1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
|
require 'test_helper'
class IdentityTest < ActiveSupport::TestCase
include StubRecordHelper
setup do
@user = find_record :user
end
test "initial identity for a user" do
id = Identity.for(@user)
assert_equal @user.email_address, id.address
assert_equal @user.email_address, id.destination
assert_equal @user, id.user
end
test "add alias" do
id = Identity.for @user, address: alias_name
assert_equal LocalEmail.new(alias_name), id.address
assert_equal @user.email_address, id.destination
assert_equal @user, id.user
end
test "add forward" do
id = Identity.for @user, destination: forward_address
assert_equal @user.email_address, id.address
assert_equal Email.new(forward_address), id.destination
assert_equal @user, id.user
end
test "forward alias" do
id = Identity.for @user, address: alias_name, destination: forward_address
assert_equal LocalEmail.new(alias_name), id.address
assert_equal Email.new(forward_address), id.destination
assert_equal @user, id.user
end
test "prevents duplicates" do
id = Identity.create_for @user, address: alias_name, destination: forward_address
dup = Identity.build_for @user, address: alias_name, destination: forward_address
assert !dup.valid?
assert_equal ["has already been taken"], dup.errors[:destination]
id.destroy
end
test "validates availability" do
other_user = find_record :user
id = Identity.create_for @user, address: alias_name, destination: forward_address
taken = Identity.build_for other_user, address: alias_name
assert !taken.valid?
assert_equal ["has already been taken"], taken.errors[:address]
id.destroy
end
test "setting and getting pgp key" do
id = Identity.for(@user)
id.set_key(:pgp, pgp_key_string)
assert_equal pgp_key_string, id.keys[:pgp]
end
test "querying pgp key via couch" do
id = Identity.for(@user)
id.set_key(:pgp, pgp_key_string)
id.save
view = Identity.pgp_key_by_email.key(id.address)
assert_equal 1, view.rows.count
assert result = view.rows.first
assert_equal id.address, result["key"]
assert_equal id.keys[:pgp], result["value"]
id.destroy
end
test "fail to add non-local email address as identity address" do
id = Identity.for @user, address: forward_address
assert !id.valid?
assert_match /needs to end in/, id.errors[:address].first
end
test "alias must meet same conditions as login" do
id = Identity.create_for @user, address: alias_name.capitalize
assert !id.valid?
#hacky way to do this, but okay for now:
assert id.errors.messages.flatten(2).include? "Must begin with a lowercase letter"
assert id.errors.messages.flatten(2).include? "Only lowercase letters, digits, . - and _ allowed."
end
test "destination must be valid email address" do
id = Identity.create_for @user, address: @user.email_address, destination: 'ASKJDLFJD'
assert !id.valid?
assert id.errors.messages[:destination].include? "needs to be a valid email address"
end
test "disabled identity" do
id = Identity.for(@user)
id.disable
assert_equal @user.email_address, id.address
assert_equal nil, id.destination
assert_equal nil, id.user
assert !id.enabled?
assert id.valid?
end
test "disabled identity blocks handle" do
id = Identity.for(@user)
id.disable
id.save
other_user = find_record :user
taken = Identity.build_for other_user, address: id.address
assert !taken.valid?
assert_equal ["has already been taken"], taken.errors[:address]
Identity.destroy_all_disabled
end
test "destroy all disabled identities" do
id = Identity.for(@user)
id.disable
id.save
assert Identity.count > 0
Identity.destroy_all_disabled
assert_equal 0, Identity.disabled.count
end
def alias_name
@alias_name ||= Faker::Internet.user_name
end
def forward_address
@forward_address ||= Faker::Internet.email
end
def pgp_key_string
@pgp_key ||= "DUMMY PGP KEY ... "+SecureRandom.base64(4096)
end
end
|