summaryrefslogtreecommitdiff
path: root/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py
blob: e938d6f5f448f0b389e4b851fe2169c236af5d16 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
#
# Copyright (c) 2016 ThoughtWorks, Inc.
#
# Pixelated is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Pixelated is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with Pixelated. If not, see <http://www.gnu.org/licenses/>.
import os
import unittest
import tempdir
from pixelated.bitmask_libraries import session
from leap.srp_session import SRPSession
import leap.common.certs as certs
from mockito import mock, unstub, when, verify, never, any as ANY

from pixelated.bitmask_libraries.session import SmtpClientCertificate


class TestSmtpClientCertificate(unittest.TestCase):

    def setUp(self):
        self.tmp_dir = tempdir.TempDir()
        self.provider = mock()
        self.provider.domain = 'some-provider.tld'
        self.auth = SRPSession('username', 'token', 'uuid', 'session_id', {})
        self.pem_path = os.path.join(self.tmp_dir.name, 'providers', 'some-provider.tld', 'keys', 'client', 'smtp.pem')
        self.downloader = mock()
        when(session).SmtpCertDownloader(self.provider, self.auth).thenReturn(self.downloader)

    def tearDown(self):
        self.tmp_dir.dissolve()
        unstub()

    def test_download_certificate(self):
        cert = SmtpClientCertificate(self.provider, self.auth, self.tmp_dir.name)
        result = cert.cert_path()

        self.assertEqual(self.pem_path, result)
        verify(self.downloader).download_to(self.pem_path)

    def test_download_certificate_if_redownload_necessary_e_g_certificate_expired(self):
        self.pretend_all_paths_exist()
        when(certs).should_redownload(self.pem_path).thenReturn(True)

        cert = SmtpClientCertificate(self.provider, self.auth, self.tmp_dir.name)
        result = cert.cert_path()

        self.assertEqual(self.pem_path, result)
        verify(self.downloader).download_to(self.pem_path)

    def pretend_all_paths_exist(self):
        when(os.path).exists(ANY()).thenReturn(True)

    def test_skip_download_if_already_downloaded_and_still_valid(self):
        when(os.path).exists(self.pem_path).thenReturn(True)
        when(certs).should_redownload(ANY()).thenReturn(False)
        cert = SmtpClientCertificate(self.provider, self.auth, self.tmp_dir.name)
        result = cert.cert_path()

        self.assertEqual(self.pem_path, result)
        verify(self.downloader, never).download_to(ANY())