|
pubkeyDaoStub.getByUserId.withArgs(testUser).yields(null, newKey);
|
|
keychainDao.requestPermissionForKeyUpdate = function(opts, cb) {
|
|
expect(opts.userId).to.equal(testUser);
|
|
expect(opts.newKey).to.equal(newKey);
|
|
cb(true);
|
|
};
|
|
lawnchairDaoStub.remove.withArgs('publickey_' + oldKey._id).yields();
|
|
lawnchairDaoStub.persist.withArgs('publickey_' + newKey._id, newKey).yields();
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.equal(newKey);
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.remove.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.persist.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should remove key', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields();
|
|
pubkeyDaoStub.getByUserId.withArgs(testUser).yields();
|
|
keychainDao.requestPermissionForKeyUpdate = function(opts, cb) {
|
|
expect(opts.userId).to.equal(testUser);
|
|
expect(opts.newKey).to.not.exist;
|
|
cb(true);
|
|
};
|
|
lawnchairDaoStub.remove.withArgs('publickey_' + oldKey._id).yields();
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.not.exist;
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.remove.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.persist.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should go offline while fetching new key', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields();
|
|
pubkeyDaoStub.getByUserId.withArgs(testUser).yields({
|
|
code: 42
|
|
});
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.to.equal(oldKey);
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.remove.called).to.be.false;
|
|
expect(lawnchairDaoStub.persist.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not remove old key on user rejection', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields();
|
|
pubkeyDaoStub.getByUserId.withArgs(testUser).yields(null, newKey);
|
|
keychainDao.requestPermissionForKeyUpdate = function(opts, cb) {
|
|
expect(opts.userId).to.equal(testUser);
|
|
expect(opts.newKey).to.exist;
|
|
cb(false);
|
|
};
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.equal(oldKey);
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.remove.called).to.be.false;
|
|
expect(lawnchairDaoStub.persist.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not remove manually imported key', function(done) {
|
|
getPubKeyStub.yields(null, importedKey);
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.equal(importedKey);
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should update not the key when offline', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields({
|
|
code: 42
|
|
});
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.to.equal(oldKey);
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.called).to.be.false;
|
|
expect(lawnchairDaoStub.remove.called).to.be.false;
|
|
expect(lawnchairDaoStub.persist.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while persisting new key', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields();
|
|
pubkeyDaoStub.getByUserId.withArgs(testUser).yields(null, newKey);
|
|
keychainDao.requestPermissionForKeyUpdate = function(opts, cb) {
|
|
expect(opts.userId).to.equal(testUser);
|
|
expect(opts.newKey).to.equal(newKey);
|
|
cb(true);
|
|
};
|
|
lawnchairDaoStub.remove.withArgs('publickey_' + oldKey._id).yields();
|
|
lawnchairDaoStub.persist.yields({});
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.exist;
|
|
expect(key).to.not.exist;
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.remove.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.persist.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while deleting old key', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields();
|
|
pubkeyDaoStub.getByUserId.withArgs(testUser).yields();
|
|
keychainDao.requestPermissionForKeyUpdate = function(opts, cb) {
|
|
expect(opts.userId).to.equal(testUser);
|
|
cb(true);
|
|
};
|
|
lawnchairDaoStub.remove.yields({});
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.exist;
|
|
expect(key).to.not.exist;
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.remove.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.persist.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while persisting new key', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields();
|
|
pubkeyDaoStub.getByUserId.withArgs(testUser).yields(null, newKey);
|
|
keychainDao.requestPermissionForKeyUpdate = function(opts, cb) {
|
|
expect(opts.userId).to.equal(testUser);
|
|
expect(opts.newKey).to.equal(newKey);
|
|
cb(true);
|
|
};
|
|
lawnchairDaoStub.remove.withArgs('publickey_' + oldKey._id).yields();
|
|
lawnchairDaoStub.persist.yields({});
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.exist;
|
|
expect(key).to.not.exist;
|
|
|
|
expect(getPubKeyStub.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.remove.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.persist.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error when get failed', function(done) {
|
|
getPubKeyStub.yields(null, oldKey);
|
|
pubkeyDaoStub.get.withArgs(oldKey._id).yields({});
|
|
|
|
keychainDao.refreshKeyForUserId(testUser, function(err, key) {
|
|
expect(err).to.exist;
|
|
expect(key).to.not.exist;
|
|
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('lookup public key', function() {
|
|
it('should fail', function(done) {
|
|
keychainDao.lookupPublicKey(undefined, function(err, key) {
|
|
expect(err).to.exist;
|
|
expect(key).to.not.exist;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail', function(done) {
|
|
lawnchairDaoStub.read.yields(42);
|
|
|
|
keychainDao.lookupPublicKey('12345', function(err, key) {
|
|
expect(err).to.exist;
|
|
expect(key).to.not.exist;
|
|
expect(lawnchairDaoStub.read.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work from local storage', function(done) {
|
|
lawnchairDaoStub.read.yields(null, {
|
|
_id: '12345',
|
|
publicKey: 'asdf'
|
|
});
|
|
|
|
keychainDao.lookupPublicKey('12345', function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.exist;
|
|
expect(lawnchairDaoStub.read.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work from cloud', function(done) {
|
|
lawnchairDaoStub.read.yields();
|
|
pubkeyDaoStub.get.yields(null, {
|
|
_id: '12345',
|
|
publicKey: 'asdf'
|
|
});
|
|
lawnchairDaoStub.persist.yields();
|
|
|
|
keychainDao.lookupPublicKey('12345', function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.exist;
|
|
expect(key._id).to.equal('12345');
|
|
expect(lawnchairDaoStub.read.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.get.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.persist.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('get public keys by id', function() {
|
|
it('should fail', function(done) {
|
|
keychainDao.getPublicKeys([], function(err, keys) {
|
|
expect(err).to.not.exist;
|
|
expect(keys.length).to.equal(0);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail', function(done) {
|
|
lawnchairDaoStub.read.yields(42);
|
|
|
|
var ids = [{
|
|
_id: '12345'
|
|
}];
|
|
keychainDao.getPublicKeys(ids, function(err, keys) {
|
|
expect(err).to.exist;
|
|
expect(keys).to.not.exist;
|
|
expect(lawnchairDaoStub.read.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work from local storage', function(done) {
|
|
lawnchairDaoStub.read.yields(null, {
|
|
_id: '12345',
|
|
publicKey: 'asdf'
|
|
});
|
|
|
|
var ids = [{
|
|
_id: '12345'
|
|
}];
|
|
keychainDao.getPublicKeys(ids, function(err, keys) {
|
|
expect(err).to.not.exist;
|
|
expect(keys.length).to.equal(1);
|
|
expect(keys[0]._id).to.equal('12345');
|
|
expect(lawnchairDaoStub.read.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('get receiver public key', function() {
|
|
it('should fail due to error in lawnchair list', function(done) {
|
|
lawnchairDaoStub.list.yields(42);
|
|
|
|
keychainDao.getReceiverPublicKey(testUser, function(err, key) {
|
|
expect(err).to.exist;
|
|
expect(key).to.not.exist;
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work from lawnchair list', function(done) {
|
|
lawnchairDaoStub.list.yields(null, [{
|
|
_id: '12345',
|
|
userId: testUser,
|
|
publicKey: 'asdf'
|
|
}]);
|
|
|
|
keychainDao.getReceiverPublicKey(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.exist;
|
|
expect(key._id).to.equal('12345');
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work for keys with secondary userIds', function(done) {
|
|
lawnchairDaoStub.list.yields(null, [{
|
|
_id: '12345',
|
|
userId: 'not testUser',
|
|
userIds: [{
|
|
emailAddress: testUser
|
|
}],
|
|
publicKey: 'asdf'
|
|
}]);
|
|
|
|
keychainDao.getReceiverPublicKey(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.exist;
|
|
expect(key._id).to.equal('12345');
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail due to error in pubkey dao', function(done) {
|
|
lawnchairDaoStub.list.yields(null, []);
|
|
pubkeyDaoStub.getByUserId.yields({});
|
|
|
|
keychainDao.getReceiverPublicKey(testUser, function(err, key) {
|
|
expect(err).to.exist;
|
|
expect(key).to.not.exist;
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work from pubkey dao with empty result', function(done) {
|
|
lawnchairDaoStub.list.yields(null, []);
|
|
pubkeyDaoStub.getByUserId.yields();
|
|
|
|
keychainDao.getReceiverPublicKey(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.not.exist;
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work from pubkey dao', function(done) {
|
|
lawnchairDaoStub.list.yields(null, []);
|
|
pubkeyDaoStub.getByUserId.yields(null, {
|
|
_id: '12345',
|
|
publicKey: 'asdf'
|
|
});
|
|
lawnchairDaoStub.persist.yields();
|
|
|
|
keychainDao.getReceiverPublicKey(testUser, function(err, key) {
|
|
expect(err).to.not.exist;
|
|
expect(key).to.exist;
|
|
expect(key._id).to.equal('12345');
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.persist.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('get user key pair', function() {
|
|
it('should work if local keys are already present', function(done) {
|
|
lawnchairDaoStub.list.yields(null, [{
|
|
_id: '12345',
|
|
userId: testUser,
|
|
publicKey: 'asdf'
|
|
}]);
|
|
lawnchairDaoStub.read.yields(null, {
|
|
_id: '12345',
|
|
publicKey: 'asdf',
|
|
encryptedKey: 'qwer'
|
|
});
|
|
|
|
keychainDao.getUserKeyPair(testUser, function(err, keys) {
|
|
expect(err).to.not.exist;
|
|
expect(keys).to.exist;
|
|
expect(keys.publicKey).to.exist;
|
|
expect(keys.privateKey).to.exist;
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.read.calledTwice).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work if local keys are not already present', function(done) {
|
|
lawnchairDaoStub.list.yields();
|
|
pubkeyDaoStub.getByUserId.yields();
|
|
|
|
keychainDao.getUserKeyPair(testUser, function(err, keys) {
|
|
expect(err).to.not.exist;
|
|
expect(keys).to.not.exist;
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
expect(pubkeyDaoStub.getByUserId.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work if local keys are not already present', function(done) {
|
|
lawnchairDaoStub.list.yields();
|
|
pubkeyDaoStub.getByUserId.yields(null, {
|
|
_id: '12345',
|
|
publicKey: 'asdf'
|
|
});
|
|
lawnchairDaoStub.read.yields(null, {
|
|
_id: '12345',
|
|
publicKey: 'asdf',
|
|
encryptedKey: 'qwer'
|
|
});
|
|
|
|
keychainDao.getUserKeyPair(testUser, function(err, keys) {
|
|
expect(err).to.not.exist;
|
|
expect(keys).to.exist;
|
|
expect(keys.publicKey).to.exist;
|
|
expect(keys.privateKey).to.exist;
|
|
expect(lawnchairDaoStub.list.calledOnce).to.be.true;
|
|
expect(lawnchairDaoStub.read.calledTwice).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('put user keypair', function() {
|
|
it('should fail', function(done) {
|
|
var keypair = {
|
|
publicKey: {
|
|
_id: '12345',
|
|
userId: testUser,
|
|
publicKey: 'asdf'
|
|
},
|
|
privateKey: {
|
|
_id: '12345',
|
|
encryptedKey: 'qwer'
|
|
}
|
|
};
|
|
|
|
keychainDao.putUserKeyPair(keypair, function(err) {
|
|
expect(err).to.exist;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should work', function(done) {
|
|
var keypair = {
|
|
publicKey: {
|
|
_id: '12345',
|
|
userId: testUser,
|
|
publicKey: 'asdf'
|
|
},
|
|
privateKey: {
|
|
_id: '12345',
|
|
userId: testUser,
|
|
encryptedKey: 'qwer'
|
|
}
|
|
};
|
|
|
|
lawnchairDaoStub.persist.yields();
|
|
pubkeyDaoStub.put.yields();
|
|
|
|
keychainDao.putUserKeyPair(keypair, function(err) {
|
|
expect(err).to.not.exist;
|
|
expect(lawnchairDaoStub.persist.calledTwice).to.be.true;
|
|
expect(pubkeyDaoStub.put.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
});
|
|
|
|
}); |