mirror of
https://github.com/ProtonMail/proton-bridge.git
synced 2025-12-10 04:36:43 +00:00
180 lines
6.2 KiB
Go
180 lines
6.2 KiB
Go
// Copyright (c) 2020 Proton Technologies AG
|
|
//
|
|
// This file is part of ProtonMail Bridge.
|
|
//
|
|
// ProtonMail Bridge is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// ProtonMail Bridge is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with ProtonMail Bridge. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package users
|
|
|
|
import (
|
|
"errors"
|
|
"testing"
|
|
|
|
"github.com/ProtonMail/proton-bridge/internal/events"
|
|
"github.com/ProtonMail/proton-bridge/internal/users/credentials"
|
|
"github.com/ProtonMail/proton-bridge/pkg/pmapi"
|
|
gomock "github.com/golang/mock/gomock"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestNewUsersNoKeychain(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
m.credentialsStore.EXPECT().List().Return([]string{}, errors.New("no keychain"))
|
|
|
|
checkUsersNew(t, m, []*credentials.Credentials{})
|
|
}
|
|
|
|
func TestNewUsersWithoutUsersInCredentialsStore(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
m.credentialsStore.EXPECT().List().Return([]string{}, nil)
|
|
|
|
checkUsersNew(t, m, []*credentials.Credentials{})
|
|
}
|
|
|
|
func TestNewUsersWithDisconnectedUser(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
// Basically every call client has get client manager.
|
|
m.clientManager.EXPECT().GetClient("user").Return(m.pmapiClient).MinTimes(1)
|
|
|
|
gomock.InOrder(
|
|
m.credentialsStore.EXPECT().List().Return([]string{"user"}, nil),
|
|
m.credentialsStore.EXPECT().Get("user").Return(testCredentialsDisconnected, nil),
|
|
m.credentialsStore.EXPECT().Get("user").Return(testCredentialsDisconnected, nil),
|
|
m.pmapiClient.EXPECT().ListLabels().Return(nil, errors.New("ErrUnauthorized")),
|
|
m.pmapiClient.EXPECT().Addresses().Return(nil),
|
|
)
|
|
|
|
checkUsersNew(t, m, []*credentials.Credentials{testCredentialsDisconnected})
|
|
}
|
|
|
|
func TestNewUsersWithConnectedUserWithBadToken(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
m.clientManager.EXPECT().GetClient("user").Return(m.pmapiClient).MinTimes(1)
|
|
|
|
m.credentialsStore.EXPECT().List().Return([]string{"user"}, nil)
|
|
m.credentialsStore.EXPECT().Get("user").Return(testCredentials, nil).Times(2)
|
|
|
|
m.credentialsStore.EXPECT().Logout("user").Return(nil)
|
|
m.pmapiClient.EXPECT().AuthRefresh("token").Return(nil, errors.New("bad token"))
|
|
|
|
m.eventListener.EXPECT().Emit(events.LogoutEvent, "user")
|
|
m.eventListener.EXPECT().Emit(events.UserRefreshEvent, "user")
|
|
m.pmapiClient.EXPECT().Logout()
|
|
m.credentialsStore.EXPECT().Logout("user").Return(nil)
|
|
m.credentialsStore.EXPECT().Get("user").Return(testCredentialsDisconnected, nil)
|
|
m.eventListener.EXPECT().Emit(events.CloseConnectionEvent, "user@pm.me")
|
|
|
|
checkUsersNew(t, m, []*credentials.Credentials{testCredentialsDisconnected})
|
|
}
|
|
|
|
func mockConnectedUser(m mocks) {
|
|
gomock.InOrder(
|
|
m.credentialsStore.EXPECT().Get("user").Return(testCredentials, nil),
|
|
|
|
m.credentialsStore.EXPECT().Get("user").Return(testCredentials, nil),
|
|
m.pmapiClient.EXPECT().AuthRefresh("token").Return(testAuthRefresh, nil),
|
|
|
|
m.pmapiClient.EXPECT().Unlock([]byte(testCredentials.MailboxPassword)).Return(nil),
|
|
|
|
// Set up mocks for store initialisation for the authorized user.
|
|
m.pmapiClient.EXPECT().ListLabels().Return([]*pmapi.Label{}, nil),
|
|
m.pmapiClient.EXPECT().CountMessages("").Return([]*pmapi.MessagesCount{}, nil),
|
|
m.pmapiClient.EXPECT().Addresses().Return([]*pmapi.Address{testPMAPIAddress}),
|
|
)
|
|
}
|
|
|
|
// mockAuthUpdate simulates users calling UpdateAuthToken on the given user.
|
|
// This would normally be done by users when it receives an auth from the ClientManager,
|
|
// but as we don't have a full users instance here, we do this manually.
|
|
func mockAuthUpdate(user *User, token string, m mocks) {
|
|
gomock.InOrder(
|
|
m.credentialsStore.EXPECT().UpdateToken("user", ":"+token).Return(nil),
|
|
m.credentialsStore.EXPECT().Get("user").Return(credentialsWithToken(token), nil),
|
|
)
|
|
|
|
user.updateAuthToken(refreshWithToken(token))
|
|
|
|
waitForEvents()
|
|
}
|
|
|
|
func TestNewUsersWithConnectedUser(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
m.clientManager.EXPECT().GetClient("user").Return(m.pmapiClient).MinTimes(1)
|
|
m.credentialsStore.EXPECT().List().Return([]string{"user"}, nil)
|
|
|
|
mockConnectedUser(m)
|
|
mockEventLoopNoAction(m)
|
|
|
|
checkUsersNew(t, m, []*credentials.Credentials{testCredentials})
|
|
}
|
|
|
|
// Tests two users with different states and checks also the order from
|
|
// credentials store is kept also in array of users.
|
|
func TestNewUsersWithUsers(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
m.clientManager.EXPECT().GetClient("user").Return(m.pmapiClient).MinTimes(1)
|
|
m.credentialsStore.EXPECT().List().Return([]string{"userDisconnected", "user"}, nil)
|
|
|
|
gomock.InOrder(
|
|
m.credentialsStore.EXPECT().Get("userDisconnected").Return(testCredentialsDisconnected, nil),
|
|
m.credentialsStore.EXPECT().Get("userDisconnected").Return(testCredentialsDisconnected, nil),
|
|
// Set up mocks for store initialisation for the unauth user.
|
|
m.clientManager.EXPECT().GetClient("userDisconnected").Return(m.pmapiClient),
|
|
m.pmapiClient.EXPECT().ListLabels().Return(nil, errors.New("ErrUnauthorized")),
|
|
m.clientManager.EXPECT().GetClient("userDisconnected").Return(m.pmapiClient),
|
|
m.pmapiClient.EXPECT().Addresses().Return(nil),
|
|
)
|
|
|
|
mockConnectedUser(m)
|
|
|
|
mockEventLoopNoAction(m)
|
|
|
|
checkUsersNew(t, m, []*credentials.Credentials{testCredentialsDisconnected, testCredentials})
|
|
}
|
|
|
|
func TestNewUsersFirstStart(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
m.credentialsStore.EXPECT().List().Return([]string{}, nil)
|
|
|
|
testNewUsers(t, m)
|
|
}
|
|
|
|
func checkUsersNew(t *testing.T, m mocks, expectedCredentials []*credentials.Credentials) {
|
|
users := testNewUsers(t, m)
|
|
defer cleanUpUsersData(users)
|
|
|
|
assert.Equal(m.t, len(expectedCredentials), len(users.GetUsers()))
|
|
|
|
credentials := []*credentials.Credentials{}
|
|
for _, user := range users.users {
|
|
credentials = append(credentials, user.creds)
|
|
}
|
|
|
|
assert.Equal(m.t, expectedCredentials, credentials)
|
|
}
|