mirror of
https://github.com/moparisthebest/mail
synced 2024-11-26 19:02:20 -05:00
122 lines
4.1 KiB
JavaScript
122 lines
4.1 KiB
JavaScript
'use strict';
|
|
|
|
var mocks = angular.mocks,
|
|
SetPassphraseCtrl = require('../../src/js/controller/set-passphrase'),
|
|
PGP = require('../../src/js/crypto/pgp'),
|
|
appController = require('../../src/js/app-controller'),
|
|
KeychainDAO = require('../../src/js/dao/keychain-dao');
|
|
|
|
describe('Set Passphrase Controller unit test', function() {
|
|
var scope, setPassphraseCtrl,
|
|
dummyFingerprint, expectedFingerprint,
|
|
dummyKeyId, expectedKeyId,
|
|
emailAddress, keySize, cryptoMock, keychainMock;
|
|
|
|
beforeEach(function() {
|
|
appController._pgp = cryptoMock = sinon.createStubInstance(PGP);
|
|
appController._keychain = keychainMock = sinon.createStubInstance(KeychainDAO);
|
|
|
|
dummyFingerprint = '3A2D39B4E1404190B8B949DE7D7E99036E712926';
|
|
expectedFingerprint = '3A2D 39B4 E140 4190 B8B9 49DE 7D7E 9903 6E71 2926';
|
|
dummyKeyId = '9FEB47936E712926';
|
|
expectedKeyId = '6E712926';
|
|
cryptoMock.getFingerprint.returns(dummyFingerprint);
|
|
cryptoMock.getKeyId.returns(dummyKeyId);
|
|
emailAddress = 'fred@foo.com';
|
|
keySize = 1234;
|
|
|
|
cryptoMock.getKeyParams.returns({
|
|
_id: dummyKeyId,
|
|
fingerprint: dummyFingerprint,
|
|
userId: emailAddress,
|
|
userIds: [],
|
|
bitSize: keySize
|
|
});
|
|
|
|
angular.module('setpassphrasetest', []);
|
|
mocks.module('setpassphrasetest');
|
|
mocks.inject(function($rootScope, $controller) {
|
|
scope = $rootScope.$new();
|
|
scope.state = {};
|
|
setPassphraseCtrl = $controller(SetPassphraseCtrl, {
|
|
$scope: scope
|
|
});
|
|
});
|
|
});
|
|
|
|
afterEach(function() {});
|
|
|
|
describe('setPassphrase', function() {
|
|
it('should work', function(done) {
|
|
scope.oldPassphrase = 'old';
|
|
scope.newPassphrase = 'new';
|
|
|
|
keychainMock.lookupPrivateKey.withArgs(dummyKeyId).yields(null, {
|
|
encryptedKey: 'encrypted'
|
|
});
|
|
|
|
cryptoMock.changePassphrase.withArgs({
|
|
privateKeyArmored: 'encrypted',
|
|
oldPassphrase: 'old',
|
|
newPassphrase: 'new'
|
|
}).yields(null, 'newArmoredKey');
|
|
|
|
keychainMock.saveLocalPrivateKey.withArgs({
|
|
_id: dummyKeyId,
|
|
userId: emailAddress,
|
|
userIds: [],
|
|
encryptedKey: 'newArmoredKey'
|
|
}).yields();
|
|
|
|
scope.onError = function(err) {
|
|
expect(err.title).to.equal('Success');
|
|
done();
|
|
};
|
|
|
|
scope.setPassphrase();
|
|
});
|
|
});
|
|
|
|
describe('check passphrase quality', function() {
|
|
it('should be too short', function() {
|
|
scope.newPassphrase = '&§DG36';
|
|
scope.checkPassphraseQuality();
|
|
|
|
expect(scope.passphraseMsg).to.equal('Very weak');
|
|
expect(scope.passphraseRating).to.equal(0);
|
|
});
|
|
|
|
it('should be very weak', function() {
|
|
scope.newPassphrase = 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa';
|
|
scope.checkPassphraseQuality();
|
|
|
|
expect(scope.passphraseMsg).to.equal('Very weak');
|
|
expect(scope.passphraseRating).to.equal(0);
|
|
});
|
|
|
|
it('should be weak', function() {
|
|
scope.newPassphrase = 'asdfasdfasdfasdfasdfasdfasdfasdfasdfasdfasdf';
|
|
scope.checkPassphraseQuality();
|
|
|
|
expect(scope.passphraseMsg).to.equal('Weak');
|
|
expect(scope.passphraseRating).to.equal(1);
|
|
});
|
|
|
|
it('should be good', function() {
|
|
scope.newPassphrase = 'asdfasdfasdfasdfasdfasdfasdfasdfasdfasdfasdf5';
|
|
scope.checkPassphraseQuality();
|
|
|
|
expect(scope.passphraseMsg).to.equal('Good');
|
|
expect(scope.passphraseRating).to.equal(2);
|
|
});
|
|
|
|
it('should be strong', function() {
|
|
scope.newPassphrase = '&§DG36abcd';
|
|
scope.checkPassphraseQuality();
|
|
|
|
expect(scope.passphraseMsg).to.equal('Strong');
|
|
expect(scope.passphraseRating).to.equal(3);
|
|
});
|
|
});
|
|
|
|
}); |