keyserver/test/integration/public-key-test.js

407 lines
14 KiB
JavaScript
Raw Normal View History

2016-06-01 10:28:37 +00:00
'use strict';
2017-08-18 10:01:34 +00:00
const log = require('winston');
2016-06-01 13:20:49 +00:00
const config = require('config');
2016-06-01 10:28:37 +00:00
const nodemailer = require('nodemailer');
const Email = require('../../src/email/email');
const Mongo = require('../../src/dao/mongo');
const PGP = require('../../src/service/pgp');
2016-06-01 10:28:37 +00:00
const PublicKey = require('../../src/service/public-key');
const templates = require('../../src/email/templates');
2016-06-01 10:28:37 +00:00
describe('Public Key Integration Tests', function() {
this.timeout(20000);
let sandbox;
2017-08-15 08:03:06 +00:00
let publicKey;
let email;
let mongo;
let pgp;
let sendEmailStub;
let publicKeyArmored;
let publicKeyArmored2;
let mailsSent;
2016-06-01 10:28:37 +00:00
const DB_TYPE = 'publickey';
const primaryEmail = 'test1@example.com';
2017-08-15 08:03:06 +00:00
const origin = {host: 'localhost', protocol: 'http'};
2016-06-01 10:28:37 +00:00
2017-08-17 09:44:26 +00:00
before(async () => {
2017-08-15 08:03:06 +00:00
publicKeyArmored = require('fs').readFileSync(`${__dirname}/../key3.asc`, 'utf8');
publicKeyArmored2 = require('fs').readFileSync(`${__dirname}/../key4.asc`, 'utf8');
sinon.stub(log, 'info');
2016-06-08 12:01:30 +00:00
mongo = new Mongo();
await mongo.init(config.mongo);
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
beforeEach(async () => {
sandbox = sinon.sandbox.create();
await mongo.clear(DB_TYPE);
mailsSent = [];
const paramMatcher = sinon.match(params => {
mailsSent[mailsSent.length] = {params};
expect(params.nonce).to.exist;
expect(params.keyId).to.exist;
return true;
});
sandbox.spy(templates, 'verifyKey').withArgs(paramMatcher);
sandbox.spy(templates, 'verifyRemove').withArgs(paramMatcher);
sendEmailStub = sinon.stub().returns(Promise.resolve({response: '250'}));
sendEmailStub.withArgs(sinon.match(sendOptions => {
mailsSent[mailsSent.length - 1].to = sendOptions.to.address;
return true;
2016-06-01 10:28:37 +00:00
}));
sandbox.stub(nodemailer, 'createTransport').returns({
sendMail: sendEmailStub
2016-06-01 10:28:37 +00:00
});
email = new Email(nodemailer);
email.init({
host: 'localhost',
2017-08-15 08:03:06 +00:00
auth: {user: 'user', pass: 'pass'},
sender: {name: 'Foo Bar', email: 'foo@bar.com'}
2016-06-01 10:28:37 +00:00
});
pgp = new PGP();
publicKey = new PublicKey(pgp, mongo, email);
2016-06-01 10:28:37 +00:00
});
afterEach(() => {
sandbox.restore();
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
after(async () => {
await mongo.clear(DB_TYPE);
await mongo.disconnect();
log.info.restore();
2016-06-01 10:28:37 +00:00
});
describe('put', () => {
it('should persist key and send verification email', async () => {
await publicKey.put({publicKeyArmored, origin});
expect(mailsSent.length).to.equal(4);
2016-06-01 13:20:49 +00:00
});
2016-06-01 10:28:37 +00:00
2017-08-17 09:44:26 +00:00
it('should work twice if not yet verified', async () => {
await publicKey.put({publicKeyArmored, origin});
expect(mailsSent.length).to.equal(4);
await publicKey.put({publicKeyArmored, origin});
expect(mailsSent.length).to.equal(8);
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should throw 304 if key already exists', async () => {
await publicKey.put({publicKeyArmored, origin});
await publicKey.verify(mailsSent[0].params);
2016-06-01 10:28:37 +00:00
try {
await publicKey.put({publicKeyArmored, origin});
2016-06-01 10:28:37 +00:00
expect(false).to.be.true;
2017-08-15 08:03:06 +00:00
} catch (e) {
2016-06-01 10:28:37 +00:00
expect(e.status).to.equal(304);
}
});
it('should work for a key with an existing/verified email address to allow key update without an extra delete step in between', async () => {
await publicKey.put({publicKeyArmored, origin});
await publicKey.verify(mailsSent[1].params);
await publicKey.put({publicKeyArmored: publicKeyArmored2, origin});
expect(mailsSent.length).to.equal(5);
});
2016-06-01 10:28:37 +00:00
});
describe('_purgeOldUnverified', () => {
let key;
beforeEach(async () => {
key = pgp.parseKey(publicKeyArmored);
});
it('should work for no keys', async () => {
const r = await publicKey._purgeOldUnverified();
expect(r.deletedCount).to.equal(0);
});
it('should not remove a current unverified key', async () => {
await publicKey._persisKey(key);
const r = await publicKey._purgeOldUnverified();
expect(r.deletedCount).to.equal(0);
});
it('should not remove a current verified key', async () => {
key.userIds[0].verified = true;
await publicKey._persisKey(key);
const r = await publicKey._purgeOldUnverified();
expect(r.deletedCount).to.equal(0);
});
it('should not remove an old verified key', async () => {
key.uploaded.setDate(key.uploaded.getDate() - 31);
key.userIds[0].verified = true;
await publicKey._persisKey(key);
const r = await publicKey._purgeOldUnverified();
expect(r.deletedCount).to.equal(0);
});
it('should remove an old unverified key', async () => {
key.uploaded.setDate(key.uploaded.getDate() - 31);
await publicKey._persisKey(key);
const r = await publicKey._purgeOldUnverified();
expect(r.deletedCount).to.equal(1);
});
});
describe('verify', () => {
2017-08-17 09:44:26 +00:00
it('should update the document', async () => {
await publicKey.put({publicKeyArmored, origin});
2017-08-15 08:03:06 +00:00
const emailParams = mailsSent[0].params;
await publicKey.verify(emailParams);
const gotten = await mongo.get({keyId: emailParams.keyId}, DB_TYPE);
expect(gotten.userIds[0].verified).to.be.true;
expect(gotten.userIds[0].nonce).to.be.null;
expect(gotten.userIds[1].verified).to.be.false;
expect(gotten.userIds[1].nonce).to.exist;
});
2017-08-17 09:44:26 +00:00
it('should not find the document', async () => {
await publicKey.put({publicKeyArmored, origin});
2017-08-15 08:03:06 +00:00
const emailParams = mailsSent[0].params;
try {
await publicKey.verify({keyId: emailParams.keyId, nonce: 'fake_nonce'});
expect(true).to.be.false;
2017-08-15 08:03:06 +00:00
} catch (e) {
expect(e.status).to.equal(404);
}
const gotten = await mongo.get({keyId: emailParams.keyId}, DB_TYPE);
expect(gotten.userIds[0].verified).to.be.false;
expect(gotten.userIds[0].nonce).to.equal(emailParams.nonce);
expect(gotten.userIds[1].verified).to.be.false;
expect(gotten.userIds[1].nonce).to.exist;
});
it('should verify a second key for an already verified user id and delete the old key', async () => {
await publicKey.put({publicKeyArmored, origin});
await publicKey.verify(mailsSent[1].params);
let firstKey = await publicKey.getVerified({keyId: mailsSent[1].params.keyId});
expect(firstKey).to.exist;
await publicKey.put({publicKeyArmored: publicKeyArmored2, origin});
2017-08-24 05:26:39 +00:00
await publicKey.verify(mailsSent[4].params);
firstKey = await publicKey.getVerified({keyId: mailsSent[1].params.keyId});
expect(firstKey).to.not.exist;
const secondKey = await publicKey.getVerified({keyId: mailsSent[4].params.keyId});
expect(secondKey).to.exist;
});
it('should delete other keys with the same user id when verifying', async () => {
await publicKey.put({publicKeyArmored, origin});
await publicKey.put({publicKeyArmored: publicKeyArmored2, origin});
expect(mailsSent[1].to).to.equal(mailsSent[4].to);
await publicKey.verify(mailsSent[1].params);
const firstKey = await publicKey.getVerified({keyId: mailsSent[1].params.keyId});
expect(firstKey).to.exist;
const secondKey = await mongo.get({keyId: mailsSent[4].params.keyId}, DB_TYPE);
expect(secondKey).to.not.exist;
});
2017-08-17 09:44:26 +00:00
it('should be able to verify multiple user ids', async () => {
await publicKey.put({publicKeyArmored, origin});
expect(mailsSent.length).to.equal(4);
await publicKey.verify(mailsSent[0].params);
await publicKey.verify(mailsSent[1].params);
await publicKey.verify(mailsSent[2].params);
await publicKey.verify(mailsSent[3].params);
const gotten = await mongo.get({keyId: mailsSent[0].params.keyId}, DB_TYPE);
expect(gotten.userIds[0].verified).to.be.true;
expect(gotten.userIds[1].verified).to.be.true;
expect(gotten.userIds[2].verified).to.be.true;
expect(gotten.userIds[3].verified).to.be.true;
});
});
describe('getVerified', () => {
let key;
describe('should find a verified key', () => {
2017-08-17 09:44:26 +00:00
beforeEach(async () => {
key = pgp.parseKey(publicKeyArmored);
await publicKey.put({publicKeyArmored, origin});
await publicKey.verify(mailsSent[0].params);
});
2017-08-17 09:44:26 +00:00
it('by fingerprint', async () => {
const verified = await publicKey.getVerified({fingerprint: key.fingerprint});
expect(verified).to.exist;
});
2017-08-17 09:44:26 +00:00
it('by all userIds', async () => {
const verified = await publicKey.getVerified({userIds: key.userIds});
expect(verified).to.exist;
});
2017-08-17 09:44:26 +00:00
it('by verified userId', async () => {
const verified = await publicKey.getVerified({userIds: [key.userIds[0]]});
expect(verified).to.exist;
});
2017-08-17 09:44:26 +00:00
it('by unverified userId', async () => {
const verified = await publicKey.getVerified({userIds: [key.userIds[1]]});
expect(verified).to.not.exist;
});
2017-08-17 09:44:26 +00:00
it('by keyId', async () => {
const verified = await publicKey.getVerified({keyId: key.keyId});
expect(verified).to.exist;
});
2017-08-17 09:44:26 +00:00
it('by all params', async () => {
const verified = await publicKey.getVerified(key);
expect(verified).to.exist;
});
});
describe('should not find an unverified key', () => {
2017-08-17 09:44:26 +00:00
beforeEach(async () => {
key = pgp.parseKey(publicKeyArmored);
key.userIds[0].verified = false;
await mongo.create(key, DB_TYPE);
});
2017-08-17 09:44:26 +00:00
it('by fingerprint', async () => {
const verified = await publicKey.getVerified({fingerprint: key.fingerprint});
expect(verified).to.not.exist;
});
2017-08-17 09:44:26 +00:00
it('by userIds', async () => {
const verified = await publicKey.getVerified({userIds: key.userIds});
expect(verified).to.not.exist;
});
2017-08-17 09:44:26 +00:00
it('by keyId', async () => {
const verified = await publicKey.getVerified({keyId: key.keyId});
expect(verified).to.not.exist;
});
2017-08-17 09:44:26 +00:00
it('by all params', async () => {
const verified = await publicKey.getVerified(key);
expect(verified).to.not.exist;
});
});
});
2016-06-01 10:28:37 +00:00
describe('get', () => {
let emailParams;
2017-08-17 09:44:26 +00:00
beforeEach(async () => {
await publicKey.put({publicKeyArmored, origin});
emailParams = mailsSent[0].params;
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should return verified key by key id', async () => {
await publicKey.verify(emailParams);
const key = await publicKey.get({keyId: emailParams.keyId});
expect(key.publicKeyArmored).to.exist;
});
2017-08-17 09:44:26 +00:00
it('should return verified key by key id (uppercase)', async () => {
await publicKey.verify(emailParams);
const key = await publicKey.get({keyId: emailParams.keyId.toUpperCase()});
expect(key.publicKeyArmored).to.exist;
});
2017-08-17 09:44:26 +00:00
it('should return verified key by fingerprint', async () => {
await publicKey.verify(emailParams);
2017-08-15 08:03:06 +00:00
const fingerprint = pgp.parseKey(publicKeyArmored).fingerprint;
const key = await publicKey.get({fingerprint});
expect(key.publicKeyArmored).to.exist;
});
2017-08-17 09:44:26 +00:00
it('should return verified key by fingerprint (uppercase)', async () => {
await publicKey.verify(emailParams);
2017-08-15 08:03:06 +00:00
const fingerprint = pgp.parseKey(publicKeyArmored).fingerprint.toUpperCase();
const key = await publicKey.get({fingerprint});
expect(key.publicKeyArmored).to.exist;
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should return verified key by email address', async () => {
await publicKey.verify(emailParams);
const key = await publicKey.get({email: primaryEmail});
expect(key.publicKeyArmored).to.exist;
});
2017-08-17 09:44:26 +00:00
it('should return verified key by email address (uppercase)', async () => {
await publicKey.verify(emailParams);
const key = await publicKey.get({email: primaryEmail.toUpperCase()});
expect(key.publicKeyArmored).to.exist;
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should throw 404 for unverified key', async () => {
2016-06-01 10:28:37 +00:00
try {
await publicKey.get({keyId: emailParams.keyId});
2016-06-01 10:28:37 +00:00
expect(false).to.be.true;
2017-08-15 08:03:06 +00:00
} catch (e) {
2016-06-01 10:28:37 +00:00
expect(e.status).to.equal(404);
}
});
});
describe('requestRemove', () => {
let keyId;
2016-06-01 10:28:37 +00:00
2017-08-17 09:44:26 +00:00
beforeEach(async () => {
await publicKey.put({publicKeyArmored, origin});
keyId = mailsSent[0].params.keyId;
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should work for verified key', async () => {
await publicKey.verify(mailsSent[0].params);
await publicKey.requestRemove({keyId, origin});
expect(mailsSent.length).to.equal(8);
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should work for unverified key', async () => {
await publicKey.requestRemove({keyId, origin});
expect(mailsSent.length).to.equal(8);
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should work by email address', async () => {
await publicKey.requestRemove({email: primaryEmail, origin});
expect(mailsSent.length).to.equal(5);
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should throw 404 for no key', async () => {
await mongo.remove({keyId}, DB_TYPE);
2016-06-01 10:28:37 +00:00
try {
await publicKey.requestRemove({keyId, origin});
2016-06-01 10:28:37 +00:00
expect(false).to.be.true;
2017-08-15 08:03:06 +00:00
} catch (e) {
2016-06-01 10:28:37 +00:00
expect(e.status).to.equal(404);
}
});
});
describe('verifyRemove', () => {
let keyId;
2016-06-01 10:28:37 +00:00
2017-08-17 09:44:26 +00:00
beforeEach(async () => {
await publicKey.put({publicKeyArmored, origin});
keyId = mailsSent[0].params.keyId;
await publicKey.requestRemove({keyId, origin});
2016-06-01 10:28:37 +00:00
});
2017-08-17 09:44:26 +00:00
it('should remove key', async () => {
await publicKey.verifyRemove(mailsSent[4].params);
const key = await mongo.get({keyId}, DB_TYPE);
2016-06-01 10:28:37 +00:00
expect(key).to.not.exist;
});
2017-08-17 09:44:26 +00:00
it('should throw 404 for no key', async () => {
await mongo.remove({keyId}, DB_TYPE);
2016-06-01 10:28:37 +00:00
try {
await publicKey.verifyRemove(mailsSent[1].params);
2016-06-01 10:28:37 +00:00
expect(false).to.be.true;
2017-08-15 08:03:06 +00:00
} catch (e) {
2016-06-01 10:28:37 +00:00
expect(e.status).to.equal(404);
}
});
});
2017-08-15 08:03:06 +00:00
});