1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
|
#
# Copyright (c) 2014 ThoughtWorks, Inc.
#
# Pixelated is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Pixelated is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with Pixelated. If not, see <http://www.gnu.org/licenses/>.
from mock import patch, MagicMock
from mockito import when
from unittest import TestCase
from pixelated.bitmask_libraries.keymanager import Keymanager
from pixelated.bitmask_libraries.keymanager import UploadKeyError
from pixelated.config import leap_config
from twisted.internet import defer
class KeymanagerTest(TestCase):
def setUp(self):
self.provider = MagicMock()
self.soledad = MagicMock()
self.auth = MagicMock(token='token', auth='auth')
with patch('pixelated.bitmask_libraries.keymanager.KeyManager'):
self.keymanager = Keymanager(self.provider,
self.soledad,
'test_user@some-server.test',
self.auth.token,
self.auth.uuid)
def tearDown(self):
reload(leap_config)
@patch('pixelated.bitmask_libraries.keymanager.KeyManager')
def test_keymanager_is_created(self, keymanager_mock):
when(self.provider)._discover_nicknym_server().thenReturn('nicknym_server')
self.provider.provider_api_cert = 'ca_cert_path'
self.provider.api_uri = 'api_uri'
self.provider.api_version = '1'
self.provider.combined_cerfificates_path = 'combined_ca_bundle'
leap_config.gpg_binary = '/path/to/gpg'
Keymanager(self.provider,
self.soledad,
'test_user@some-server.test',
self.auth.token,
self.auth.uuid)
keymanager_mock.assert_called_with(
'test_user@some-server.test',
'nicknym_server',
self.soledad,
token=self.auth.token,
ca_cert_path='ca_cert_path',
api_uri='api_uri',
api_version='1',
uid=self.auth.uuid,
gpgbinary='/path/to/gpg',
combined_ca_bundle='combined_ca_bundle')
def test_keymanager_generate_openpgp_key_generates_key_correctly(self):
when(self.keymanager)._key_exists('test_user@some-server.test').thenReturn(False)
self.keymanager._gen_key = MagicMock()
self.keymanager._send_key_to_leap = MagicMock()
self.keymanager.generate_openpgp_key()
self.keymanager._gen_key.assert_called_once()
self.keymanager._send_key_to_leap.assert_called_once()
def test_keymanager_generate_openpgp_key_doesnt_regenerate_preexisting_key(self):
when(self.keymanager)._key_exists('test_user@some-server.test').thenReturn(True)
self.keymanager._gen_key = MagicMock()
self.keymanager.generate_openpgp_key()
self.keymanager._gen_key.assert_not_called()
def test_keymanager_generate_openpgp_key_doesnt_upload_preexisting_key(self):
when(self.keymanager)._key_exists('test_user@some-server.test').thenReturn(True)
self.keymanager._send_key_to_leap = MagicMock()
self.keymanager.generate_openpgp_key()
self.keymanager._send_key_to_leap.assert_not_called()
@defer.inlineCallbacks
def test_keymanager_generate_openpgp_key_deletes_key_when_upload_fails(self):
when(self.keymanager)._key_exists('test_user@some-server.test').thenReturn(False)
self.keymanager.delete_key_pair = MagicMock()
when(self.keymanager)._send_key_to_leap().thenRaise(Exception('Could not upload key'))
with self.assertRaises(UploadKeyError):
yield self.keymanager.generate_openpgp_key()
self.keymanager.delete_key_pair.assert_called_once_with('test_user@some-server.test')
|