mirror of
https://github.com/ProtonMail/proton-bridge.git
synced 2025-12-10 12:46:46 +00:00
GODT-1524: Fix tests.
This commit is contained in:
@ -1,7 +1,9 @@
|
|||||||
# Building ProtonMail Bridge and Import-Export app
|
# Building ProtonMail Bridge and Import-Export app
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
* 64-bit OS (the go-rfc5322 module cannot currently be compiled for 32-bit OSes)
|
* 64-bit AMD OS:
|
||||||
|
- the go-rfc5322 module cannot currently be compiled for 32-bit OSes
|
||||||
|
- the Apple M1 builds are not supported yet due to dependencies
|
||||||
* Go 1.13
|
* Go 1.13
|
||||||
* Bash with basic build utils: make, gcc, sed, find, grep, ...
|
* Bash with basic build utils: make, gcc, sed, find, grep, ...
|
||||||
* For Windows it is recommended to use MinGW 64bit shell from [MSYS2](https://www.msys2.org/)
|
* For Windows it is recommended to use MinGW 64bit shell from [MSYS2](https://www.msys2.org/)
|
||||||
|
|||||||
@ -243,7 +243,7 @@ func (loop *eventLoop) processNextEvent() (more bool, err error) { // nolint[fun
|
|||||||
}
|
}
|
||||||
|
|
||||||
// All errors except ErrUnauthorized (which is not possible to recover from) are ignored.
|
// All errors except ErrUnauthorized (which is not possible to recover from) are ignored.
|
||||||
if err != nil && errors.Cause(err) != pmapi.ErrUnauthorized {
|
if err != nil && !pmapi.IsFailedAuth(errors.Cause(err)) && errors.Cause(err) != pmapi.ErrUnauthorized {
|
||||||
l.WithError(err).WithField("errors", loop.errCounter).Error("Error skipped")
|
l.WithError(err).WithField("errors", loop.errCounter).Error("Error skipped")
|
||||||
loop.errCounter++
|
loop.errCounter++
|
||||||
if loop.errCounter == errMaxSentry {
|
if loop.errCounter == errMaxSentry {
|
||||||
|
|||||||
@ -170,7 +170,7 @@ func TestCheckBridgeLoginLoggedOut(t *testing.T) {
|
|||||||
// Mock init of user.
|
// Mock init of user.
|
||||||
m.credentialsStore.EXPECT().Get("user").Return(testCredentialsDisconnected, nil),
|
m.credentialsStore.EXPECT().Get("user").Return(testCredentialsDisconnected, nil),
|
||||||
m.pmapiClient.EXPECT().AddAuthRefreshHandler(gomock.Any()),
|
m.pmapiClient.EXPECT().AddAuthRefreshHandler(gomock.Any()),
|
||||||
m.pmapiClient.EXPECT().ListLabels(gomock.Any()).Return(nil, errors.New("ErrUnauthorized")),
|
m.pmapiClient.EXPECT().ListLabels(gomock.Any()).Return(nil, pmapi.ErrUnauthorized),
|
||||||
m.pmapiClient.EXPECT().Addresses().Return(nil),
|
m.pmapiClient.EXPECT().Addresses().Return(nil),
|
||||||
|
|
||||||
// Mock CheckBridgeLogin.
|
// Mock CheckBridgeLogin.
|
||||||
|
|||||||
@ -81,11 +81,11 @@ func TestNewUsersWithConnectedUserWithBadToken(t *testing.T) {
|
|||||||
m := initMocks(t)
|
m := initMocks(t)
|
||||||
defer m.ctrl.Finish()
|
defer m.ctrl.Finish()
|
||||||
|
|
||||||
m.clientManager.EXPECT().NewClientWithRefresh(gomock.Any(), "uid", "acc").Return(nil, nil, pmapi.ErrBadRequest{OriginalError: errors.New("bad token")})
|
m.clientManager.EXPECT().NewClientWithRefresh(gomock.Any(), "uid", "acc").Return(nil, nil, pmapi.ErrAuthFailed{OriginalError: errors.New("bad token")})
|
||||||
m.clientManager.EXPECT().NewClient("uid", "", "acc", time.Time{}).Return(m.pmapiClient)
|
m.clientManager.EXPECT().NewClient("uid", "", "acc", time.Time{}).Return(m.pmapiClient)
|
||||||
m.pmapiClient.EXPECT().AddAuthRefreshHandler(gomock.Any())
|
m.pmapiClient.EXPECT().AddAuthRefreshHandler(gomock.Any())
|
||||||
m.pmapiClient.EXPECT().IsUnlocked().Return(false)
|
m.pmapiClient.EXPECT().IsUnlocked().Return(false)
|
||||||
m.pmapiClient.EXPECT().Unlock(gomock.Any(), testCredentials.MailboxPassword).Return(pmapi.ErrBadRequest{OriginalError: errors.New("not authorized")})
|
m.pmapiClient.EXPECT().Unlock(gomock.Any(), testCredentials.MailboxPassword).Return(pmapi.ErrAuthFailed{OriginalError: errors.New("not authorized")})
|
||||||
m.pmapiClient.EXPECT().AuthDelete(gomock.Any())
|
m.pmapiClient.EXPECT().AuthDelete(gomock.Any())
|
||||||
|
|
||||||
m.credentialsStore.EXPECT().List().Return([]string{"user"}, nil)
|
m.credentialsStore.EXPECT().List().Return([]string{"user"}, nil)
|
||||||
|
|||||||
@ -37,7 +37,6 @@ import (
|
|||||||
pmapimocks "github.com/ProtonMail/proton-bridge/pkg/pmapi/mocks"
|
pmapimocks "github.com/ProtonMail/proton-bridge/pkg/pmapi/mocks"
|
||||||
tests "github.com/ProtonMail/proton-bridge/test"
|
tests "github.com/ProtonMail/proton-bridge/test"
|
||||||
gomock "github.com/golang/mock/gomock"
|
gomock "github.com/golang/mock/gomock"
|
||||||
"github.com/pkg/errors"
|
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
r "github.com/stretchr/testify/require"
|
r "github.com/stretchr/testify/require"
|
||||||
)
|
)
|
||||||
@ -331,7 +330,7 @@ func mockInitDisconnectedUser(m mocks) {
|
|||||||
m.pmapiClient.EXPECT().AddAuthRefreshHandler(gomock.Any()),
|
m.pmapiClient.EXPECT().AddAuthRefreshHandler(gomock.Any()),
|
||||||
|
|
||||||
// Mock of store initialisation for the unauthorized user.
|
// Mock of store initialisation for the unauthorized user.
|
||||||
m.pmapiClient.EXPECT().ListLabels(gomock.Any()).Return(nil, errors.New("ErrUnauthorized")),
|
m.pmapiClient.EXPECT().ListLabels(gomock.Any()).Return(nil, pmapi.ErrUnauthorized),
|
||||||
m.pmapiClient.EXPECT().Addresses().Return(nil),
|
m.pmapiClient.EXPECT().Addresses().Return(nil),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|||||||
@ -196,7 +196,14 @@ func Test401ExpiredAuthUpdateUser(t *testing.T) {
|
|||||||
|
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
w.WriteHeader(http.StatusOK)
|
w.WriteHeader(http.StatusOK)
|
||||||
if err := json.NewEncoder(w).Encode(testAddressList); err != nil {
|
respObj := struct {
|
||||||
|
Code int
|
||||||
|
Addresses []*Address
|
||||||
|
}{
|
||||||
|
Code: 1000,
|
||||||
|
Addresses: []*Address{},
|
||||||
|
}
|
||||||
|
if err := json.NewEncoder(w).Encode(respObj); err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|||||||
Reference in New Issue
Block a user