forked from Silverfish/proton-bridge
These tests no longer work due to sync only being started after an account has been added. Functionality of these tests is covered in the bridge unit tests.
135 lines
4.4 KiB
Go
135 lines
4.4 KiB
Go
// Copyright (c) 2023 Proton AG
|
|
//
|
|
// This file is part of Proton Mail Bridge.
|
|
//
|
|
// Proton Mail Bridge is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// Proton Mail Bridge is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Proton Mail Bridge. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package user
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/ProtonMail/go-proton-api"
|
|
"github.com/ProtonMail/go-proton-api/server"
|
|
"github.com/ProtonMail/go-proton-api/server/backend"
|
|
"github.com/ProtonMail/proton-bridge/v3/internal/certs"
|
|
"github.com/ProtonMail/proton-bridge/v3/internal/vault"
|
|
"github.com/ProtonMail/proton-bridge/v3/tests"
|
|
"github.com/stretchr/testify/require"
|
|
"go.uber.org/goleak"
|
|
)
|
|
|
|
func init() {
|
|
EventPeriod = 100 * time.Millisecond
|
|
EventJitter = 0
|
|
backend.GenerateKey = backend.FastGenerateKey
|
|
certs.GenerateCert = tests.FastGenerateCert
|
|
}
|
|
|
|
func TestMain(m *testing.M) {
|
|
goleak.VerifyTestMain(m, goleak.IgnoreCurrent())
|
|
}
|
|
|
|
func TestUser_Info(t *testing.T) {
|
|
withAPI(t, context.Background(), func(ctx context.Context, s *server.Server, m *proton.Manager) {
|
|
withAccount(t, s, "username", "password", []string{"alias@pm.me"}, func(userID string, _ []string) {
|
|
withUser(t, ctx, s, m, "username", "password", func(user *User) {
|
|
// User's ID should be correct.
|
|
require.Equal(t, userID, user.ID())
|
|
|
|
// User's name should be correct.
|
|
require.Equal(t, "username", user.Name())
|
|
|
|
// User's email should be correct.
|
|
require.ElementsMatch(t, []string{"username@" + s.GetDomain(), "alias@pm.me"}, user.Emails())
|
|
|
|
// By default, user should be in combined mode.
|
|
require.Equal(t, vault.CombinedMode, user.GetAddressMode())
|
|
|
|
// By default, user should have a non-empty bridge password.
|
|
require.NotEmpty(t, user.BridgePass())
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestUser_AddressMode(t *testing.T) {
|
|
withAPI(t, context.Background(), func(ctx context.Context, s *server.Server, m *proton.Manager) {
|
|
withAccount(t, s, "username", "password", []string{}, func(string, []string) {
|
|
withUser(t, ctx, s, m, "username", "password", func(user *User) {
|
|
// By default, user should be in combined mode.
|
|
require.Equal(t, vault.CombinedMode, user.GetAddressMode())
|
|
|
|
// User should be able to switch to split mode.
|
|
require.NoError(t, user.SetAddressMode(ctx, vault.SplitMode))
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
func withAPI(_ testing.TB, ctx context.Context, fn func(context.Context, *server.Server, *proton.Manager)) { //nolint:revive
|
|
server := server.New()
|
|
defer server.Close()
|
|
|
|
fn(ctx, server, proton.New(
|
|
proton.WithHostURL(server.GetHostURL()),
|
|
proton.WithTransport(proton.InsecureTransport()),
|
|
))
|
|
}
|
|
|
|
func withAccount(tb testing.TB, s *server.Server, username, password string, aliases []string, fn func(string, []string)) { //nolint:unparam
|
|
userID, addrID, err := s.CreateUser(username, []byte(password))
|
|
require.NoError(tb, err)
|
|
|
|
addrIDs := []string{addrID}
|
|
|
|
for _, email := range aliases {
|
|
addrID, err := s.CreateAddress(userID, email, []byte(password))
|
|
require.NoError(tb, err)
|
|
|
|
addrIDs = append(addrIDs, addrID)
|
|
}
|
|
|
|
fn(userID, addrIDs)
|
|
}
|
|
|
|
func withUser(tb testing.TB, ctx context.Context, _ *server.Server, m *proton.Manager, username, password string, fn func(*User)) { //nolint:unparam,revive
|
|
client, apiAuth, err := m.NewClientWithLogin(ctx, username, []byte(password))
|
|
require.NoError(tb, err)
|
|
|
|
apiUser, err := client.GetUser(ctx)
|
|
require.NoError(tb, err)
|
|
|
|
salts, err := client.GetSalts(ctx)
|
|
require.NoError(tb, err)
|
|
|
|
saltedKeyPass, err := salts.SaltForKey([]byte(password), apiUser.Keys.Primary().ID)
|
|
require.NoError(tb, err)
|
|
|
|
vault, corrupt, err := vault.New(tb.TempDir(), tb.TempDir(), []byte("my secret key"))
|
|
require.NoError(tb, err)
|
|
require.False(tb, corrupt)
|
|
|
|
vaultUser, err := vault.AddUser(apiUser.ID, username, username+"@pm.me", apiAuth.UID, apiAuth.RefreshToken, saltedKeyPass)
|
|
require.NoError(tb, err)
|
|
|
|
user, err := New(ctx, vaultUser, client, nil, apiUser, nil, vault.SyncWorkers(), true)
|
|
require.NoError(tb, err)
|
|
defer user.Close()
|
|
|
|
fn(user)
|
|
}
|