services/sync/tests/unit/test_service_createAccount.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 /* Any copyright is dedicated to the Public Domain.
     2    http://creativecommons.org/publicdomain/zero/1.0/ */
     4 Cu.import("resource://services-sync/util.js");
     5 Cu.import("resource://services-sync/service.js");
     6 Cu.import("resource://testing-common/services/sync/utils.js");
     8 function run_test() {
     9   initTestLogging("Trace");
    11   let requestBody;
    12   let secretHeader;
    13   function send(statusCode, status, body) {
    14     return function(request, response) {
    15       requestBody = readBytesFromInputStream(request.bodyInputStream);
    16       if (request.hasHeader("X-Weave-Secret")) {
    17         secretHeader = request.getHeader("X-Weave-Secret");
    18       }
    20       response.setStatusLine(request.httpVersion, statusCode, status);
    21       response.bodyOutputStream.write(body, body.length);
    22     };
    23   }
    25   do_test_pending();
    26   let server = httpd_setup({
    27     // john@doe.com
    28     "/user/1.0/7wohs32cngzuqt466q3ge7indszva4of": send(200, "OK", "0"),
    29     // jane@doe.com
    30     "/user/1.0/vuuf3eqgloxpxmzph27f5a6ve7gzlrms": send(400, "Bad Request", "2"),
    31     // jim@doe.com
    32     "/user/1.0/vz6fhecgw5t3sgx3a4cektoiokyczkqd": send(500, "Server Error", "Server Error")
    33   });
    34   try {
    35     Service.serverURL = server.baseURI;
    37     _("Create an account.");
    38     let res = Service.createAccount("john@doe.com", "mysecretpw",
    39                                     "challenge", "response");
    40     do_check_eq(res, null);
    41     let payload = JSON.parse(requestBody);
    42     do_check_eq(payload.password, "mysecretpw");
    43     do_check_eq(payload.email, "john@doe.com");
    44     do_check_eq(payload["captcha-challenge"], "challenge");
    45     do_check_eq(payload["captcha-response"], "response");
    47     _("A non-ASCII password is UTF-8 encoded.");
    48     const moneyPassword = "moneyislike$£¥";
    49     res = Service.createAccount("john@doe.com", moneyPassword,
    50                                 "challenge", "response");
    51     do_check_eq(res, null);
    52     payload = JSON.parse(requestBody);
    53     do_check_eq(payload.password, Utils.encodeUTF8(moneyPassword));
    55     _("Invalid captcha or other user-friendly error.");
    56     res = Service.createAccount("jane@doe.com", "anothersecretpw",
    57                                 "challenge", "response");
    58     do_check_eq(res, "invalid-captcha");
    60     _("Generic server error.");
    61     res = Service.createAccount("jim@doe.com", "preciousss",
    62                                 "challenge", "response");
    63     do_check_eq(res, "generic-server-error");
    65     _("Admin secret preference is passed as HTTP header token.");
    66     Svc.Prefs.set("admin-secret", "my-server-secret");
    67     res = Service.createAccount("john@doe.com", "mysecretpw",
    68                                 "challenge", "response");
    69     do_check_eq(secretHeader, "my-server-secret");
    71   } finally {
    72     Svc.Prefs.resetBranch("");
    73     server.stop(do_test_finished);
    74   }
    75 }

mercurial