forked from Silverfish/proton-bridge
- GODT-1158: simple on-disk cache in store - GODT-1158: better member naming in event loop - GODT-1158: create on-disk cache during bridge setup - GODT-1158: better job options - GODT-1158: rename GetLiteral to GetRFC822 - GODT-1158: rename events -> currentEvents - GODT-1158: unlock cache per-user - GODT-1158: clean up cache after logout - GODT-1158: randomized encrypted cache passphrase - GODT-1158: Opt out of on-disk cache in settings - GODT-1158: free space in cache - GODT-1158: make tests compile - GODT-1158: optional compression - GODT-1158: cache custom location - GODT-1158: basic capacity checker - GODT-1158: cache free space config - GODT-1158: only unlock cache if pmapi client is unlocked as well - GODT-1158: simple background sync worker - GODT-1158: set size/bodystructure when caching message - GODT-1158: limit store db update blocking with semaphore - GODT-1158: dumb 10-semaphore - GODT-1158: properly handle delete; remove bad bodystructure handling - GODT-1158: hacky fix for caching after logout... baaaaad - GODT-1158: cache worker - GODT-1158: compute body structure lazily - GODT-1158: cache size in store - GODT-1158: notify cacher when adding to store - GODT-1158: 15 second store cache watcher - GODT-1158: enable cacher - GODT-1158: better cache worker starting/stopping - GODT-1158: limit cacher to less concurrency than disk cache - GODT-1158: message builder prio + pchan pkg - GODT-1158: fix pchan, use in message builder - GODT-1158: no sem in cacher (rely on message builder prio) - GODT-1158: raise priority of existing jobs when requested - GODT-1158: pending messages in on-disk cache - GODT-1158: WIP just a note about deleting messages from disk cache - GODT-1158: pending wait when trying to write - GODT-1158: pending.add to return bool - GODT-1225: Headers in bodystructure are stored as bytes. - GODT-1158: fixing header caching - GODT-1158: don't cache in background - GODT-1158: all concurrency set in settings - GODT-1158: worker pools inside message builder - GODT-1158: fix linter issues - GODT-1158: remove completed builds from builder - GODT-1158: remove builder pool - GODT-1158: cacher defer job done properly - GODT-1158: fix linter - GODT-1299: Continue with bodystructure build if deserialization failed - GODT-1324: Delete messages from the cache when they are deleted on the server - GODT-1158: refactor cache tests - GODT-1158: move builder to app/bridge - GODT-1306: Migrate cache on disk when location is changed (and delete when disabled)
133 lines
4.9 KiB
Go
133 lines
4.9 KiB
Go
// Copyright (c) 2021 Proton Technologies AG
|
|
//
|
|
// This file is part of ProtonMail Bridge.
|
|
//
|
|
// ProtonMail Bridge is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// ProtonMail Bridge is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with ProtonMail Bridge. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package users
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/ProtonMail/proton-bridge/internal/events"
|
|
"github.com/ProtonMail/proton-bridge/internal/metrics"
|
|
"github.com/ProtonMail/proton-bridge/pkg/pmapi"
|
|
gomock "github.com/golang/mock/gomock"
|
|
"github.com/pkg/errors"
|
|
r "github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestUsersFinishLoginBadMailboxPassword(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
// Init users with no user from keychain.
|
|
m.credentialsStore.EXPECT().List().Return([]string{}, nil)
|
|
|
|
// Set up mocks for FinishLogin.
|
|
m.pmapiClient.EXPECT().AuthSalt(gomock.Any()).Return("", nil)
|
|
m.pmapiClient.EXPECT().Unlock(gomock.Any(), testCredentials.MailboxPassword).Return(errors.New("no keys could be unlocked"))
|
|
|
|
checkUsersFinishLogin(t, m, testAuthRefresh, testCredentials.MailboxPassword, "", ErrWrongMailboxPassword)
|
|
}
|
|
|
|
func TestUsersFinishLoginNewUser(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
// Init users with no user from keychain.
|
|
m.credentialsStore.EXPECT().List().Return([]string{}, nil)
|
|
|
|
mockAddingConnectedUser(t, m)
|
|
mockEventLoopNoAction(m)
|
|
|
|
m.clientManager.EXPECT().SendSimpleMetric(gomock.Any(), string(metrics.Setup), string(metrics.NewUser), string(metrics.NoLabel))
|
|
m.eventListener.EXPECT().Emit(events.UserRefreshEvent, testCredentials.UserID)
|
|
|
|
checkUsersFinishLogin(t, m, testAuthRefresh, testCredentials.MailboxPassword, testCredentials.UserID, nil)
|
|
}
|
|
|
|
func TestUsersFinishLoginExistingDisconnectedUser(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
// Mock loading disconnected user.
|
|
m.credentialsStore.EXPECT().List().Return([]string{testCredentialsDisconnected.UserID}, nil)
|
|
mockLoadingDisconnectedUser(m, testCredentialsDisconnected)
|
|
|
|
// Mock process of FinishLogin of already added user.
|
|
gomock.InOrder(
|
|
m.pmapiClient.EXPECT().AuthSalt(gomock.Any()).Return("", nil),
|
|
m.pmapiClient.EXPECT().Unlock(gomock.Any(), testCredentials.MailboxPassword).Return(nil),
|
|
m.pmapiClient.EXPECT().CurrentUser(gomock.Any()).Return(testPMAPIUserDisconnected, nil),
|
|
m.credentialsStore.EXPECT().UpdateToken(testCredentialsDisconnected.UserID, testAuthRefresh.UID, testAuthRefresh.RefreshToken).Return(testCredentials, nil),
|
|
m.credentialsStore.EXPECT().UpdatePassword(testCredentialsDisconnected.UserID, testCredentials.MailboxPassword).Return(testCredentials, nil),
|
|
)
|
|
mockInitConnectedUser(t, m)
|
|
mockEventLoopNoAction(m)
|
|
m.eventListener.EXPECT().Emit(events.UserRefreshEvent, testCredentialsDisconnected.UserID)
|
|
|
|
authRefresh := &pmapi.Auth{
|
|
UserID: testCredentialsDisconnected.UserID,
|
|
AuthRefresh: pmapi.AuthRefresh{
|
|
UID: "uid",
|
|
AccessToken: "acc",
|
|
RefreshToken: "ref",
|
|
},
|
|
}
|
|
checkUsersFinishLogin(t, m, authRefresh, testCredentials.MailboxPassword, testCredentialsDisconnected.UserID, nil)
|
|
}
|
|
|
|
func TestUsersFinishLoginConnectedUser(t *testing.T) {
|
|
m := initMocks(t)
|
|
defer m.ctrl.Finish()
|
|
|
|
// Mock loading connected user.
|
|
m.credentialsStore.EXPECT().List().Return([]string{testCredentials.UserID}, nil)
|
|
mockLoadingConnectedUser(t, m, testCredentials)
|
|
mockEventLoopNoAction(m)
|
|
|
|
// Mock process of FinishLogin of already connected user.
|
|
gomock.InOrder(
|
|
m.pmapiClient.EXPECT().AuthSalt(gomock.Any()).Return("", nil),
|
|
m.pmapiClient.EXPECT().Unlock(gomock.Any(), testCredentials.MailboxPassword).Return(nil),
|
|
m.pmapiClient.EXPECT().CurrentUser(gomock.Any()).Return(testPMAPIUser, nil),
|
|
m.pmapiClient.EXPECT().AuthDelete(gomock.Any()).Return(nil),
|
|
)
|
|
|
|
users := testNewUsers(t, m)
|
|
defer cleanUpUsersData(users)
|
|
|
|
_, err := users.FinishLogin(m.pmapiClient, testAuthRefresh, testCredentials.MailboxPassword)
|
|
r.EqualError(t, err, "user is already connected")
|
|
}
|
|
|
|
func checkUsersFinishLogin(t *testing.T, m mocks, auth *pmapi.Auth, mailboxPassword []byte, expectedUserID string, expectedErr error) {
|
|
users := testNewUsers(t, m)
|
|
defer cleanUpUsersData(users)
|
|
|
|
user, err := users.FinishLogin(m.pmapiClient, auth, mailboxPassword)
|
|
|
|
r.Equal(t, expectedErr, err)
|
|
|
|
if expectedUserID != "" {
|
|
r.Equal(t, expectedUserID, user.ID())
|
|
r.Equal(t, 1, len(users.users))
|
|
r.Equal(t, expectedUserID, users.users[0].ID())
|
|
} else {
|
|
r.Equal(t, (*User)(nil), user)
|
|
r.Equal(t, 0, len(users.users))
|
|
}
|
|
}
|