mirror of
https://github.com/moparisthebest/mail
synced 2024-11-11 19:55:06 -05:00
cf1f60fbf9
* add spinners to all login pages * use inline error messages in all form instead of scope.onError * create newsletter service
124 lines
3.9 KiB
JavaScript
124 lines
3.9 KiB
JavaScript
'use strict';
|
|
|
|
var Auth = require('../../src/js/bo/auth'),
|
|
mocks = angular.mock,
|
|
LoginInitialCtrl = require('../../src/js/controller/login-initial'),
|
|
PGP = require('../../src/js/crypto/pgp'),
|
|
EmailDAO = require('../../src/js/dao/email-dao'),
|
|
appController = require('../../src/js/app-controller');
|
|
|
|
describe('Login (initial user) Controller unit test', function() {
|
|
var scope, ctrl, location, origEmailDao, emailDaoMock,
|
|
origAuth, authMock, newsletterStub,
|
|
emailAddress = 'fred@foo.com',
|
|
keyId, expectedKeyId,
|
|
cryptoMock;
|
|
|
|
beforeEach(function() {
|
|
// remember original module to restore later
|
|
origEmailDao = appController._emailDao;
|
|
origAuth = appController._auth;
|
|
|
|
appController._emailDao = emailDaoMock = sinon.createStubInstance(EmailDAO);
|
|
appController._auth = authMock = sinon.createStubInstance(Auth);
|
|
|
|
keyId = '9FEB47936E712926';
|
|
expectedKeyId = '6E712926';
|
|
cryptoMock = sinon.createStubInstance(PGP);
|
|
emailDaoMock._crypto = cryptoMock;
|
|
|
|
emailDaoMock._account = {
|
|
emailAddress: emailAddress,
|
|
};
|
|
|
|
angular.module('logininitialtest', ['woServices']);
|
|
mocks.module('logininitialtest');
|
|
mocks.inject(function($rootScope, $controller, $location, newsletter) {
|
|
scope = $rootScope.$new();
|
|
location = $location;
|
|
newsletterStub = sinon.stub(newsletter, 'signup');
|
|
scope.state = {
|
|
ui: {}
|
|
};
|
|
ctrl = $controller(LoginInitialCtrl, {
|
|
$scope: scope,
|
|
$routeParams: {},
|
|
newsletter: newsletter
|
|
});
|
|
});
|
|
});
|
|
|
|
afterEach(function() {
|
|
// restore the module
|
|
appController._emailDao = origEmailDao;
|
|
appController._auth = origAuth;
|
|
});
|
|
|
|
describe('initial state', function() {
|
|
it('should be well defined', function() {
|
|
expect(scope.state.ui).to.equal(1);
|
|
});
|
|
});
|
|
|
|
describe('go to import key', function() {
|
|
it('should not continue if terms are not accepted', function() {
|
|
scope.agree = undefined;
|
|
|
|
scope.importKey();
|
|
|
|
expect(scope.errMsg).to.contain('Terms');
|
|
expect(newsletterStub.called).to.be.false;
|
|
});
|
|
|
|
it('should work', function() {
|
|
scope.agree = true;
|
|
scope.importKey();
|
|
expect(newsletterStub.calledOnce).to.be.true;
|
|
expect(location.$$path).to.equal('/login-new-device');
|
|
});
|
|
});
|
|
|
|
describe('generate key', function() {
|
|
it('should not continue if terms are not accepted', function() {
|
|
scope.agree = undefined;
|
|
|
|
scope.generateKey();
|
|
|
|
expect(scope.errMsg).to.contain('Terms');
|
|
expect(scope.state.ui).to.equal(1);
|
|
expect(newsletterStub.called).to.be.false;
|
|
});
|
|
|
|
it('should fail due to error in emailDao.unlock', function() {
|
|
scope.agree = true;
|
|
|
|
emailDaoMock.unlock.withArgs({
|
|
passphrase: undefined
|
|
}).yields(new Error('asdf'));
|
|
authMock.storeCredentials.yields();
|
|
|
|
scope.generateKey();
|
|
|
|
expect(scope.errMsg).to.exist;
|
|
expect(scope.state.ui).to.equal(1);
|
|
expect(newsletterStub.called).to.be.true;
|
|
});
|
|
|
|
it('should unlock crypto', function() {
|
|
scope.agree = true;
|
|
|
|
emailDaoMock.unlock.withArgs({
|
|
passphrase: undefined
|
|
}).yields();
|
|
authMock.storeCredentials.yields();
|
|
|
|
scope.generateKey();
|
|
|
|
expect(scope.errMsg).to.not.exist;
|
|
expect(scope.state.ui).to.equal(2);
|
|
expect(newsletterStub.called).to.be.true;
|
|
expect(location.$$path).to.equal('/desktop');
|
|
expect(emailDaoMock.unlock.calledOnce).to.be.true;
|
|
});
|
|
});
|
|
}); |