2019-07-30 09:35:42 +02:00
|
|
|
/* eslint-disable require-atomic-updates */
|
|
|
|
|
2018-03-09 22:59:12 +02:00
|
|
|
const fs = require('fs-extra');
|
|
|
|
const { JoplinDatabase } = require('lib/joplin-database.js');
|
|
|
|
const { DatabaseDriverNode } = require('lib/database-driver-node.js');
|
2020-03-14 01:46:14 +02:00
|
|
|
const { BaseApplication } = require('lib/BaseApplication.js');
|
2018-03-09 22:59:12 +02:00
|
|
|
const BaseModel = require('lib/BaseModel.js');
|
|
|
|
const Folder = require('lib/models/Folder.js');
|
|
|
|
const Note = require('lib/models/Note.js');
|
2018-12-10 20:54:46 +02:00
|
|
|
const ItemChange = require('lib/models/ItemChange.js');
|
2018-03-09 22:59:12 +02:00
|
|
|
const Resource = require('lib/models/Resource.js');
|
|
|
|
const Tag = require('lib/models/Tag.js');
|
|
|
|
const NoteTag = require('lib/models/NoteTag.js');
|
2019-05-06 22:35:29 +02:00
|
|
|
const Revision = require('lib/models/Revision.js');
|
2018-03-09 22:59:12 +02:00
|
|
|
const { Logger } = require('lib/logger.js');
|
|
|
|
const Setting = require('lib/models/Setting.js');
|
|
|
|
const MasterKey = require('lib/models/MasterKey');
|
|
|
|
const BaseItem = require('lib/models/BaseItem.js');
|
|
|
|
const { FileApi } = require('lib/file-api.js');
|
|
|
|
const { FileApiDriverMemory } = require('lib/file-api-driver-memory.js');
|
|
|
|
const { FileApiDriverLocal } = require('lib/file-api-driver-local.js');
|
|
|
|
const { FileApiDriverWebDav } = require('lib/file-api-driver-webdav.js');
|
2018-03-24 21:35:10 +02:00
|
|
|
const { FileApiDriverDropbox } = require('lib/file-api-driver-dropbox.js');
|
2020-07-15 11:22:55 +02:00
|
|
|
const { FileApiDriverAmazonS3 } = require('lib/file-api-driver-amazon-s3.js');
|
2018-03-15 19:46:54 +02:00
|
|
|
const BaseService = require('lib/services/BaseService.js');
|
2018-03-09 22:59:12 +02:00
|
|
|
const { FsDriverNode } = require('lib/fs-driver-node.js');
|
|
|
|
const { time } = require('lib/time-utils.js');
|
|
|
|
const { shimInit } = require('lib/shim-init-node.js');
|
2019-11-02 12:19:24 +02:00
|
|
|
const { shim } = require('lib/shim.js');
|
2019-10-10 23:23:11 +02:00
|
|
|
const { uuid } = require('lib/uuid.js');
|
2018-03-09 22:59:12 +02:00
|
|
|
const SyncTargetRegistry = require('lib/SyncTargetRegistry.js');
|
|
|
|
const SyncTargetMemory = require('lib/SyncTargetMemory.js');
|
|
|
|
const SyncTargetFilesystem = require('lib/SyncTargetFilesystem.js');
|
|
|
|
const SyncTargetOneDrive = require('lib/SyncTargetOneDrive.js');
|
|
|
|
const SyncTargetNextcloud = require('lib/SyncTargetNextcloud.js');
|
2018-03-24 21:35:10 +02:00
|
|
|
const SyncTargetDropbox = require('lib/SyncTargetDropbox.js');
|
2020-07-15 11:22:55 +02:00
|
|
|
const SyncTargetAmazonS3 = require('lib/SyncTargetAmazonS3.js');
|
2018-03-09 22:59:12 +02:00
|
|
|
const EncryptionService = require('lib/services/EncryptionService.js');
|
|
|
|
const DecryptionWorker = require('lib/services/DecryptionWorker.js');
|
2019-04-21 14:49:40 +02:00
|
|
|
const ResourceService = require('lib/services/ResourceService.js');
|
2019-05-06 22:35:29 +02:00
|
|
|
const RevisionService = require('lib/services/RevisionService.js');
|
2020-05-31 01:31:29 +02:00
|
|
|
const ResourceFetcher = require('lib/services/ResourceFetcher.js');
|
2019-06-08 00:11:08 +02:00
|
|
|
const KvStore = require('lib/services/KvStore.js');
|
2018-03-09 22:59:12 +02:00
|
|
|
const WebDavApi = require('lib/WebDavApi');
|
2018-03-24 21:35:10 +02:00
|
|
|
const DropboxApi = require('lib/DropboxApi');
|
2020-06-03 18:07:50 +02:00
|
|
|
const { loadKeychainServiceAndSettings } = require('lib/services/SettingUtils');
|
|
|
|
const KeychainServiceDriver = require('lib/services/keychain/KeychainServiceDriver.node').default;
|
|
|
|
const KeychainServiceDriverDummy = require('lib/services/keychain/KeychainServiceDriver.dummy').default;
|
2020-05-31 22:07:24 +02:00
|
|
|
const md5 = require('md5');
|
2020-07-15 11:22:55 +02:00
|
|
|
const S3 = require('aws-sdk/clients/s3');
|
2017-06-14 21:59:02 +02:00
|
|
|
|
2020-03-14 01:46:14 +02:00
|
|
|
const databases_ = [];
|
|
|
|
const synchronizers_ = [];
|
|
|
|
const encryptionServices_ = [];
|
|
|
|
const revisionServices_ = [];
|
|
|
|
const decryptionWorkers_ = [];
|
|
|
|
const resourceServices_ = [];
|
2020-05-31 01:31:29 +02:00
|
|
|
const resourceFetchers_ = [];
|
2020-03-14 01:46:14 +02:00
|
|
|
const kvStores_ = [];
|
2017-06-14 21:59:02 +02:00
|
|
|
let fileApi_ = null;
|
2017-06-18 22:19:13 +02:00
|
|
|
let currentClient_ = 1;
|
2017-06-14 21:59:02 +02:00
|
|
|
|
2019-11-02 12:19:24 +02:00
|
|
|
// The line `process.on('unhandledRejection'...` in all the test files is going to
|
|
|
|
// make it throw this error. It's not too big a problem so disable it for now.
|
|
|
|
// https://stackoverflow.com/questions/9768444/possible-eventemitter-memory-leak-detected
|
|
|
|
process.setMaxListeners(0);
|
|
|
|
|
2017-12-13 20:57:40 +02:00
|
|
|
shimInit();
|
|
|
|
|
2019-11-02 12:19:24 +02:00
|
|
|
shim.setIsTestingEnv(true);
|
|
|
|
|
2017-07-06 00:29:03 +02:00
|
|
|
const fsDriver = new FsDriverNode();
|
|
|
|
Logger.fsDriver_ = fsDriver;
|
|
|
|
Resource.fsDriver_ = fsDriver;
|
2017-12-18 21:54:03 +02:00
|
|
|
EncryptionService.fsDriver_ = fsDriver;
|
2018-01-17 20:51:15 +02:00
|
|
|
FileApiDriverLocal.fsDriver_ = fsDriver;
|
2017-07-06 00:29:03 +02:00
|
|
|
|
2019-09-19 23:51:18 +02:00
|
|
|
const logDir = `${__dirname}/../tests/logs`;
|
|
|
|
const tempDir = `${__dirname}/../tests/tmp`;
|
2017-07-06 21:48:17 +02:00
|
|
|
fs.mkdirpSync(logDir, 0o755);
|
2018-09-27 10:14:05 +02:00
|
|
|
fs.mkdirpSync(tempDir, 0o755);
|
2020-03-10 01:24:57 +02:00
|
|
|
fs.mkdirpSync(`${__dirname}/data`);
|
2017-07-06 21:48:17 +02:00
|
|
|
|
2017-11-24 21:21:30 +02:00
|
|
|
SyncTargetRegistry.addClass(SyncTargetMemory);
|
|
|
|
SyncTargetRegistry.addClass(SyncTargetFilesystem);
|
2017-11-28 00:50:46 +02:00
|
|
|
SyncTargetRegistry.addClass(SyncTargetOneDrive);
|
2018-01-25 23:15:58 +02:00
|
|
|
SyncTargetRegistry.addClass(SyncTargetNextcloud);
|
2018-03-24 21:35:10 +02:00
|
|
|
SyncTargetRegistry.addClass(SyncTargetDropbox);
|
2020-07-15 11:22:55 +02:00
|
|
|
SyncTargetRegistry.addClass(SyncTargetAmazonS3);
|
2017-11-24 21:21:30 +02:00
|
|
|
|
2018-06-09 21:00:26 +02:00
|
|
|
// const syncTargetId_ = SyncTargetRegistry.nameToId("nextcloud");
|
2019-07-30 09:35:42 +02:00
|
|
|
const syncTargetId_ = SyncTargetRegistry.nameToId('memory');
|
2019-10-09 21:35:13 +02:00
|
|
|
// const syncTargetId_ = SyncTargetRegistry.nameToId('filesystem');
|
2018-03-27 18:48:55 +02:00
|
|
|
// const syncTargetId_ = SyncTargetRegistry.nameToId('dropbox');
|
2020-07-15 11:22:55 +02:00
|
|
|
// const syncTargetId_ = SyncTargetRegistry.nameToId('amazon_s3');
|
2019-09-19 23:51:18 +02:00
|
|
|
const syncDir = `${__dirname}/../tests/sync`;
|
2017-07-23 16:11:44 +02:00
|
|
|
|
2019-10-09 21:35:13 +02:00
|
|
|
const sleepTime = syncTargetId_ == SyncTargetRegistry.nameToId('filesystem') ? 1001 : 100;// 400;
|
2017-07-24 20:58:11 +02:00
|
|
|
|
2019-09-19 23:51:18 +02:00
|
|
|
console.info(`Testing with sync target: ${SyncTargetRegistry.idToName(syncTargetId_)}`);
|
2018-01-25 23:15:58 +02:00
|
|
|
|
2019-05-14 23:23:34 +02:00
|
|
|
const dbLogger = new Logger();
|
|
|
|
dbLogger.addTarget('console');
|
2019-09-19 23:51:18 +02:00
|
|
|
dbLogger.addTarget('file', { path: `${logDir}/log.txt` });
|
2019-05-14 23:23:34 +02:00
|
|
|
dbLogger.setLevel(Logger.LEVEL_WARN);
|
|
|
|
|
2017-06-25 17:17:40 +02:00
|
|
|
const logger = new Logger();
|
2018-03-09 22:59:12 +02:00
|
|
|
logger.addTarget('console');
|
2019-09-19 23:51:18 +02:00
|
|
|
logger.addTarget('file', { path: `${logDir}/log.txt` });
|
2018-03-15 19:46:54 +02:00
|
|
|
logger.setLevel(Logger.LEVEL_WARN); // Set to DEBUG to display sync process in console
|
2017-06-25 17:17:40 +02:00
|
|
|
|
2018-03-09 22:59:12 +02:00
|
|
|
BaseItem.loadClass('Note', Note);
|
|
|
|
BaseItem.loadClass('Folder', Folder);
|
|
|
|
BaseItem.loadClass('Resource', Resource);
|
|
|
|
BaseItem.loadClass('Tag', Tag);
|
|
|
|
BaseItem.loadClass('NoteTag', NoteTag);
|
|
|
|
BaseItem.loadClass('MasterKey', MasterKey);
|
2019-05-06 22:35:29 +02:00
|
|
|
BaseItem.loadClass('Revision', Revision);
|
2017-07-06 21:48:17 +02:00
|
|
|
|
2020-06-03 18:07:50 +02:00
|
|
|
Setting.setConstant('appId', 'net.cozic.joplintest-cli');
|
2018-03-09 22:59:12 +02:00
|
|
|
Setting.setConstant('appType', 'cli');
|
2018-09-27 10:14:05 +02:00
|
|
|
Setting.setConstant('tempDir', tempDir);
|
2017-07-07 00:15:31 +02:00
|
|
|
|
2018-03-15 19:46:54 +02:00
|
|
|
BaseService.logger_ = logger;
|
|
|
|
|
2018-02-15 19:12:09 +02:00
|
|
|
Setting.autoSaveEnabled = false;
|
|
|
|
|
2017-07-23 16:11:44 +02:00
|
|
|
function syncTargetId() {
|
2017-07-24 20:58:11 +02:00
|
|
|
return syncTargetId_;
|
2017-07-23 16:11:44 +02:00
|
|
|
}
|
|
|
|
|
2017-06-18 22:19:13 +02:00
|
|
|
function sleep(n) {
|
|
|
|
return new Promise((resolve, reject) => {
|
|
|
|
setTimeout(() => {
|
|
|
|
resolve();
|
2017-06-19 21:18:22 +02:00
|
|
|
}, Math.round(n * 1000));
|
2017-06-18 22:19:13 +02:00
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-03-16 04:30:54 +02:00
|
|
|
function currentClientId() {
|
|
|
|
return currentClient_;
|
|
|
|
}
|
|
|
|
|
2020-06-03 18:07:50 +02:00
|
|
|
async function switchClient(id, options = null) {
|
|
|
|
options = Object.assign({}, { keychainEnabled: false }, options);
|
|
|
|
|
2019-09-19 23:51:18 +02:00
|
|
|
if (!databases_[id]) throw new Error(`Call setupDatabaseAndSynchronizer(${id}) first!!`);
|
2019-04-21 14:49:40 +02:00
|
|
|
|
2017-07-24 20:58:11 +02:00
|
|
|
await time.msleep(sleepTime); // Always leave a little time so that updated_time properties don't overlap
|
2017-07-03 20:29:19 +02:00
|
|
|
await Setting.saveAll();
|
2017-06-20 21:18:19 +02:00
|
|
|
|
2017-06-18 22:19:13 +02:00
|
|
|
currentClient_ = id;
|
2020-03-16 04:30:54 +02:00
|
|
|
BaseModel.setDb(databases_[id]);
|
2017-06-20 21:18:19 +02:00
|
|
|
|
2017-12-13 20:57:40 +02:00
|
|
|
BaseItem.encryptionService_ = encryptionServices_[id];
|
2017-12-18 21:54:03 +02:00
|
|
|
Resource.encryptionService_ = encryptionServices_[id];
|
2019-05-06 22:35:29 +02:00
|
|
|
BaseItem.revisionService_ = revisionServices_[id];
|
2017-12-18 21:54:03 +02:00
|
|
|
|
2020-04-14 00:55:24 +02:00
|
|
|
Setting.setConstant('resourceDirName', resourceDirName(id));
|
2018-03-09 22:59:12 +02:00
|
|
|
Setting.setConstant('resourceDir', resourceDir(id));
|
2017-12-13 20:57:40 +02:00
|
|
|
|
2020-06-03 18:07:50 +02:00
|
|
|
await loadKeychainServiceAndSettings(options.keychainEnabled ? KeychainServiceDriver : KeychainServiceDriverDummy);
|
2019-09-25 20:40:04 +02:00
|
|
|
|
|
|
|
Setting.setValue('sync.wipeOutFailSafe', false); // To keep things simple, always disable fail-safe unless explicitely set in the test itself
|
2017-06-18 22:19:13 +02:00
|
|
|
}
|
|
|
|
|
2017-12-20 21:45:25 +02:00
|
|
|
async function clearDatabase(id = null) {
|
2017-06-18 22:19:13 +02:00
|
|
|
if (id === null) id = currentClient_;
|
2020-02-27 20:25:42 +02:00
|
|
|
if (!databases_[id]) return;
|
2017-06-18 22:19:13 +02:00
|
|
|
|
2018-12-10 20:54:46 +02:00
|
|
|
await ItemChange.waitForAllSaved();
|
|
|
|
|
2019-05-06 22:35:29 +02:00
|
|
|
const tableNames = [
|
|
|
|
'notes',
|
|
|
|
'folders',
|
|
|
|
'resources',
|
|
|
|
'tags',
|
|
|
|
'note_tags',
|
|
|
|
'master_keys',
|
|
|
|
'item_changes',
|
|
|
|
'note_resources',
|
2019-07-30 09:35:42 +02:00
|
|
|
'settings',
|
2019-05-06 22:35:29 +02:00
|
|
|
'deleted_items',
|
|
|
|
'sync_items',
|
|
|
|
'notes_normalized',
|
|
|
|
'revisions',
|
2019-06-07 10:05:15 +02:00
|
|
|
'key_values',
|
2017-06-18 22:19:13 +02:00
|
|
|
];
|
|
|
|
|
2019-05-06 22:35:29 +02:00
|
|
|
const queries = [];
|
|
|
|
for (const n of tableNames) {
|
2019-09-19 23:51:18 +02:00
|
|
|
queries.push(`DELETE FROM ${n}`);
|
|
|
|
queries.push(`DELETE FROM sqlite_sequence WHERE name="${n}"`); // Reset autoincremented IDs
|
2019-05-06 22:35:29 +02:00
|
|
|
}
|
2017-12-20 21:45:25 +02:00
|
|
|
await databases_[id].transactionExecBatch(queries);
|
2017-06-18 22:19:13 +02:00
|
|
|
}
|
|
|
|
|
2020-06-03 18:07:50 +02:00
|
|
|
async function setupDatabase(id = null, options = null) {
|
|
|
|
options = Object.assign({}, { keychainEnabled: false }, options);
|
|
|
|
|
2017-06-18 22:19:13 +02:00
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
|
2017-12-20 21:45:25 +02:00
|
|
|
Setting.cancelScheduleSave();
|
|
|
|
Setting.cache_ = null;
|
|
|
|
|
2017-06-18 22:19:13 +02:00
|
|
|
if (databases_[id]) {
|
2020-03-16 04:30:54 +02:00
|
|
|
BaseModel.setDb(databases_[id]);
|
2017-12-20 21:45:25 +02:00
|
|
|
await clearDatabase(id);
|
2020-06-03 18:07:50 +02:00
|
|
|
await loadKeychainServiceAndSettings(options.keychainEnabled ? KeychainServiceDriver : KeychainServiceDriverDummy);
|
2017-12-20 21:45:25 +02:00
|
|
|
return;
|
2017-06-14 21:59:02 +02:00
|
|
|
}
|
|
|
|
|
2019-09-19 23:51:18 +02:00
|
|
|
const filePath = `${__dirname}/data/test-${id}.sqlite`;
|
2017-12-20 21:45:25 +02:00
|
|
|
|
|
|
|
try {
|
|
|
|
await fs.unlink(filePath);
|
|
|
|
} catch (error) {
|
2017-06-14 21:59:02 +02:00
|
|
|
// Don't care if the file doesn't exist
|
2019-07-30 09:35:42 +02:00
|
|
|
}
|
2017-12-20 21:45:25 +02:00
|
|
|
|
|
|
|
databases_[id] = new JoplinDatabase(new DatabaseDriverNode());
|
2019-05-14 23:23:34 +02:00
|
|
|
databases_[id].setLogger(dbLogger);
|
2017-12-20 21:45:25 +02:00
|
|
|
await databases_[id].open({ name: filePath });
|
|
|
|
|
2020-03-16 04:30:54 +02:00
|
|
|
BaseModel.setDb(databases_[id]);
|
2020-06-03 18:07:50 +02:00
|
|
|
await loadKeychainServiceAndSettings(options.keychainEnabled ? KeychainServiceDriver : KeychainServiceDriverDummy);
|
2017-06-14 21:59:02 +02:00
|
|
|
}
|
|
|
|
|
2020-04-14 00:55:24 +02:00
|
|
|
function resourceDirName(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
return `resources-${id}`;
|
|
|
|
}
|
|
|
|
|
2017-12-18 21:54:03 +02:00
|
|
|
function resourceDir(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
2020-04-14 00:55:24 +02:00
|
|
|
return `${__dirname}/data/${resourceDirName(id)}`;
|
2017-12-18 21:54:03 +02:00
|
|
|
}
|
|
|
|
|
2020-06-03 18:07:50 +02:00
|
|
|
async function setupDatabaseAndSynchronizer(id = null, options = null) {
|
2017-06-18 22:19:13 +02:00
|
|
|
if (id === null) id = currentClient_;
|
2017-06-18 01:49:52 +02:00
|
|
|
|
2020-03-16 04:30:54 +02:00
|
|
|
BaseService.logger_ = logger;
|
|
|
|
|
2020-06-03 18:07:50 +02:00
|
|
|
await setupDatabase(id, options);
|
2017-06-18 22:19:13 +02:00
|
|
|
|
2017-12-20 21:45:25 +02:00
|
|
|
EncryptionService.instance_ = null;
|
|
|
|
DecryptionWorker.instance_ = null;
|
|
|
|
|
2017-12-18 21:54:03 +02:00
|
|
|
await fs.remove(resourceDir(id));
|
|
|
|
await fs.mkdirp(resourceDir(id), 0o755);
|
|
|
|
|
2017-06-18 22:19:13 +02:00
|
|
|
if (!synchronizers_[id]) {
|
2017-11-24 20:37:40 +02:00
|
|
|
const SyncTargetClass = SyncTargetRegistry.classById(syncTargetId_);
|
|
|
|
const syncTarget = new SyncTargetClass(db(id));
|
|
|
|
syncTarget.setFileApi(fileApi());
|
|
|
|
syncTarget.setLogger(logger);
|
|
|
|
synchronizers_[id] = await syncTarget.synchronizer();
|
2017-06-18 01:49:52 +02:00
|
|
|
}
|
2017-06-18 22:19:13 +02:00
|
|
|
|
2017-12-19 21:01:29 +02:00
|
|
|
encryptionServices_[id] = new EncryptionService();
|
2019-05-06 22:35:29 +02:00
|
|
|
revisionServices_[id] = new RevisionService();
|
2017-12-19 21:01:29 +02:00
|
|
|
decryptionWorkers_[id] = new DecryptionWorker();
|
|
|
|
decryptionWorkers_[id].setEncryptionService(encryptionServices_[id]);
|
2019-04-21 14:49:40 +02:00
|
|
|
resourceServices_[id] = new ResourceService();
|
2020-05-31 01:31:29 +02:00
|
|
|
resourceFetchers_[id] = new ResourceFetcher(() => { return synchronizers_[id].api(); });
|
2019-06-08 00:11:08 +02:00
|
|
|
kvStores_[id] = new KvStore();
|
2017-12-13 20:57:40 +02:00
|
|
|
|
2018-01-26 00:44:09 +02:00
|
|
|
await fileApi().clearRoot();
|
2017-06-14 21:59:02 +02:00
|
|
|
}
|
|
|
|
|
2017-06-18 22:19:13 +02:00
|
|
|
function db(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
return databases_[id];
|
2017-06-14 21:59:02 +02:00
|
|
|
}
|
|
|
|
|
2017-06-18 22:19:13 +02:00
|
|
|
function synchronizer(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
return synchronizers_[id];
|
2017-06-14 21:59:02 +02:00
|
|
|
}
|
|
|
|
|
2017-12-13 20:57:40 +02:00
|
|
|
function encryptionService(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
return encryptionServices_[id];
|
|
|
|
}
|
|
|
|
|
2019-06-08 00:11:08 +02:00
|
|
|
function kvStore(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
const o = kvStores_[id];
|
|
|
|
o.setDb(db(id));
|
|
|
|
return o;
|
|
|
|
}
|
|
|
|
|
2019-05-06 22:35:29 +02:00
|
|
|
function revisionService(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
return revisionServices_[id];
|
|
|
|
}
|
|
|
|
|
2017-12-19 21:01:29 +02:00
|
|
|
function decryptionWorker(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
2019-06-08 00:11:08 +02:00
|
|
|
const o = decryptionWorkers_[id];
|
|
|
|
o.setKvStore(kvStore(id));
|
|
|
|
return o;
|
2017-12-19 21:01:29 +02:00
|
|
|
}
|
|
|
|
|
2019-04-21 14:49:40 +02:00
|
|
|
function resourceService(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
return resourceServices_[id];
|
|
|
|
}
|
|
|
|
|
2020-05-31 01:31:29 +02:00
|
|
|
function resourceFetcher(id = null) {
|
|
|
|
if (id === null) id = currentClient_;
|
|
|
|
return resourceFetchers_[id];
|
|
|
|
}
|
|
|
|
|
2017-12-17 21:51:45 +02:00
|
|
|
async function loadEncryptionMasterKey(id = null, useExisting = false) {
|
2017-12-13 20:57:40 +02:00
|
|
|
const service = encryptionService(id);
|
|
|
|
|
2017-12-17 21:51:45 +02:00
|
|
|
let masterKey = null;
|
|
|
|
|
2018-03-09 22:59:12 +02:00
|
|
|
if (!useExisting) { // Create it
|
|
|
|
masterKey = await service.generateMasterKey('123456');
|
2017-12-17 21:51:45 +02:00
|
|
|
masterKey = await MasterKey.save(masterKey);
|
2018-03-09 22:59:12 +02:00
|
|
|
} else { // Use the one already available
|
2019-07-30 09:35:42 +02:00
|
|
|
const masterKeys = await MasterKey.all();
|
2019-10-29 11:02:42 +02:00
|
|
|
if (!masterKeys.length) throw new Error('No master key available');
|
2019-07-30 09:35:42 +02:00
|
|
|
masterKey = masterKeys[0];
|
2017-12-17 21:51:45 +02:00
|
|
|
}
|
2017-12-13 20:57:40 +02:00
|
|
|
|
2020-01-23 00:01:58 +02:00
|
|
|
await service.loadMasterKey_(masterKey, '123456', true);
|
2017-12-13 20:57:40 +02:00
|
|
|
|
|
|
|
return masterKey;
|
|
|
|
}
|
|
|
|
|
2017-06-14 21:59:02 +02:00
|
|
|
function fileApi() {
|
2017-06-18 22:19:13 +02:00
|
|
|
if (fileApi_) return fileApi_;
|
|
|
|
|
2018-03-09 22:59:12 +02:00
|
|
|
if (syncTargetId_ == SyncTargetRegistry.nameToId('filesystem')) {
|
2019-07-30 09:35:42 +02:00
|
|
|
fs.removeSync(syncDir);
|
2017-07-23 16:11:44 +02:00
|
|
|
fs.mkdirpSync(syncDir, 0o755);
|
|
|
|
fileApi_ = new FileApi(syncDir, new FileApiDriverLocal());
|
2018-03-09 22:59:12 +02:00
|
|
|
} else if (syncTargetId_ == SyncTargetRegistry.nameToId('memory')) {
|
|
|
|
fileApi_ = new FileApi('/root', new FileApiDriverMemory());
|
|
|
|
} else if (syncTargetId_ == SyncTargetRegistry.nameToId('nextcloud')) {
|
2018-01-25 23:15:58 +02:00
|
|
|
const options = {
|
2018-03-09 22:59:12 +02:00
|
|
|
baseUrl: () => 'http://nextcloud.local/remote.php/dav/files/admin/JoplinTest',
|
|
|
|
username: () => 'admin',
|
|
|
|
password: () => '123456',
|
2018-01-25 23:15:58 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
const api = new WebDavApi(options);
|
2018-03-09 22:59:12 +02:00
|
|
|
fileApi_ = new FileApi('', new FileApiDriverWebDav(api));
|
2018-03-24 21:35:10 +02:00
|
|
|
} else if (syncTargetId_ == SyncTargetRegistry.nameToId('dropbox')) {
|
|
|
|
const api = new DropboxApi();
|
2019-09-19 23:51:18 +02:00
|
|
|
const authTokenPath = `${__dirname}/support/dropbox-auth.txt`;
|
2018-03-24 21:35:10 +02:00
|
|
|
const authToken = fs.readFileSync(authTokenPath, 'utf8');
|
2019-09-19 23:51:18 +02:00
|
|
|
if (!authToken) throw new Error(`Dropbox auth token missing in ${authTokenPath}`);
|
2018-03-24 21:35:10 +02:00
|
|
|
api.setAuthToken(authToken);
|
|
|
|
fileApi_ = new FileApi('', new FileApiDriverDropbox(api));
|
2020-07-15 11:22:55 +02:00
|
|
|
} else if (syncTargetId_ == SyncTargetRegistry.nameToId('amazon_s3')) {
|
|
|
|
const amazonS3CredsPath = `${__dirname}/support/amazon-s3-auth.json`;
|
|
|
|
const amazonS3Creds = require(amazonS3CredsPath);
|
|
|
|
if (!amazonS3Creds || !amazonS3Creds.accessKeyId) throw new Error(`AWS auth JSON missing in ${amazonS3CredsPath} format should be: { "accessKeyId": "", "secretAccessKey": "", "bucket": "mybucket"}`);
|
|
|
|
const api = new S3({ accessKeyId: amazonS3Creds.accessKeyId, secretAccessKey: amazonS3Creds.secretAccessKey, s3UseArnRegion: true });
|
|
|
|
fileApi_ = new FileApi('', new FileApiDriverAmazonS3(api, amazonS3Creds.bucket));
|
2017-07-24 20:58:11 +02:00
|
|
|
}
|
2018-01-25 23:15:58 +02:00
|
|
|
|
2020-07-15 11:22:55 +02:00
|
|
|
|
2017-07-24 20:58:11 +02:00
|
|
|
fileApi_.setLogger(logger);
|
|
|
|
fileApi_.setSyncTargetId(syncTargetId_);
|
2018-02-15 20:33:08 +02:00
|
|
|
fileApi_.requestRepeatCount_ = 0;
|
2017-07-24 20:58:11 +02:00
|
|
|
return fileApi_;
|
2017-06-14 21:59:02 +02:00
|
|
|
}
|
|
|
|
|
2017-12-13 20:57:40 +02:00
|
|
|
function objectsEqual(o1, o2) {
|
|
|
|
if (Object.getOwnPropertyNames(o1).length !== Object.getOwnPropertyNames(o2).length) return false;
|
2020-03-14 01:46:14 +02:00
|
|
|
for (const n in o1) {
|
2017-12-13 20:57:40 +02:00
|
|
|
if (!o1.hasOwnProperty(n)) continue;
|
|
|
|
if (o1[n] !== o2[n]) return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
async function checkThrowAsync(asyncFn) {
|
|
|
|
let hasThrown = false;
|
|
|
|
try {
|
|
|
|
await asyncFn();
|
|
|
|
} catch (error) {
|
|
|
|
hasThrown = true;
|
|
|
|
}
|
|
|
|
return hasThrown;
|
|
|
|
}
|
|
|
|
|
2020-06-13 17:20:18 +02:00
|
|
|
function checkThrow(fn) {
|
|
|
|
let hasThrown = false;
|
|
|
|
try {
|
|
|
|
fn();
|
|
|
|
} catch (error) {
|
|
|
|
hasThrown = true;
|
|
|
|
}
|
|
|
|
return hasThrown;
|
|
|
|
}
|
|
|
|
|
2017-12-18 21:54:03 +02:00
|
|
|
function fileContentEqual(path1, path2) {
|
2018-03-09 22:59:12 +02:00
|
|
|
const fs = require('fs-extra');
|
|
|
|
const content1 = fs.readFileSync(path1, 'base64');
|
|
|
|
const content2 = fs.readFileSync(path2, 'base64');
|
2017-12-18 21:54:03 +02:00
|
|
|
return content1 === content2;
|
|
|
|
}
|
|
|
|
|
2018-01-02 21:17:14 +02:00
|
|
|
// Wrap an async test in a try/catch block so that done() is always called
|
|
|
|
// and display a proper error message instead of "unhandled promise error"
|
|
|
|
function asyncTest(callback) {
|
|
|
|
return async function(done) {
|
|
|
|
try {
|
|
|
|
await callback();
|
|
|
|
} catch (error) {
|
2020-01-23 00:01:58 +02:00
|
|
|
if (error.constructor && error.constructor.name === 'ExpectationFailed') {
|
|
|
|
// OK - will be reported by Jasmine
|
|
|
|
} else {
|
|
|
|
console.error(error);
|
|
|
|
expect(0).toBe(1, 'Test has thrown an exception - see above error');
|
|
|
|
}
|
2018-03-27 18:48:55 +02:00
|
|
|
} finally {
|
|
|
|
done();
|
2018-01-02 21:17:14 +02:00
|
|
|
}
|
2019-07-30 09:35:42 +02:00
|
|
|
};
|
2018-01-02 21:17:14 +02:00
|
|
|
}
|
|
|
|
|
2019-04-21 14:49:40 +02:00
|
|
|
async function allSyncTargetItemsEncrypted() {
|
2020-07-12 17:38:54 +02:00
|
|
|
const list = await fileApi().list();
|
2019-04-21 14:49:40 +02:00
|
|
|
const files = list.items;
|
|
|
|
|
|
|
|
let totalCount = 0;
|
|
|
|
let encryptedCount = 0;
|
|
|
|
for (let i = 0; i < files.length; i++) {
|
|
|
|
const file = files[i];
|
|
|
|
const remoteContentString = await fileApi().get(file.path);
|
|
|
|
const remoteContent = await BaseItem.unserialize(remoteContentString);
|
|
|
|
const ItemClass = BaseItem.itemClass(remoteContent);
|
|
|
|
|
|
|
|
if (!ItemClass.encryptionSupported()) continue;
|
|
|
|
|
|
|
|
totalCount++;
|
|
|
|
|
|
|
|
if (remoteContent.type_ === BaseModel.TYPE_RESOURCE) {
|
2019-09-19 23:51:18 +02:00
|
|
|
const content = await fileApi().get(`.resource/${remoteContent.id}`);
|
2019-04-21 14:49:40 +02:00
|
|
|
totalCount++;
|
2019-07-30 09:35:42 +02:00
|
|
|
if (content.substr(0, 5) === 'JED01') encryptedCount++;
|
2019-04-21 14:49:40 +02:00
|
|
|
}
|
|
|
|
|
2019-07-30 09:35:42 +02:00
|
|
|
if (remoteContent.encryption_applied) encryptedCount++;
|
2019-04-21 14:49:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!totalCount) throw new Error('No encryptable item on sync target');
|
|
|
|
|
|
|
|
return totalCount === encryptedCount;
|
|
|
|
}
|
|
|
|
|
2020-02-27 20:25:42 +02:00
|
|
|
function id(a) {
|
|
|
|
return a.id;
|
|
|
|
}
|
|
|
|
|
|
|
|
function ids(a) {
|
2020-05-21 10:14:33 +02:00
|
|
|
return a.map(n => n.id);
|
2020-02-27 20:25:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
function sortedIds(a) {
|
|
|
|
return ids(a).sort();
|
|
|
|
}
|
|
|
|
|
|
|
|
function at(a, indexes) {
|
2020-03-14 01:46:14 +02:00
|
|
|
const out = [];
|
2020-02-27 20:25:42 +02:00
|
|
|
for (let i = 0; i < indexes.length; i++) {
|
|
|
|
out.push(a[indexes[i]]);
|
|
|
|
}
|
|
|
|
return out;
|
|
|
|
}
|
|
|
|
|
|
|
|
async function createNTestFolders(n) {
|
2020-03-14 01:46:14 +02:00
|
|
|
const folders = [];
|
2020-02-27 20:25:42 +02:00
|
|
|
for (let i = 0; i < n; i++) {
|
2020-03-14 01:46:14 +02:00
|
|
|
const folder = await Folder.save({ title: 'folder' });
|
2020-02-27 20:25:42 +02:00
|
|
|
folders.push(folder);
|
2020-03-16 04:30:54 +02:00
|
|
|
await time.msleep(10);
|
2020-02-27 20:25:42 +02:00
|
|
|
}
|
|
|
|
return folders;
|
|
|
|
}
|
|
|
|
|
|
|
|
async function createNTestNotes(n, folder, tagIds = null, title = 'note') {
|
2020-03-14 01:46:14 +02:00
|
|
|
const notes = [];
|
2020-02-27 20:25:42 +02:00
|
|
|
for (let i = 0; i < n; i++) {
|
2020-03-14 01:46:14 +02:00
|
|
|
const title_ = n > 1 ? `${title}${i}` : title;
|
|
|
|
const note = await Note.save({ title: title_, parent_id: folder.id, is_conflict: 0 });
|
2020-02-27 20:25:42 +02:00
|
|
|
notes.push(note);
|
2020-03-16 04:30:54 +02:00
|
|
|
await time.msleep(10);
|
2020-02-27 20:25:42 +02:00
|
|
|
}
|
|
|
|
if (tagIds) {
|
|
|
|
for (let i = 0; i < notes.length; i++) {
|
|
|
|
await Tag.setNoteTagsByIds(notes[i].id, tagIds);
|
2020-03-16 04:30:54 +02:00
|
|
|
await time.msleep(10);
|
2020-02-27 20:25:42 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return notes;
|
|
|
|
}
|
|
|
|
|
|
|
|
async function createNTestTags(n) {
|
2020-03-14 01:46:14 +02:00
|
|
|
const tags = [];
|
2020-02-27 20:25:42 +02:00
|
|
|
for (let i = 0; i < n; i++) {
|
2020-03-14 01:46:14 +02:00
|
|
|
const tag = await Tag.save({ title: 'tag' });
|
2020-02-27 20:25:42 +02:00
|
|
|
tags.push(tag);
|
2020-03-16 04:30:54 +02:00
|
|
|
await time.msleep(10);
|
2020-02-27 20:25:42 +02:00
|
|
|
}
|
|
|
|
return tags;
|
|
|
|
}
|
|
|
|
|
2020-05-31 22:07:24 +02:00
|
|
|
function tempFilePath(ext) {
|
|
|
|
return `${Setting.value('tempDir')}/${md5(Date.now() + Math.random())}.${ext}`;
|
|
|
|
}
|
|
|
|
|
2020-03-16 04:30:54 +02:00
|
|
|
// Application for feature integration testing
|
2020-02-22 13:25:16 +02:00
|
|
|
class TestApp extends BaseApplication {
|
2020-03-16 04:30:54 +02:00
|
|
|
constructor(hasGui = true) {
|
2020-02-22 13:25:16 +02:00
|
|
|
super();
|
2020-03-16 04:30:54 +02:00
|
|
|
this.hasGui_ = hasGui;
|
2020-02-22 13:25:16 +02:00
|
|
|
this.middlewareCalls_ = [];
|
2020-03-16 04:30:54 +02:00
|
|
|
this.logger_ = super.logger();
|
|
|
|
}
|
|
|
|
|
|
|
|
hasGui() {
|
|
|
|
return this.hasGui_;
|
2020-02-22 13:25:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
async start(argv) {
|
2020-03-16 04:30:54 +02:00
|
|
|
this.logger_.info('Test app starting...');
|
2020-02-27 20:25:42 +02:00
|
|
|
|
2020-03-16 04:30:54 +02:00
|
|
|
if (!argv.includes('--profile')) {
|
|
|
|
argv = argv.concat(['--profile', `tests-build/profile/${uuid.create()}`]);
|
|
|
|
}
|
2020-02-27 20:25:42 +02:00
|
|
|
argv = await super.start(['',''].concat(argv));
|
2020-03-16 04:30:54 +02:00
|
|
|
|
|
|
|
// For now, disable sync and encryption to avoid spurious intermittent failures
|
|
|
|
// caused by them interupting processing and causing delays.
|
|
|
|
Setting.setValue('sync.interval', 0);
|
|
|
|
Setting.setValue('encryption.enabled', false);
|
|
|
|
|
2020-02-22 13:25:16 +02:00
|
|
|
this.initRedux();
|
|
|
|
Setting.dispatchUpdateAll();
|
2020-03-16 04:30:54 +02:00
|
|
|
await ItemChange.waitForAllSaved();
|
|
|
|
await this.wait();
|
|
|
|
|
|
|
|
this.logger_.info('Test app started...');
|
2020-02-22 13:25:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
async generalMiddleware(store, next, action) {
|
|
|
|
this.middlewareCalls_.push(true);
|
|
|
|
try {
|
|
|
|
await super.generalMiddleware(store, next, action);
|
|
|
|
} finally {
|
|
|
|
this.middlewareCalls_.pop();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-16 04:30:54 +02:00
|
|
|
async wait() {
|
2020-02-22 13:25:16 +02:00
|
|
|
return new Promise((resolve) => {
|
|
|
|
const iid = setInterval(() => {
|
|
|
|
if (!this.middlewareCalls_.length) {
|
|
|
|
clearInterval(iid);
|
|
|
|
resolve();
|
|
|
|
}
|
|
|
|
}, 100);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-03-16 04:30:54 +02:00
|
|
|
async profileDir() {
|
|
|
|
return await Setting.value('profileDir');
|
|
|
|
}
|
|
|
|
|
2020-02-22 13:25:16 +02:00
|
|
|
async destroy() {
|
2020-03-16 04:30:54 +02:00
|
|
|
this.logger_.info('Test app stopping...');
|
|
|
|
await this.wait();
|
|
|
|
await ItemChange.waitForAllSaved();
|
2020-02-27 20:25:42 +02:00
|
|
|
this.deinitRedux();
|
2020-02-22 13:25:16 +02:00
|
|
|
await super.destroy();
|
2020-03-16 04:30:54 +02:00
|
|
|
await time.msleep(100);
|
2020-02-22 13:25:16 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-12 17:38:54 +02:00
|
|
|
module.exports = { kvStore, resourceService, resourceFetcher, tempFilePath, allSyncTargetItemsEncrypted, setupDatabase, revisionService, setupDatabaseAndSynchronizer, db, synchronizer, fileApi, sleep, clearDatabase, switchClient, syncTargetId, objectsEqual, checkThrowAsync, checkThrow, encryptionService, loadEncryptionMasterKey, fileContentEqual, decryptionWorker, asyncTest, currentClientId, id, ids, sortedIds, at, createNTestNotes, createNTestFolders, createNTestTags, TestApp };
|