mirror of
https://github.com/moparisthebest/mail
synced 2024-11-13 20:55:05 -05:00
1750 lines
68 KiB
JavaScript
1750 lines
68 KiB
JavaScript
define(function(require) {
|
|
'use strict';
|
|
|
|
var EmailDAO = require('js/dao/email-dao'),
|
|
KeychainDAO = require('js/dao/keychain-dao'),
|
|
ImapClient = require('imap-client'),
|
|
SmtpClient = require('smtp-client'),
|
|
PGP = require('js/crypto/pgp'),
|
|
DeviceStorageDAO = require('js/dao/devicestorage-dao'),
|
|
expect = chai.expect;
|
|
|
|
|
|
describe('Email DAO unit tests', function() {
|
|
var dao, keychainStub, imapClientStub, smtpClientStub, pgpStub, devicestorageStub;
|
|
|
|
var emailAddress, passphrase, asymKeySize, mockkeyId, dummyEncryptedMail,
|
|
dummyDecryptedMail, mockKeyPair, account, publicKey, verificationMail, verificationUuid,
|
|
nonWhitelistedMail;
|
|
|
|
beforeEach(function() {
|
|
emailAddress = 'asdf@asdf.com';
|
|
passphrase = 'asdf';
|
|
asymKeySize = 2048;
|
|
mockkeyId = 1234;
|
|
dummyEncryptedMail = {
|
|
uid: 1234,
|
|
from: [{
|
|
address: 'asd@asd.de'
|
|
}],
|
|
to: [{
|
|
address: 'qwe@qwe.de'
|
|
}],
|
|
subject: '[whiteout] qweasd',
|
|
body: '-----BEGIN PGP MESSAGE-----\nasd\n-----END PGP MESSAGE-----'
|
|
};
|
|
verificationUuid = 'OMFG_FUCKING_BASTARD_UUID_FROM_HELL!';
|
|
verificationMail = {
|
|
from: [{
|
|
name: 'Whiteout Test',
|
|
address: 'whiteout.test@t-online.de'
|
|
}], // sender address
|
|
to: [{
|
|
address: 'safewithme.testuser@gmail.com'
|
|
}], // list of receivers
|
|
subject: "[whiteout] New public key uploaded", // Subject line
|
|
body: 'yadda yadda bla blabla foo bar https://keys.whiteout.io/verify/' + verificationUuid, // plaintext body
|
|
unread: true
|
|
};
|
|
dummyDecryptedMail = {
|
|
uid: 1234,
|
|
from: [{
|
|
address: 'asd@asd.de'
|
|
}],
|
|
to: [{
|
|
address: 'qwe@qwe.de'
|
|
}],
|
|
subject: 'qweasd',
|
|
body: 'asd'
|
|
};
|
|
nonWhitelistedMail = {
|
|
uid: 1234,
|
|
from: [{
|
|
address: 'asd@asd.de'
|
|
}],
|
|
to: [{
|
|
address: 'qwe@qwe.de'
|
|
}],
|
|
subject: 'qweasd',
|
|
body: 'asd'
|
|
};
|
|
mockKeyPair = {
|
|
publicKey: {
|
|
_id: mockkeyId,
|
|
userId: emailAddress,
|
|
publicKey: 'publicpublicpublicpublic'
|
|
},
|
|
privateKey: {
|
|
_id: mockkeyId,
|
|
userId: emailAddress,
|
|
encryptedKey: 'privateprivateprivateprivate'
|
|
}
|
|
};
|
|
account = {
|
|
emailAddress: emailAddress,
|
|
asymKeySize: asymKeySize,
|
|
busy: false
|
|
};
|
|
publicKey = "-----BEGIN PUBLIC KEY-----\r\n" + "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCxy+Te5dyeWd7g0P+8LNO7fZDQ\r\n" + "g96xTb1J6pYE/pPTMlqhB6BRItIYjZ1US5q2vk5Zk/5KasBHAc9RbCqvh9v4XFEY\r\n" + "JVmTXC4p8ft1LYuNWIaDk+R3dyYXmRNct/JC4tks2+8fD3aOvpt0WNn3R75/FGBt\r\n" + "h4BgojAXDE+PRQtcVQIDAQAB\r\n" + "-----END PUBLIC KEY-----";
|
|
|
|
keychainStub = sinon.createStubInstance(KeychainDAO);
|
|
imapClientStub = sinon.createStubInstance(ImapClient);
|
|
smtpClientStub = sinon.createStubInstance(SmtpClient);
|
|
pgpStub = sinon.createStubInstance(PGP);
|
|
devicestorageStub = sinon.createStubInstance(DeviceStorageDAO);
|
|
|
|
dao = new EmailDAO(keychainStub, imapClientStub, smtpClientStub, pgpStub, devicestorageStub);
|
|
dao._account = account;
|
|
|
|
expect(dao._keychain).to.equal(keychainStub);
|
|
expect(dao._imapClient).to.equal(imapClientStub);
|
|
expect(dao._smtpClient).to.equal(smtpClientStub);
|
|
expect(dao._crypto).to.equal(pgpStub);
|
|
expect(dao._devicestorage).to.equal(devicestorageStub);
|
|
});
|
|
|
|
afterEach(function() {});
|
|
|
|
describe('push', function() {
|
|
it('should work', function(done) {
|
|
var o = {};
|
|
|
|
dao.onIncomingMessage = function(obj) {
|
|
expect(obj).to.equal(o);
|
|
done();
|
|
};
|
|
|
|
dao._imapClient.onIncomingMessage(o);
|
|
});
|
|
});
|
|
|
|
describe('init', function() {
|
|
beforeEach(function() {
|
|
delete dao._account;
|
|
});
|
|
|
|
it('should init', function(done) {
|
|
var loginStub, listFolderStub, folders;
|
|
|
|
folders = [];
|
|
|
|
// initKeychain
|
|
devicestorageStub.init.withArgs(emailAddress).yields();
|
|
keychainStub.getUserKeyPair.yields(null, mockKeyPair);
|
|
|
|
// initFolders
|
|
loginStub = sinon.stub(dao, '_imapLogin');
|
|
listFolderStub = sinon.stub(dao, '_imapListFolders');
|
|
loginStub.yields();
|
|
listFolderStub.yields(null, folders);
|
|
|
|
dao.init({
|
|
account: account
|
|
}, function(err, keyPair) {
|
|
expect(err).to.not.exist;
|
|
expect(keyPair).to.equal(mockKeyPair);
|
|
|
|
expect(dao._account).to.equal(account);
|
|
expect(dao._account.folders).to.equal(folders);
|
|
expect(devicestorageStub.init.calledOnce).to.be.true;
|
|
expect(keychainStub.getUserKeyPair.calledOnce).to.be.true;
|
|
|
|
expect(loginStub.calledOnce).to.be.true;
|
|
expect(listFolderStub.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail due to error while listing folders', function(done) {
|
|
var loginStub, listFolderStub;
|
|
|
|
// initKeychain
|
|
devicestorageStub.init.withArgs(emailAddress).yields();
|
|
keychainStub.getUserKeyPair.yields(null, mockKeyPair);
|
|
|
|
// initFolders
|
|
loginStub = sinon.stub(dao, '_imapLogin');
|
|
listFolderStub = sinon.stub(dao, '_imapListFolders');
|
|
loginStub.yields();
|
|
listFolderStub.yields({});
|
|
|
|
dao.init({
|
|
account: account
|
|
}, function(err, keyPair) {
|
|
expect(err).to.exist;
|
|
expect(keyPair).to.not.exist;
|
|
|
|
expect(dao._account).to.equal(account);
|
|
expect(devicestorageStub.init.calledOnce).to.be.true;
|
|
expect(keychainStub.getUserKeyPair.calledOnce).to.be.true;
|
|
|
|
expect(loginStub.calledOnce).to.be.true;
|
|
expect(listFolderStub.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail due to error during imap login', function(done) {
|
|
var loginStub = sinon.stub(dao, '_imapLogin');
|
|
|
|
// initKeychain
|
|
devicestorageStub.init.withArgs(emailAddress).yields();
|
|
keychainStub.getUserKeyPair.yields(null, mockKeyPair);
|
|
|
|
// initFolders
|
|
loginStub.yields({});
|
|
|
|
dao.init({
|
|
account: account
|
|
}, function(err, keyPair) {
|
|
expect(err).to.exist;
|
|
expect(keyPair).to.not.exist;
|
|
|
|
expect(dao._account).to.equal(account);
|
|
expect(devicestorageStub.init.calledOnce).to.be.true;
|
|
expect(keychainStub.getUserKeyPair.calledOnce).to.be.true;
|
|
|
|
expect(loginStub.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail due to error in getUserKeyPair', function(done) {
|
|
devicestorageStub.init.yields();
|
|
keychainStub.getUserKeyPair.yields({});
|
|
|
|
dao.init({
|
|
account: account
|
|
}, function(err, keyPair) {
|
|
expect(err).to.exist;
|
|
expect(keyPair).to.not.exist;
|
|
|
|
expect(devicestorageStub.init.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('unlock', function() {
|
|
it('should unlock', function(done) {
|
|
var importMatcher = sinon.match(function(o) {
|
|
expect(o.passphrase).to.equal(passphrase);
|
|
expect(o.privateKeyArmored).to.equal(mockKeyPair.privateKey.encryptedKey);
|
|
expect(o.publicKeyArmored).to.equal(mockKeyPair.publicKey.publicKey);
|
|
return true;
|
|
});
|
|
|
|
pgpStub.importKeys.withArgs(importMatcher).yields();
|
|
|
|
dao.unlock({
|
|
passphrase: passphrase,
|
|
keypair: mockKeyPair
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
expect(pgpStub.importKeys.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should generate a keypair and unlock', function(done) {
|
|
var genKeysMatcher, persistKeysMatcher, importMatcher, keypair;
|
|
|
|
keypair = {
|
|
keyId: 123,
|
|
publicKeyArmored: mockKeyPair.publicKey.publicKey,
|
|
privateKeyArmored: mockKeyPair.privateKey.encryptedKey
|
|
};
|
|
genKeysMatcher = sinon.match(function(o) {
|
|
expect(o.emailAddress).to.equal(emailAddress);
|
|
expect(o.keySize).to.equal(asymKeySize);
|
|
expect(o.passphrase).to.equal(passphrase);
|
|
return true;
|
|
});
|
|
importMatcher = sinon.match(function(o) {
|
|
expect(o.passphrase).to.equal(passphrase);
|
|
expect(o.privateKeyArmored).to.equal(mockKeyPair.privateKey.encryptedKey);
|
|
expect(o.publicKeyArmored).to.equal(mockKeyPair.publicKey.publicKey);
|
|
return true;
|
|
});
|
|
persistKeysMatcher = sinon.match(function(o) {
|
|
expect(o).to.deep.equal(mockKeyPair);
|
|
return true;
|
|
});
|
|
|
|
|
|
pgpStub.generateKeys.withArgs(genKeysMatcher).yields(null, keypair);
|
|
pgpStub.importKeys.withArgs(importMatcher).yields();
|
|
keychainStub.putUserKeyPair.withArgs().yields();
|
|
|
|
dao.unlock({
|
|
passphrase: passphrase
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
expect(pgpStub.generateKeys.calledOnce).to.be.true;
|
|
expect(pgpStub.importKeys.calledOnce).to.be.true;
|
|
expect(keychainStub.putUserKeyPair.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail when persisting fails', function(done) {
|
|
var keypair = {
|
|
keyId: 123,
|
|
publicKeyArmored: 'qwerty',
|
|
privateKeyArmored: 'asdfgh'
|
|
};
|
|
pgpStub.generateKeys.yields(null, keypair);
|
|
pgpStub.importKeys.withArgs().yields();
|
|
keychainStub.putUserKeyPair.yields({});
|
|
|
|
dao.unlock({
|
|
passphrase: passphrase
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(pgpStub.generateKeys.calledOnce).to.be.true;
|
|
expect(pgpStub.importKeys.calledOnce).to.be.true;
|
|
expect(keychainStub.putUserKeyPair.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail when import fails', function(done) {
|
|
var keypair = {
|
|
keyId: 123,
|
|
publicKeyArmored: 'qwerty',
|
|
privateKeyArmored: 'asdfgh'
|
|
};
|
|
|
|
pgpStub.generateKeys.withArgs().yields(null, keypair);
|
|
pgpStub.importKeys.withArgs().yields({});
|
|
|
|
dao.unlock({
|
|
passphrase: passphrase
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(pgpStub.generateKeys.calledOnce).to.be.true;
|
|
expect(pgpStub.importKeys.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail when generation fails', function(done) {
|
|
pgpStub.generateKeys.yields({});
|
|
|
|
dao.unlock({
|
|
passphrase: passphrase
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(pgpStub.generateKeys.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('_imapLogin', function() {
|
|
it('should work', function(done) {
|
|
imapClientStub.login.yields();
|
|
|
|
dao._imapLogin(function(err) {
|
|
expect(err).to.not.exist;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail due to error in imap login', function(done) {
|
|
imapClientStub.login.yields({});
|
|
|
|
dao._imapLogin(function(err) {
|
|
expect(err).to.exist;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('_imapLogout', function() {
|
|
it('should work', function(done) {
|
|
imapClientStub.logout.yields();
|
|
|
|
dao._imapLogout(function(err) {
|
|
expect(err).to.not.exist;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail due to error in imap login', function(done) {
|
|
imapClientStub.logout.yields({});
|
|
|
|
dao._imapLogout(function(err) {
|
|
expect(err).to.exist;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('_imapListFolders', function() {
|
|
var dummyFolders = [{
|
|
type: 'Inbox',
|
|
path: 'INBOX'
|
|
}, {
|
|
type: 'Outbox',
|
|
path: 'OUTBOX'
|
|
}];
|
|
|
|
it('should list from storage', function(done) {
|
|
devicestorageStub.listItems.withArgs('folders').yields(null, [dummyFolders]);
|
|
|
|
dao._imapListFolders(function(err, folders) {
|
|
expect(err).to.not.exist;
|
|
expect(devicestorageStub.listItems.calledOnce).to.be.true;
|
|
expect(folders[0].type).to.equal('Inbox');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not list from storage due to error', function(done) {
|
|
devicestorageStub.listItems.yields({});
|
|
|
|
dao._imapListFolders(function(err, folders) {
|
|
expect(err).to.exist;
|
|
expect(folders).to.not.exist;
|
|
expect(devicestorageStub.listItems.calledOnce).to.be.true;
|
|
expect(imapClientStub.listWellKnownFolders.called).to.be.false;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should list from imap', function(done) {
|
|
devicestorageStub.listItems.yields(null, []);
|
|
imapClientStub.listWellKnownFolders.yields(null, {
|
|
inbox: dummyFolders[0]
|
|
});
|
|
devicestorageStub.storeList.yields();
|
|
|
|
dao._imapListFolders(function(err, folders) {
|
|
expect(err).to.not.exist;
|
|
expect(devicestorageStub.listItems.calledOnce).to.be.true;
|
|
expect(imapClientStub.listWellKnownFolders.calledOnce).to.be.true;
|
|
expect(devicestorageStub.storeList.calledOnce).to.be.true;
|
|
expect(folders[0].type).to.equal('Inbox');
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not list from imap due to store error', function(done) {
|
|
devicestorageStub.listItems.yields(null, []);
|
|
imapClientStub.listWellKnownFolders.yields(null, {
|
|
inbox: dummyFolders[0]
|
|
});
|
|
devicestorageStub.storeList.yields({});
|
|
|
|
dao._imapListFolders(function(err, folders) {
|
|
expect(err).to.exist;
|
|
expect(folders).to.not.exist;
|
|
expect(devicestorageStub.listItems.calledOnce).to.be.true;
|
|
expect(imapClientStub.listWellKnownFolders.calledOnce).to.be.true;
|
|
expect(devicestorageStub.storeList.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not list from imap due to imap error', function(done) {
|
|
devicestorageStub.listItems.yields(null, []);
|
|
imapClientStub.listWellKnownFolders.yields({});
|
|
|
|
dao._imapListFolders(function(err, folders) {
|
|
expect(err).to.exist;
|
|
expect(folders).to.not.exist;
|
|
expect(devicestorageStub.listItems.calledOnce).to.be.true;
|
|
expect(imapClientStub.listWellKnownFolders.calledOnce).to.be.true;
|
|
expect(devicestorageStub.storeList.called).to.be.false;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('_imapListMessages', function() {
|
|
it('should work', function(done) {
|
|
var path = 'FOLDAAAA';
|
|
|
|
imapClientStub.listMessages.withArgs({
|
|
path: path,
|
|
offset: 0,
|
|
length: 100
|
|
}).yields();
|
|
|
|
dao._imapListMessages({
|
|
folder: path
|
|
}, done);
|
|
});
|
|
});
|
|
|
|
describe('_imapDeleteMessage', function() {
|
|
it('should work', function(done) {
|
|
var path = 'FOLDAAAA',
|
|
uid = 1337;
|
|
|
|
imapClientStub.deleteMessage.withArgs({
|
|
path: path,
|
|
uid: uid
|
|
}).yields();
|
|
|
|
dao._imapDeleteMessage({
|
|
folder: path,
|
|
uid: uid
|
|
}, done);
|
|
});
|
|
});
|
|
|
|
describe('_imapGetMessage', function() {
|
|
it('should work', function(done) {
|
|
var path = 'FOLDAAAA',
|
|
uid = 1337;
|
|
|
|
imapClientStub.getMessagePreview.withArgs({
|
|
path: path,
|
|
uid: uid
|
|
}).yields();
|
|
|
|
dao._imapGetMessage({
|
|
folder: path,
|
|
uid: uid
|
|
}, done);
|
|
});
|
|
});
|
|
|
|
describe('_localListMessages', function() {
|
|
it('should work', function(done) {
|
|
var folder = 'FOLDAAAA';
|
|
devicestorageStub.listItems.withArgs('email_' + folder, 0, null).yields();
|
|
|
|
dao._localListMessages({
|
|
folder: folder
|
|
}, done);
|
|
});
|
|
});
|
|
|
|
describe('_localStoreMessages', function() {
|
|
it('should work', function(done) {
|
|
var folder = 'FOLDAAAA',
|
|
emails = [{}];
|
|
devicestorageStub.storeList.withArgs(emails, 'email_' + folder).yields();
|
|
|
|
dao._localStoreMessages({
|
|
folder: folder,
|
|
emails: emails
|
|
}, done);
|
|
});
|
|
});
|
|
|
|
describe('_localDeleteMessage', function() {
|
|
it('should work', function(done) {
|
|
var folder = 'FOLDAAAA',
|
|
uid = 1337;
|
|
devicestorageStub.removeList.withArgs('email_' + folder + '_' + uid).yields();
|
|
|
|
dao._localDeleteMessage({
|
|
folder: folder,
|
|
uid: uid
|
|
}, done);
|
|
});
|
|
|
|
it('should fail when uid is missing', function(done) {
|
|
var folder = 'FOLDAAAA';
|
|
|
|
dao._localDeleteMessage({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('sync', function() {
|
|
it('should work initially', function(done) {
|
|
var folder, localListStub, invocations, imapListStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, [dummyEncryptedMail]);
|
|
keychainStub.getReceiverPublicKey.withArgs(dummyEncryptedMail.from[0].address).yields(null, mockKeyPair);
|
|
pgpStub.decrypt.withArgs(dummyEncryptedMail.body, mockKeyPair.publicKey).yields(null, dummyDecryptedMail.body);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, [{
|
|
uid: dummyEncryptedMail.uid,
|
|
subject: '[whiteout] ' + dummyEncryptedMail // the object has already been manipulated as a side-effect...
|
|
}]);
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.not.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true;
|
|
expect(pgpStub.decrypt.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should initially error on decryption', function(done) {
|
|
var folder, localListStub, invocations;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, [dummyEncryptedMail]);
|
|
keychainStub.getReceiverPublicKey.yields({});
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should initially sync downstream when storage is empty', function(done) {
|
|
var folder, localListStub, localStoreStub, invocations, imapListStub, imapGetStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, []);
|
|
keychainStub.getReceiverPublicKey.withArgs(dummyEncryptedMail.from[0].address).yields(null, mockKeyPair);
|
|
pgpStub.decrypt.withArgs(dummyEncryptedMail.body, mockKeyPair.publicKey).yields(null, dummyDecryptedMail.body);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, [dummyEncryptedMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').withArgs({
|
|
folder: folder,
|
|
uid: dummyEncryptedMail.uid
|
|
}).yields(null, dummyEncryptedMail);
|
|
localStoreStub = sinon.stub(dao, '_localStoreMessages').yields();
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.not.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(localStoreStub.calledOnce).to.be.true;
|
|
expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true;
|
|
expect(pgpStub.decrypt.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not work when busy', function(done) {
|
|
dao._account.busy = true;
|
|
|
|
dao.sync({
|
|
folder: 'OOGA'
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fetch messages downstream from the remote', function(done) {
|
|
dao.sync({}, function(err) {
|
|
expect(err).to.exist;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not work when initial setup errors', function(done) {
|
|
var folder, localListStub;
|
|
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields({});
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should be up to date', function(done) {
|
|
var folder, localListStub, imapListStub, invocations;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: [dummyDecryptedMail]
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, [dummyEncryptedMail]);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, [dummyEncryptedMail]);
|
|
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0]).to.not.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while listing from imap', function(done) {
|
|
var folder, localListStub, imapListStub, invocations;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: [dummyDecryptedMail]
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, [dummyEncryptedMail]);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields({});
|
|
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
|
|
if (invocations === 0) {
|
|
expect(err).to.not.exist;
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(err).to.exist;
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0]).to.not.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while listing local messages', function(done) {
|
|
var folder, localListStub;
|
|
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: [dummyDecryptedMail]
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields({});
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should remove messages from the remote', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, localDeleteStub, imapDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, [dummyEncryptedMail]);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, []);
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage').yields();
|
|
localDeleteStub = sinon.stub(dao, '_localDeleteMessage').yields();
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(localDeleteStub.calledOnce).to.be.true;
|
|
expect(imapDeleteStub.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error whilte removing messages from local', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, localDeleteStub, imapDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, [dummyEncryptedMail]);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, []);
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage').yields();
|
|
localDeleteStub = sinon.stub(dao, '_localDeleteMessage').yields({});
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.called).to.be.false;
|
|
expect(localDeleteStub.calledOnce).to.be.true;
|
|
expect(imapDeleteStub.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while removing messages from the remote', function(done) {
|
|
var folder, localListStub, imapListStub, localDeleteStub, imapDeleteStub;
|
|
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, [dummyEncryptedMail]);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, []);
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage').yields({});
|
|
localDeleteStub = sinon.stub(dao, '_localDeleteMessage');
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapDeleteStub.calledOnce).to.be.true;
|
|
expect(localDeleteStub.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should delete messages locally if not present on remote', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, localDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: [dummyDecryptedMail]
|
|
}];
|
|
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, [dummyEncryptedMail]);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, []);
|
|
localDeleteStub = sinon.stub(dao, '_localDeleteMessage').withArgs({
|
|
folder: folder,
|
|
uid: dummyEncryptedMail.uid
|
|
}).yields();
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(localDeleteStub.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
|
|
});
|
|
|
|
it('should error while deleting locally if not present on remote', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, localDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: [dummyDecryptedMail]
|
|
}];
|
|
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, [dummyEncryptedMail]);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, []);
|
|
localDeleteStub = sinon.stub(dao, '_localDeleteMessage').yields({});
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
if (invocations === 0) {
|
|
expect(err).to.not.exist;
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(err).to.exist;
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(localDeleteStub.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
|
|
});
|
|
|
|
it('should fetch messages downstream from the remote', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, imapGetStub, localStoreStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').withArgs({
|
|
folder: folder
|
|
}).yields(null, [dummyEncryptedMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').withArgs({
|
|
folder: folder,
|
|
uid: dummyEncryptedMail.uid
|
|
}).yields(null, dummyEncryptedMail);
|
|
localStoreStub = sinon.stub(dao, '_localStoreMessages').yields();
|
|
keychainStub.getReceiverPublicKey.withArgs(dummyEncryptedMail.from[0].address).yields(null, mockKeyPair);
|
|
pgpStub.decrypt.withArgs(dummyEncryptedMail.body, mockKeyPair.publicKey).yields(null, dummyDecryptedMail.body);
|
|
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.not.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(localStoreStub.calledOnce).to.be.true;
|
|
expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true;
|
|
expect(pgpStub.decrypt.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should not fetch non-whitelisted mails', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, imapGetStub, localStoreStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [nonWhitelistedMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, nonWhitelistedMail);
|
|
localStoreStub = sinon.stub(dao, '_localStoreMessages').yields();
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.called).to.be.false;
|
|
expect(localStoreStub.called).to.be.false;
|
|
expect(keychainStub.getReceiverPublicKey.called).to.be.false;
|
|
expect(pgpStub.decrypt.called).to.be.false;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while decrypting fetch messages from the remote', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, imapGetStub, localStoreStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [dummyEncryptedMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, dummyEncryptedMail);
|
|
localStoreStub = sinon.stub(dao, '_localStoreMessages').yields();
|
|
keychainStub.getReceiverPublicKey.yields({});
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
|
|
if (invocations === 0) {
|
|
expect(err).to.not.exist;
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(err).to.exist;
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(localStoreStub.calledOnce).to.be.true;
|
|
expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true;
|
|
expect(pgpStub.decrypt.called).to.be.false;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while storing messages from the remote locally', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, imapGetStub, localStoreStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [dummyEncryptedMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, dummyEncryptedMail);
|
|
localStoreStub = sinon.stub(dao, '_localStoreMessages').yields({});
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
|
|
if (invocations === 0) {
|
|
expect(err).to.not.exist;
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(err).to.exist;
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(localStoreStub.calledOnce).to.be.true;
|
|
expect(keychainStub.getReceiverPublicKey.called).to.be.false;
|
|
expect(pgpStub.decrypt.called).to.be.false;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should error while fetching messages from the remote', function(done) {
|
|
var invocations, folder, localListStub, imapListStub, imapGetStub, localStoreStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [dummyEncryptedMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields({});
|
|
localStoreStub = sinon.stub(dao, '_localStoreMessages');
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
|
|
if (invocations === 0) {
|
|
expect(err).to.not.exist;
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(err).to.exist;
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(localStoreStub.called).to.be.false;
|
|
expect(keychainStub.getReceiverPublicKey.called).to.be.false;
|
|
expect(pgpStub.decrypt.called).to.be.false;
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should verify an authentication mail', function(done) {
|
|
var invocations, folder, localListStub, imapListStub,
|
|
imapGetStub, markReadStub, imapDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [verificationMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, verificationMail);
|
|
keychainStub.verifyPublicKey.withArgs(verificationUuid).yields();
|
|
markReadStub = sinon.stub(dao, 'markRead').withArgs({
|
|
folder: folder,
|
|
uid: verificationMail.uid
|
|
}).yields();
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage').withArgs({
|
|
folder: folder,
|
|
uid: verificationMail.uid
|
|
}).yields();
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(keychainStub.verifyPublicKey.calledOnce).to.be.true;
|
|
expect(markReadStub.calledOnce).to.be.true;
|
|
expect(imapDeleteStub.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('should fail during deletion of an authentication mail', function(done) {
|
|
var invocations, folder, localListStub, imapListStub,
|
|
imapGetStub, markReadStub, imapDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [verificationMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, verificationMail);
|
|
keychainStub.verifyPublicKey.yields();
|
|
markReadStub = sinon.stub(dao, 'markRead').yields();
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage').yields({});
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
|
|
if (invocations === 0) {
|
|
expect(err).to.not.exist;
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(err).to.exist;
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(keychainStub.verifyPublicKey.calledOnce).to.be.true;
|
|
expect(markReadStub.calledOnce).to.be.true;
|
|
expect(imapDeleteStub.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should fail during marking an authentication mail read', function(done) {
|
|
var invocations, folder, localListStub, imapListStub,
|
|
imapGetStub, markReadStub, imapDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [verificationMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, verificationMail);
|
|
keychainStub.verifyPublicKey.yields();
|
|
markReadStub = sinon.stub(dao, 'markRead').yields({});
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage');
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
|
|
if (invocations === 0) {
|
|
expect(err).to.not.exist;
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(err).to.exist;
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(keychainStub.verifyPublicKey.calledOnce).to.be.true;
|
|
expect(markReadStub.calledOnce).to.be.true;
|
|
expect(imapDeleteStub.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should fail during verifying authentication', function(done) {
|
|
var invocations, folder, localListStub, imapListStub,
|
|
imapGetStub, markReadStub, imapDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [verificationMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, verificationMail);
|
|
keychainStub.verifyPublicKey.yields({});
|
|
markReadStub = sinon.stub(dao, 'markRead');
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage');
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
|
|
if (invocations === 0) {
|
|
expect(err).to.not.exist;
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(err).to.exist;
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(keychainStub.verifyPublicKey.calledOnce).to.be.true;
|
|
expect(markReadStub.called).to.be.false;
|
|
expect(imapDeleteStub.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should not bother about read authentication mails', function(done) {
|
|
var invocations, folder, localListStub, imapListStub,
|
|
imapGetStub, markReadStub, imapDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
verificationMail.unread = false;
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [verificationMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, verificationMail);
|
|
markReadStub = sinon.stub(dao, 'markRead');
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage');
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(keychainStub.verifyPublicKey.called).to.be.false;
|
|
expect(markReadStub.called).to.be.false;
|
|
expect(imapDeleteStub.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should not bother about read authentication mails', function(done) {
|
|
var invocations, folder, localListStub, imapListStub,
|
|
imapGetStub, markReadStub, imapDeleteStub;
|
|
|
|
invocations = 0;
|
|
folder = 'FOLDAAAA';
|
|
dao._account.folders = [{
|
|
type: 'Folder',
|
|
path: folder,
|
|
messages: []
|
|
}];
|
|
|
|
verificationMail.body = 'url? there is no url.';
|
|
|
|
localListStub = sinon.stub(dao, '_localListMessages').yields(null, []);
|
|
imapListStub = sinon.stub(dao, '_imapListMessages').yields(null, [verificationMail]);
|
|
imapGetStub = sinon.stub(dao, '_imapGetMessage').yields(null, verificationMail);
|
|
markReadStub = sinon.stub(dao, 'markRead');
|
|
imapDeleteStub = sinon.stub(dao, '_imapDeleteMessage');
|
|
|
|
dao.sync({
|
|
folder: folder
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
if (invocations === 0) {
|
|
expect(dao._account.busy).to.be.true;
|
|
invocations++;
|
|
return;
|
|
}
|
|
|
|
expect(dao._account.busy).to.be.false;
|
|
expect(dao._account.folders[0].messages).to.be.empty;
|
|
expect(localListStub.calledOnce).to.be.true;
|
|
expect(imapListStub.calledOnce).to.be.true;
|
|
expect(imapGetStub.calledOnce).to.be.true;
|
|
expect(keychainStub.verifyPublicKey.called).to.be.false;
|
|
expect(markReadStub.called).to.be.false;
|
|
expect(imapDeleteStub.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('markAsRead', function() {
|
|
it('should work', function(done) {
|
|
imapClientStub.updateFlags.withArgs({
|
|
path: 'asdf',
|
|
uid: 1,
|
|
unread: false
|
|
}).yields();
|
|
|
|
dao.markRead({
|
|
folder: 'asdf',
|
|
uid: 1
|
|
}, function(err) {
|
|
expect(imapClientStub.updateFlags.calledOnce).to.be.true;
|
|
expect(err).to.not.exist;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('markAsAnswered', function() {
|
|
it('should work', function(done) {
|
|
imapClientStub.updateFlags.withArgs({
|
|
path: 'asdf',
|
|
uid: 1,
|
|
answered: true
|
|
}).yields();
|
|
|
|
dao.markAnswered({
|
|
folder: 'asdf',
|
|
uid: 1
|
|
}, function(err) {
|
|
expect(imapClientStub.updateFlags.calledOnce).to.be.true;
|
|
expect(err).to.not.exist;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('move', function() {
|
|
it('should work', function(done) {
|
|
imapClientStub.moveMessage.withArgs({
|
|
path: 'asdf',
|
|
uid: 1,
|
|
destination: 'asdasd'
|
|
}).yields();
|
|
|
|
dao.move({
|
|
folder: 'asdf',
|
|
uid: 1,
|
|
destination: 'asdasd'
|
|
}, function(err) {
|
|
expect(imapClientStub.moveMessage.calledOnce).to.be.true;
|
|
expect(err).to.not.exist;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('sendPlaintext', function() {
|
|
it('should work', function(done) {
|
|
smtpClientStub.send.withArgs(dummyEncryptedMail).yields();
|
|
|
|
dao.sendPlaintext({
|
|
email: dummyEncryptedMail
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
expect(smtpClientStub.send.calledOnce).to.be.true;
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('sendEncrypted', function() {
|
|
it('should work', function(done) {
|
|
var encryptStub = sinon.stub(dao, '_encrypt').yields(null, {});
|
|
keychainStub.getReceiverPublicKey.withArgs(dummyDecryptedMail.to[0].address).yields(null, {
|
|
_id: "fcf8b4aa-5d09-4089-8b4f-e3bc5091daf3",
|
|
userId: dummyDecryptedMail.to[0].address,
|
|
publicKey: publicKey
|
|
});
|
|
smtpClientStub.send.yields();
|
|
|
|
dao.sendEncrypted({
|
|
email: dummyDecryptedMail
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true;
|
|
expect(encryptStub.calledOnce).to.be.true;
|
|
expect(smtpClientStub.send.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should not work when encryption fails', function(done) {
|
|
var encryptStub = sinon.stub(dao, '_encrypt').yields({});
|
|
keychainStub.getReceiverPublicKey.withArgs(dummyDecryptedMail.to[0].address).yields(null, {
|
|
_id: "fcf8b4aa-5d09-4089-8b4f-e3bc5091daf3",
|
|
userId: dummyDecryptedMail.to[0].address,
|
|
publicKey: publicKey
|
|
});
|
|
|
|
dao.sendEncrypted({
|
|
email: dummyDecryptedMail
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true;
|
|
expect(encryptStub.calledOnce).to.be.true;
|
|
expect(smtpClientStub.send.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should not work when key retrieval fails', function(done) {
|
|
var encryptStub = sinon.stub(dao, '_encrypt');
|
|
keychainStub.getReceiverPublicKey.withArgs(dummyDecryptedMail.to[0].address).yields({});
|
|
|
|
dao.sendEncrypted({
|
|
email: dummyDecryptedMail
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(keychainStub.getReceiverPublicKey.calledOnce).to.be.true;
|
|
expect(encryptStub.called).to.be.false;
|
|
expect(smtpClientStub.send.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should not work invalid recipients', function(done) {
|
|
var encryptStub = sinon.stub(dao, '_encrypt');
|
|
dummyDecryptedMail.to[0].address = 'asd@asd';
|
|
|
|
dao.sendEncrypted({
|
|
email: dummyDecryptedMail
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(keychainStub.getReceiverPublicKey.called).to.be.false;
|
|
expect(encryptStub.called).to.be.false;
|
|
expect(smtpClientStub.send.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should not work with without sender', function(done) {
|
|
var encryptStub = sinon.stub(dao, '_encrypt');
|
|
dummyDecryptedMail.from[0].address = 'asd@asd';
|
|
|
|
dao.sendEncrypted({
|
|
email: dummyDecryptedMail
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(keychainStub.getReceiverPublicKey.called).to.be.false;
|
|
expect(encryptStub.called).to.be.false;
|
|
expect(smtpClientStub.send.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should not work without recipients', function(done) {
|
|
var encryptStub = sinon.stub(dao, '_encrypt');
|
|
delete dummyDecryptedMail.to;
|
|
|
|
dao.sendEncrypted({
|
|
email: dummyDecryptedMail
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(keychainStub.getReceiverPublicKey.called).to.be.false;
|
|
expect(encryptStub.called).to.be.false;
|
|
expect(smtpClientStub.send.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
it('should not work with without sender', function(done) {
|
|
var encryptStub = sinon.stub(dao, '_encrypt');
|
|
delete dummyDecryptedMail.from;
|
|
|
|
dao.sendEncrypted({
|
|
email: dummyDecryptedMail
|
|
}, function(err) {
|
|
expect(err).to.exist;
|
|
|
|
expect(keychainStub.getReceiverPublicKey.called).to.be.false;
|
|
expect(encryptStub.called).to.be.false;
|
|
expect(smtpClientStub.send.called).to.be.false;
|
|
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('_encrypt', function() {
|
|
it('should work without attachments', function(done) {
|
|
var ct = 'OMGSOENCRYPTED';
|
|
|
|
pgpStub.exportKeys.yields(null, {
|
|
privateKeyArmored: mockKeyPair.privateKey.encryptedKey,
|
|
publicKeyArmored: mockKeyPair.publicKey.publicKey
|
|
});
|
|
pgpStub.encrypt.yields(null, ct);
|
|
|
|
dao._encrypt({
|
|
email: dummyDecryptedMail
|
|
}, function(err) {
|
|
expect(err).to.not.exist;
|
|
|
|
expect(pgpStub.exportKeys.calledOnce).to.be.true;
|
|
expect(pgpStub.encrypt.calledOnce).to.be.true;
|
|
expect(dummyDecryptedMail.body).to.contain(ct);
|
|
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('store', function() {
|
|
it('should work', function(done) {
|
|
pgpStub.exportKeys.yields(null, {
|
|
publicKeyArmored: 'omgsocrypto'
|
|
});
|
|
pgpStub.encrypt.yields(null, 'asdfasfd');
|
|
devicestorageStub.storeList.yields();
|
|
|
|
dao.store(dummyDecryptedMail, function(err) {
|
|
expect(err).to.not.exist;
|
|
expect(pgpStub.exportKeys.calledOnce).to.be.true;
|
|
expect(pgpStub.encrypt.calledOnce).to.be.true;
|
|
expect(devicestorageStub.storeList.calledOnce).to.be.true;
|
|
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('list', function() {
|
|
it('should work', function(done) {
|
|
devicestorageStub.listItems.yields(null, [dummyEncryptedMail]);
|
|
pgpStub.exportKeys.yields(null, {
|
|
publicKeyArmored: 'omgsocrypto'
|
|
});
|
|
pgpStub.decrypt.yields(null, dummyDecryptedMail.body);
|
|
|
|
dao.list(function(err, mails) {
|
|
expect(err).to.not.exist;
|
|
|
|
expect(devicestorageStub.listItems.calledOnce).to.be.true;
|
|
expect(pgpStub.exportKeys.calledOnce).to.be.true;
|
|
expect(pgpStub.decrypt.calledOnce).to.be.true;
|
|
expect(mails.length).to.equal(1);
|
|
expect(mails[0].body).to.equal(dummyDecryptedMail.body);
|
|
expect(mails[0].subject).to.equal(dummyDecryptedMail.subject);
|
|
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
});
|
|
}); |