diff --git a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/common/CryptoTestHelper.kt b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/common/CryptoTestHelper.kt index f94c8455c2..7368c87252 100644 --- a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/common/CryptoTestHelper.kt +++ b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/common/CryptoTestHelper.kt @@ -230,9 +230,9 @@ class CryptoTestHelper(val mTestHelper: CommonTestHelper) { val aliceRoomId = cryptoTestData.roomId val bobSession = cryptoTestData.secondSession!! - bobSession.setWarnOnUnknownDevices(false) + bobSession.cryptoService().setWarnOnUnknownDevices(false) - aliceSession.setWarnOnUnknownDevices(false) + aliceSession.cryptoService().setWarnOnUnknownDevices(false) val roomFromBobPOV = bobSession.getRoom(aliceRoomId)!! val roomFromAlicePOV = aliceSession.getRoom(aliceRoomId)!! diff --git a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/crosssigning/XSigningTest.kt b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/crosssigning/XSigningTest.kt index c8e7355d7a..069d32acaf 100644 --- a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/crosssigning/XSigningTest.kt +++ b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/crosssigning/XSigningTest.kt @@ -35,7 +35,7 @@ class XSigningTest : InstrumentedTest { val aliceSession = mTestHelper.createAccount(TestConstants.USER_ALICE, SessionTestParams(true)) val aliceLatch = CountDownLatch(1) - aliceSession.getCrossSigningService() + aliceSession.cryptoService().crossSigningService() .initializeCrossSigning(UserPasswordAuth( user = aliceSession.myUserId, password = TestConstants.PASSWORD @@ -43,7 +43,7 @@ class XSigningTest : InstrumentedTest { mTestHelper.await(aliceLatch) - val myCrossSigningKeys = aliceSession.getCrossSigningService().getMyCrossSigningKeys() + val myCrossSigningKeys = aliceSession.cryptoService().crossSigningService().getMyCrossSigningKeys() val masterPubKey = myCrossSigningKeys?.masterKey() assertNotNull("Master key should be stored", masterPubKey?.unpaddedBase64PublicKey) val selfSigningKey = myCrossSigningKeys?.selfSigningKey() @@ -53,7 +53,7 @@ class XSigningTest : InstrumentedTest { assertTrue("Signing Keys should be trusted", myCrossSigningKeys?.isTrusted() == true) - assertTrue("Signing Keys should be trusted", aliceSession.getCrossSigningService().checkUserTrust(aliceSession.myUserId).isVerified()) + assertTrue("Signing Keys should be trusted", aliceSession.cryptoService().crossSigningService().checkUserTrust(aliceSession.myUserId).isVerified()) mTestHelper.signout(aliceSession) } @@ -76,23 +76,23 @@ class XSigningTest : InstrumentedTest { val latch = CountDownLatch(2) - aliceSession.getCrossSigningService().initializeCrossSigning(aliceAuthParams, TestMatrixCallback(latch)) - bobSession.getCrossSigningService().initializeCrossSigning(bobAuthParams, TestMatrixCallback(latch)) + aliceSession.cryptoService().crossSigningService().initializeCrossSigning(aliceAuthParams, TestMatrixCallback(latch)) + bobSession.cryptoService().crossSigningService().initializeCrossSigning(bobAuthParams, TestMatrixCallback(latch)) mTestHelper.await(latch) // Check that alice can see bob keys val downloadLatch = CountDownLatch(1) - aliceSession.downloadKeys(listOf(bobSession.myUserId), true, TestMatrixCallback(downloadLatch)) + aliceSession.cryptoService().downloadKeys(listOf(bobSession.myUserId), true, TestMatrixCallback(downloadLatch)) mTestHelper.await(downloadLatch) - val bobKeysFromAlicePOV = aliceSession.getCrossSigningService().getUserCrossSigningKeys(bobSession.myUserId) + val bobKeysFromAlicePOV = aliceSession.cryptoService().crossSigningService().getUserCrossSigningKeys(bobSession.myUserId) assertNotNull("Alice can see bob Master key", bobKeysFromAlicePOV!!.masterKey()) assertNull("Alice should not see bob User key", bobKeysFromAlicePOV.userKey()) assertNotNull("Alice can see bob SelfSigned key", bobKeysFromAlicePOV.selfSigningKey()) - assertEquals("Bob keys from alice pov should match", bobKeysFromAlicePOV.masterKey()?.unpaddedBase64PublicKey, bobSession.getCrossSigningService().getMyCrossSigningKeys()?.masterKey()?.unpaddedBase64PublicKey) - assertEquals("Bob keys from alice pov should match", bobKeysFromAlicePOV.selfSigningKey()?.unpaddedBase64PublicKey, bobSession.getCrossSigningService().getMyCrossSigningKeys()?.selfSigningKey()?.unpaddedBase64PublicKey) + assertEquals("Bob keys from alice pov should match", bobKeysFromAlicePOV.masterKey()?.unpaddedBase64PublicKey, bobSession.cryptoService().crossSigningService().getMyCrossSigningKeys()?.masterKey()?.unpaddedBase64PublicKey) + assertEquals("Bob keys from alice pov should match", bobKeysFromAlicePOV.selfSigningKey()?.unpaddedBase64PublicKey, bobSession.cryptoService().crossSigningService().getMyCrossSigningKeys()?.selfSigningKey()?.unpaddedBase64PublicKey) assertFalse("Bob keys from alice pov should not be trusted", bobKeysFromAlicePOV.isTrusted()) @@ -118,22 +118,22 @@ class XSigningTest : InstrumentedTest { val latch = CountDownLatch(2) - aliceSession.getCrossSigningService().initializeCrossSigning(aliceAuthParams, TestMatrixCallback(latch)) - bobSession.getCrossSigningService().initializeCrossSigning(bobAuthParams, TestMatrixCallback(latch)) + aliceSession.cryptoService().crossSigningService().initializeCrossSigning(aliceAuthParams, TestMatrixCallback(latch)) + bobSession.cryptoService().crossSigningService().initializeCrossSigning(bobAuthParams, TestMatrixCallback(latch)) mTestHelper.await(latch) // Check that alice can see bob keys val downloadLatch = CountDownLatch(1) val bobUserId = bobSession.myUserId - aliceSession.downloadKeys(listOf(bobUserId), true, TestMatrixCallback(downloadLatch)) + aliceSession.cryptoService().downloadKeys(listOf(bobUserId), true, TestMatrixCallback(downloadLatch)) mTestHelper.await(downloadLatch) - val bobKeysFromAlicePOV = aliceSession.getCrossSigningService().getUserCrossSigningKeys(bobUserId) + val bobKeysFromAlicePOV = aliceSession.cryptoService().crossSigningService().getUserCrossSigningKeys(bobUserId) assertTrue("Bob keys from alice pov should not be trusted", bobKeysFromAlicePOV?.isTrusted() == false) val trustLatch = CountDownLatch(1) - aliceSession.getCrossSigningService().trustUser(bobUserId, object : MatrixCallback { + aliceSession.cryptoService().crossSigningService().trustUser(bobUserId, object : MatrixCallback { override fun onSuccess(data: Unit) { trustLatch.countDown() } @@ -152,7 +152,7 @@ class XSigningTest : InstrumentedTest { // Check that bob first session sees the new login val bobKeysLatch = CountDownLatch(1) - bobSession.downloadKeys(listOf(bobUserId), true, object : MatrixCallback> { + bobSession.cryptoService().downloadKeys(listOf(bobUserId), true, object : MatrixCallback> { override fun onFailure(failure: Throwable) { fail("Failed to get device") } @@ -166,12 +166,12 @@ class XSigningTest : InstrumentedTest { }) mTestHelper.await(bobKeysLatch) - val bobSecondDevicePOVFirstDevice = bobSession.getDeviceInfo(bobUserId, bobSecondDeviceId) + val bobSecondDevicePOVFirstDevice = bobSession.cryptoService().getDeviceInfo(bobUserId, bobSecondDeviceId) assertNotNull("Bob Second device should be known and persisted from first", bobSecondDevicePOVFirstDevice) // Manually mark it as trusted from first session val bobSignLatch = CountDownLatch(1) - bobSession.getCrossSigningService().signDevice(bobSecondDeviceId!!, object : MatrixCallback { + bobSession.cryptoService().crossSigningService().signDevice(bobSecondDeviceId!!, object : MatrixCallback { override fun onSuccess(data: Unit) { bobSignLatch.countDown() } @@ -184,7 +184,7 @@ class XSigningTest : InstrumentedTest { // Now alice should cross trust bob's second device val aliceKeysLatch = CountDownLatch(1) - aliceSession.downloadKeys(listOf(bobUserId), true, object : MatrixCallback> { + aliceSession.cryptoService().downloadKeys(listOf(bobUserId), true, object : MatrixCallback> { override fun onFailure(failure: Throwable) { fail("Failed to get device") } @@ -199,7 +199,7 @@ class XSigningTest : InstrumentedTest { }) mTestHelper.await(aliceKeysLatch) - val result = aliceSession.getCrossSigningService().checkDeviceTrust(bobUserId, bobSecondDeviceId, null) + val result = aliceSession.cryptoService().crossSigningService().checkDeviceTrust(bobUserId, bobSecondDeviceId, null) assertTrue("Bob second device should be trusted from alice POV", result.isCrossSignedVerified()) mTestHelper.signout(aliceSession) diff --git a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/keysbackup/KeysBackupTest.kt b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/keysbackup/KeysBackupTest.kt index 312ad03a06..66ce44ad4f 100644 --- a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/keysbackup/KeysBackupTest.kt +++ b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/keysbackup/KeysBackupTest.kt @@ -77,21 +77,21 @@ class KeysBackupTest : InstrumentedTest { val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() // From doE2ETestWithAliceAndBobInARoomWithEncryptedMessages, we should have no backed up keys - val cryptoStore = (cryptoTestData.firstSession.getKeysBackupService() as KeysBackup).store + val cryptoStore = (cryptoTestData.firstSession.cryptoService().keysBackupService() as KeysBackup).store val sessions = cryptoStore.inboundGroupSessionsToBackup(100) val sessionsCount = sessions.size assertFalse(sessions.isEmpty()) - assertEquals(sessionsCount, cryptoTestData.firstSession.inboundGroupSessionsCount(false)) - assertEquals(0, cryptoTestData.firstSession.inboundGroupSessionsCount(true)) + assertEquals(sessionsCount, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false)) + assertEquals(0, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true)) // - Check backup keys after having marked one as backed up val session = sessions[0] cryptoStore.markBackupDoneForInboundGroupSessions(Collections.singletonList(session)) - assertEquals(sessionsCount, cryptoTestData.firstSession.inboundGroupSessionsCount(false)) - assertEquals(1, cryptoTestData.firstSession.inboundGroupSessionsCount(true)) + assertEquals(sessionsCount, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false)) + assertEquals(1, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true)) val sessions2 = cryptoStore.inboundGroupSessionsToBackup(100) assertEquals(sessionsCount - 1, sessions2.size) @@ -101,8 +101,8 @@ class KeysBackupTest : InstrumentedTest { val sessions3 = cryptoStore.inboundGroupSessionsToBackup(100) assertEquals(sessionsCount, sessions3.size) - assertEquals(sessionsCount, cryptoTestData.firstSession.inboundGroupSessionsCount(false)) - assertEquals(0, cryptoTestData.firstSession.inboundGroupSessionsCount(true)) + assertEquals(sessionsCount, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false)) + assertEquals(0, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true)) } /** @@ -112,9 +112,9 @@ class KeysBackupTest : InstrumentedTest { fun prepareKeysBackupVersionTest() { val bobSession = mTestHelper.createAccount(TestConstants.USER_BOB, defaultSessionParams) - assertNotNull(bobSession.getKeysBackupService()) + assertNotNull(bobSession.cryptoService().keysBackupService()) - val keysBackup = bobSession.getKeysBackupService() + val keysBackup = bobSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) @@ -154,7 +154,7 @@ class KeysBackupTest : InstrumentedTest { fun createKeysBackupVersionTest() { val bobSession = mTestHelper.createAccount(TestConstants.USER_BOB, defaultSessionParams) - val keysBackup = bobSession.getKeysBackupService() + val keysBackup = bobSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) @@ -209,12 +209,12 @@ class KeysBackupTest : InstrumentedTest { fun backupAfterCreateKeysBackupVersionTest() { val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() val latch = CountDownLatch(1) - assertEquals(2, cryptoTestData.firstSession.inboundGroupSessionsCount(false)) - assertEquals(0, cryptoTestData.firstSession.inboundGroupSessionsCount(true)) + assertEquals(2, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false)) + assertEquals(0, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true)) val stateObserver = StateObserver(keysBackup, latch, 5) @@ -222,8 +222,8 @@ class KeysBackupTest : InstrumentedTest { mTestHelper.await(latch) - val nbOfKeys = cryptoTestData.firstSession.inboundGroupSessionsCount(false) - val backedUpKeys = cryptoTestData.firstSession.inboundGroupSessionsCount(true) + val nbOfKeys = cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false) + val backedUpKeys = cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true) assertEquals(2, nbOfKeys) assertEquals("All keys must have been marked as backed up", nbOfKeys, backedUpKeys) @@ -248,14 +248,14 @@ class KeysBackupTest : InstrumentedTest { fun backupAllGroupSessionsTest() { val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) prepareAndCreateKeysBackupData(keysBackup) // Check that backupAllGroupSessions returns valid data - val nbOfKeys = cryptoTestData.firstSession.inboundGroupSessionsCount(false) + val nbOfKeys = cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false) assertEquals(2, nbOfKeys) @@ -273,7 +273,7 @@ class KeysBackupTest : InstrumentedTest { mTestHelper.await(latch) assertEquals(nbOfKeys, lastBackedUpKeysProgress) - val backedUpKeys = cryptoTestData.firstSession.inboundGroupSessionsCount(true) + val backedUpKeys = cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true) assertEquals("All keys must have been marked as backed up", nbOfKeys, backedUpKeys) @@ -293,7 +293,7 @@ class KeysBackupTest : InstrumentedTest { fun testEncryptAndDecryptKeysBackupData() { val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() as KeysBackup + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() as KeysBackup val stateObserver = StateObserver(keysBackup) @@ -337,7 +337,7 @@ class KeysBackupTest : InstrumentedTest { // - Restore the e2e backup from the homeserver val latch2 = CountDownLatch(1) var importRoomKeysResult: ImportRoomKeysResult? = null - testData.aliceSession2.getKeysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey, null, null, @@ -373,7 +373,7 @@ class KeysBackupTest : InstrumentedTest { val testData = createKeysBackupScenarioWithPassword(null) // - Check the SDK sent key share requests - val cryptoStore2 = (testData.aliceSession2.getKeysBackupService() as KeysBackup).store + val cryptoStore2 = (testData.aliceSession2.cryptoService().keysBackupService() as KeysBackup).store val unsentRequest = cryptoStore2 .getOutgoingRoomKeyRequestByState(setOf(OutgoingRoomKeyRequest.RequestState.UNSENT)) val sentRequest = cryptoStore2 @@ -385,7 +385,7 @@ class KeysBackupTest : InstrumentedTest { // - Restore the e2e backup from the homeserver val latch2 = CountDownLatch(1) var importRoomKeysResult: ImportRoomKeysResult? = null - testData.aliceSession2.getKeysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey, null, null, @@ -429,17 +429,17 @@ class KeysBackupTest : InstrumentedTest { // - And log Alice on a new device val testData = createKeysBackupScenarioWithPassword(null) - val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService()) + val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService()) // - The new device must see the previous backup as not trusted - assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion) - assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled) - assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state) + assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion) + assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) + assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state) // - Trust the backup from the new device val latch = CountDownLatch(1) - testData.aliceSession2.getKeysBackupService().trustKeysBackupVersion( - testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersion( + testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, true, TestMatrixCallback(latch) ) @@ -449,13 +449,13 @@ class KeysBackupTest : InstrumentedTest { waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp) // - Backup must be enabled on the new device, on the same version - assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.getKeysBackupService().keysBackupVersion?.version) - assertTrue(testData.aliceSession2.getKeysBackupService().isEnabled) + assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion?.version) + assertTrue(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) // - Retrieve the last version from the server val latch2 = CountDownLatch(1) var keysVersionResult: KeysVersionResult? = null - testData.aliceSession2.getKeysBackupService().getCurrentVersion( + testData.aliceSession2.cryptoService().keysBackupService().getCurrentVersion( object : TestMatrixCallback(latch2) { override fun onSuccess(data: KeysVersionResult?) { keysVersionResult = data @@ -470,7 +470,7 @@ class KeysBackupTest : InstrumentedTest { val latch3 = CountDownLatch(1) var keysBackupVersionTrust: KeysBackupVersionTrust? = null - testData.aliceSession2.getKeysBackupService().getKeysBackupTrust(keysVersionResult!!, + testData.aliceSession2.cryptoService().keysBackupService().getKeysBackupTrust(keysVersionResult!!, object : TestMatrixCallback(latch3) { override fun onSuccess(data: KeysBackupVersionTrust) { keysBackupVersionTrust = data @@ -503,17 +503,17 @@ class KeysBackupTest : InstrumentedTest { // - And log Alice on a new device val testData = createKeysBackupScenarioWithPassword(null) - val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService()) + val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService()) // - The new device must see the previous backup as not trusted - assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion) - assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled) - assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state) + assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion) + assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) + assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state) // - Trust the backup from the new device with the recovery key val latch = CountDownLatch(1) - testData.aliceSession2.getKeysBackupService().trustKeysBackupVersionWithRecoveryKey( - testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersionWithRecoveryKey( + testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey, TestMatrixCallback(latch) ) @@ -523,13 +523,13 @@ class KeysBackupTest : InstrumentedTest { waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp) // - Backup must be enabled on the new device, on the same version - assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.getKeysBackupService().keysBackupVersion?.version) - assertTrue(testData.aliceSession2.getKeysBackupService().isEnabled) + assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion?.version) + assertTrue(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) // - Retrieve the last version from the server val latch2 = CountDownLatch(1) var keysVersionResult: KeysVersionResult? = null - testData.aliceSession2.getKeysBackupService().getCurrentVersion( + testData.aliceSession2.cryptoService().keysBackupService().getCurrentVersion( object : TestMatrixCallback(latch2) { override fun onSuccess(data: KeysVersionResult?) { keysVersionResult = data @@ -544,7 +544,7 @@ class KeysBackupTest : InstrumentedTest { val latch3 = CountDownLatch(1) var keysBackupVersionTrust: KeysBackupVersionTrust? = null - testData.aliceSession2.getKeysBackupService().getKeysBackupTrust(keysVersionResult!!, + testData.aliceSession2.cryptoService().keysBackupService().getKeysBackupTrust(keysVersionResult!!, object : TestMatrixCallback(latch3) { override fun onSuccess(data: KeysBackupVersionTrust) { keysBackupVersionTrust = data @@ -575,26 +575,26 @@ class KeysBackupTest : InstrumentedTest { // - And log Alice on a new device val testData = createKeysBackupScenarioWithPassword(null) - val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService()) + val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService()) // - The new device must see the previous backup as not trusted - assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion) - assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled) - assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state) + assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion) + assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) + assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state) // - Try to trust the backup from the new device with a wrong recovery key val latch = CountDownLatch(1) - testData.aliceSession2.getKeysBackupService().trustKeysBackupVersionWithRecoveryKey( - testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersionWithRecoveryKey( + testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, "Bad recovery key", TestMatrixCallback(latch, false) ) mTestHelper.await(latch) // - The new device must still see the previous backup as not trusted - assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion) - assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled) - assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state) + assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion) + assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) + assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state) stateObserver.stopAndCheckStates(null) testData.cryptoTestData.close() @@ -618,17 +618,17 @@ class KeysBackupTest : InstrumentedTest { // - And log Alice on a new device val testData = createKeysBackupScenarioWithPassword(password) - val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService()) + val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService()) // - The new device must see the previous backup as not trusted - assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion) - assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled) - assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state) + assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion) + assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) + assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state) // - Trust the backup from the new device with the password val latch = CountDownLatch(1) - testData.aliceSession2.getKeysBackupService().trustKeysBackupVersionWithPassphrase( - testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersionWithPassphrase( + testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, password, TestMatrixCallback(latch) ) @@ -638,13 +638,13 @@ class KeysBackupTest : InstrumentedTest { waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp) // - Backup must be enabled on the new device, on the same version - assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.getKeysBackupService().keysBackupVersion?.version) - assertTrue(testData.aliceSession2.getKeysBackupService().isEnabled) + assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion?.version) + assertTrue(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) // - Retrieve the last version from the server val latch2 = CountDownLatch(1) var keysVersionResult: KeysVersionResult? = null - testData.aliceSession2.getKeysBackupService().getCurrentVersion( + testData.aliceSession2.cryptoService().keysBackupService().getCurrentVersion( object : TestMatrixCallback(latch2) { override fun onSuccess(data: KeysVersionResult?) { keysVersionResult = data @@ -659,7 +659,7 @@ class KeysBackupTest : InstrumentedTest { val latch3 = CountDownLatch(1) var keysBackupVersionTrust: KeysBackupVersionTrust? = null - testData.aliceSession2.getKeysBackupService().getKeysBackupTrust(keysVersionResult!!, + testData.aliceSession2.cryptoService().keysBackupService().getKeysBackupTrust(keysVersionResult!!, object : TestMatrixCallback(latch3) { override fun onSuccess(data: KeysBackupVersionTrust) { keysBackupVersionTrust = data @@ -693,26 +693,26 @@ class KeysBackupTest : InstrumentedTest { // - And log Alice on a new device val testData = createKeysBackupScenarioWithPassword(password) - val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService()) + val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService()) // - The new device must see the previous backup as not trusted - assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion) - assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled) - assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state) + assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion) + assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) + assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state) // - Try to trust the backup from the new device with a wrong password val latch = CountDownLatch(1) - testData.aliceSession2.getKeysBackupService().trustKeysBackupVersionWithPassphrase( - testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersionWithPassphrase( + testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, badPassword, TestMatrixCallback(latch, false) ) mTestHelper.await(latch) // - The new device must still see the previous backup as not trusted - assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion) - assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled) - assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state) + assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion) + assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled) + assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state) stateObserver.stopAndCheckStates(null) testData.cryptoTestData.close() @@ -731,7 +731,7 @@ class KeysBackupTest : InstrumentedTest { // - Try to restore the e2e backup with a wrong recovery key val latch2 = CountDownLatch(1) var importRoomKeysResult: ImportRoomKeysResult? = null - testData.aliceSession2.getKeysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, "EsTc LW2K PGiF wKEA 3As5 g5c4 BXwk qeeJ ZJV8 Q9fu gUMN UE4d", null, null, @@ -768,7 +768,7 @@ class KeysBackupTest : InstrumentedTest { var importRoomKeysResult: ImportRoomKeysResult? = null val steps = ArrayList() - testData.aliceSession2.getKeysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, password, null, null, @@ -828,7 +828,7 @@ class KeysBackupTest : InstrumentedTest { // - Try to restore the e2e backup with a wrong password val latch2 = CountDownLatch(1) var importRoomKeysResult: ImportRoomKeysResult? = null - testData.aliceSession2.getKeysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, wrongPassword, null, null, @@ -863,7 +863,7 @@ class KeysBackupTest : InstrumentedTest { // - Restore the e2e backup with the recovery key. val latch2 = CountDownLatch(1) var importRoomKeysResult: ImportRoomKeysResult? = null - testData.aliceSession2.getKeysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey, null, null, @@ -895,7 +895,7 @@ class KeysBackupTest : InstrumentedTest { // - Try to restore the e2e backup with a password val latch2 = CountDownLatch(1) var importRoomKeysResult: ImportRoomKeysResult? = null - testData.aliceSession2.getKeysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!, + testData.aliceSession2.cryptoService().keysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!, "password", null, null, @@ -924,7 +924,7 @@ class KeysBackupTest : InstrumentedTest { // - Create a backup version val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) @@ -967,7 +967,7 @@ class KeysBackupTest : InstrumentedTest { val signature = keysBackupVersionTrust!!.signatures[0] assertTrue(signature.valid) assertNotNull(signature.device) - assertEquals(cryptoTestData.firstSession.getMyDevice().deviceId, signature.deviceId) + assertEquals(cryptoTestData.firstSession.cryptoService().getMyDevice().deviceId, signature.deviceId) assertEquals(signature.device!!.deviceId, cryptoTestData.firstSession.sessionParams.credentials.deviceId) stateObserver.stopAndCheckStates(null) @@ -986,7 +986,7 @@ class KeysBackupTest : InstrumentedTest { // - Create a backup version val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) @@ -1002,7 +1002,7 @@ class KeysBackupTest : InstrumentedTest { cryptoTestData.close() - val keysBackup2 = aliceSession2.getKeysBackupService() + val keysBackup2 = aliceSession2.cryptoService().keysBackupService() val stateObserver2 = StateObserver(keysBackup2) @@ -1046,7 +1046,7 @@ class KeysBackupTest : InstrumentedTest { // - Create a backup version val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) @@ -1086,7 +1086,7 @@ class KeysBackupTest : InstrumentedTest { mTestHelper.await(latch) // Reset the store backup status for keys - (cryptoTestData.firstSession.getKeysBackupService() as KeysBackup).store.resetBackupMarkers() + (cryptoTestData.firstSession.cryptoService().keysBackupService() as KeysBackup).store.resetBackupMarkers() // - Make alice back up all her keys again val latch2 = CountDownLatch(1) @@ -1121,7 +1121,7 @@ class KeysBackupTest : InstrumentedTest { // - Create a backup version val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) @@ -1147,14 +1147,14 @@ class KeysBackupTest : InstrumentedTest { val aliceSession2 = mTestHelper.logIntoAccount(aliceUserId, defaultSessionParamsWithInitialSync) // - Post a message to have a new megolm session - aliceSession2.setWarnOnUnknownDevices(false) + aliceSession2.cryptoService().setWarnOnUnknownDevices(false) val room2 = aliceSession2.getRoom(cryptoTestData.roomId)!! mTestHelper.sendTextMessage(room2, "New key", 1) // - Try to backup all in aliceSession2, it must fail - val keysBackup2 = aliceSession2.getKeysBackupService() + val keysBackup2 = aliceSession2.cryptoService().keysBackupService() val stateObserver2 = StateObserver(keysBackup2) @@ -1178,7 +1178,7 @@ class KeysBackupTest : InstrumentedTest { assertFalse(keysBackup2.isEnabled) // - Validate the old device from the new one - aliceSession2.setDeviceVerification(DeviceTrustLevel(false, true), aliceSession2.myUserId, oldDeviceId) + aliceSession2.cryptoService().setDeviceVerification(DeviceTrustLevel(false, true), aliceSession2.myUserId, oldDeviceId) // -> Backup should automatically enable on the new device val latch4 = CountDownLatch(1) @@ -1196,14 +1196,14 @@ class KeysBackupTest : InstrumentedTest { mTestHelper.await(latch4) // -> It must use the same backup version - assertEquals(oldKeyBackupVersion, aliceSession2.getKeysBackupService().currentBackupVersion) + assertEquals(oldKeyBackupVersion, aliceSession2.cryptoService().keysBackupService().currentBackupVersion) val latch5 = CountDownLatch(1) - aliceSession2.getKeysBackupService().backupAllGroupSessions(null, TestMatrixCallback(latch5)) + aliceSession2.cryptoService().keysBackupService().backupAllGroupSessions(null, TestMatrixCallback(latch5)) mTestHelper.await(latch5) // -> It must success - assertTrue(aliceSession2.getKeysBackupService().isEnabled) + assertTrue(aliceSession2.cryptoService().keysBackupService().isEnabled) stateObserver.stopAndCheckStates(null) stateObserver2.stopAndCheckStates(null) @@ -1220,7 +1220,7 @@ class KeysBackupTest : InstrumentedTest { // - Create a backup version val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) @@ -1254,17 +1254,17 @@ class KeysBackupTest : InstrumentedTest { */ private fun waitForKeysBackupToBeInState(session: Session, state: KeysBackupState) { // If already in the wanted state, return - if (session.getKeysBackupService().state == state) { + if (session.cryptoService().keysBackupService().state == state) { return } // Else observe state changes val latch = CountDownLatch(1) - session.getKeysBackupService().addListener(object : KeysBackupStateListener { + session.cryptoService().keysBackupService().addListener(object : KeysBackupStateListener { override fun onStateChange(newState: KeysBackupState) { if (newState == state) { - session.getKeysBackupService().removeListener(this) + session.cryptoService().keysBackupService().removeListener(this) latch.countDown() } } @@ -1359,8 +1359,8 @@ class KeysBackupTest : InstrumentedTest { private fun createKeysBackupScenarioWithPassword(password: String?): KeysBackupScenarioData { val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages() - val cryptoStore = (cryptoTestData.firstSession.getKeysBackupService() as KeysBackup).store - val keysBackup = cryptoTestData.firstSession.getKeysBackupService() + val cryptoStore = (cryptoTestData.firstSession.cryptoService().keysBackupService() as KeysBackup).store + val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() val stateObserver = StateObserver(keysBackup) @@ -1394,7 +1394,7 @@ class KeysBackupTest : InstrumentedTest { val aliceSession2 = mTestHelper.logIntoAccount(aliceUserId, defaultSessionParamsWithInitialSync) // Test check: aliceSession2 has no keys at login - assertEquals(0, aliceSession2.inboundGroupSessionsCount(false)) + assertEquals(0, aliceSession2.cryptoService().inboundGroupSessionsCount(false)) // Wait for backup state to be NotTrusted waitForKeysBackupToBeInState(aliceSession2, KeysBackupState.NotTrusted) @@ -1421,11 +1421,11 @@ class KeysBackupTest : InstrumentedTest { assertEquals(total, imported) // - The new device must have the same count of megolm keys - assertEquals(testData.aliceKeys.size, testData.aliceSession2.inboundGroupSessionsCount(false)) + assertEquals(testData.aliceKeys.size, testData.aliceSession2.cryptoService().inboundGroupSessionsCount(false)) // - Alice must have the same keys on both devices for (aliceKey1 in testData.aliceKeys) { - val aliceKey2 = (testData.aliceSession2.getKeysBackupService() as KeysBackup).store + val aliceKey2 = (testData.aliceSession2.cryptoService().keysBackupService() as KeysBackup).store .getInboundGroupSession(aliceKey1.olmInboundGroupSession!!.sessionIdentifier(), aliceKey1.senderKey!!) assertNotNull(aliceKey2) assertKeysEquals(aliceKey1.exportKeys(), aliceKey2!!.exportKeys()) diff --git a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/verification/SASTest.kt b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/verification/SASTest.kt index 79670bb21e..7fad87b82d 100644 --- a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/verification/SASTest.kt +++ b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/verification/SASTest.kt @@ -62,8 +62,8 @@ class SASTest : InstrumentedTest { val aliceSession = cryptoTestData.firstSession val bobSession = cryptoTestData.secondSession - val aliceVerificationService = aliceSession.getVerificationService() - val bobVerificationService = bobSession!!.getVerificationService() + val aliceVerificationService = aliceSession.cryptoService().verificationService() + val bobVerificationService = bobSession!!.cryptoService().verificationService() val bobTxCreatedLatch = CountDownLatch(1) val bobListener = object : VerificationService.Listener { @@ -75,7 +75,7 @@ class SASTest : InstrumentedTest { val txID = aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobSession.myUserId, - bobSession.getMyDevice().deviceId, + bobSession.cryptoService().getMyDevice().deviceId, null) assertNotNull("Alice should have a started transaction", txID) @@ -157,7 +157,7 @@ class SASTest : InstrumentedTest { } } } - bobSession.getVerificationService().addListener(bobListener) + bobSession.cryptoService().verificationService().addListener(bobListener) // TODO bobSession!!.dataHandler.addListener(object : MXEventListener() { // TODO override fun onToDeviceEvent(event: Event?) { @@ -172,7 +172,7 @@ class SASTest : InstrumentedTest { val aliceSession = cryptoTestData.firstSession val aliceUserID = aliceSession.myUserId - val aliceDevice = aliceSession.getMyDevice().deviceId + val aliceDevice = aliceSession.cryptoService().getMyDevice().deviceId val aliceListener = object : VerificationService.Listener { override fun transactionUpdated(tx: VerificationTransaction) { @@ -181,7 +181,7 @@ class SASTest : InstrumentedTest { } } } - aliceSession.getVerificationService().addListener(aliceListener) + aliceSession.cryptoService().verificationService().addListener(aliceListener) fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, protocols = protocols) @@ -218,7 +218,7 @@ class SASTest : InstrumentedTest { val aliceSession = cryptoTestData.firstSession val aliceUserID = aliceSession.myUserId - val aliceDevice = aliceSession.getMyDevice().deviceId + val aliceDevice = aliceSession.cryptoService().getMyDevice().deviceId fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, mac = mac) @@ -256,7 +256,7 @@ class SASTest : InstrumentedTest { val aliceSession = cryptoTestData.firstSession val aliceUserID = aliceSession.myUserId - val aliceDevice = aliceSession.getMyDevice().deviceId + val aliceDevice = aliceSession.cryptoService().getMyDevice().deviceId fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, codes = codes) @@ -277,7 +277,7 @@ class SASTest : InstrumentedTest { mac: List = SASDefaultVerificationTransaction.KNOWN_MACS, codes: List = SASDefaultVerificationTransaction.KNOWN_SHORT_CODES) { val startMessage = KeyVerificationStart( - fromDevice = bobSession.getMyDevice().deviceId, + fromDevice = bobSession.cryptoService().getMyDevice().deviceId, method = VerificationMethod.SAS.toValue(), transactionID = tid, keyAgreementProtocols = protocols, @@ -307,7 +307,7 @@ class SASTest : InstrumentedTest { val aliceSession = cryptoTestData.firstSession val bobSession = cryptoTestData.secondSession - val aliceVerificationService = aliceSession.getVerificationService() + val aliceVerificationService = aliceSession.cryptoService().verificationService() val aliceCreatedLatch = CountDownLatch(2) val aliceCancelledLatch = CountDownLatch(2) @@ -327,7 +327,7 @@ class SASTest : InstrumentedTest { aliceVerificationService.addListener(aliceListener) val bobUserId = bobSession!!.myUserId - val bobDeviceId = bobSession.getMyDevice().deviceId + val bobDeviceId = bobSession.cryptoService().getMyDevice().deviceId aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null) aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null) @@ -347,8 +347,8 @@ class SASTest : InstrumentedTest { val aliceSession = cryptoTestData.firstSession val bobSession = cryptoTestData.secondSession - val aliceVerificationService = aliceSession.getVerificationService() - val bobVerificationService = bobSession!!.getVerificationService() + val aliceVerificationService = aliceSession.cryptoService().verificationService() + val bobVerificationService = bobSession!!.cryptoService().verificationService() var accepted: KeyVerificationAccept? = null var startReq: KeyVerificationStart? = null @@ -377,7 +377,7 @@ class SASTest : InstrumentedTest { bobVerificationService.addListener(bobListener) val bobUserId = bobSession.myUserId - val bobDeviceId = bobSession.getMyDevice().deviceId + val bobDeviceId = bobSession.cryptoService().getMyDevice().deviceId aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null) mTestHelper.await(aliceAcceptedLatch) @@ -403,8 +403,8 @@ class SASTest : InstrumentedTest { val aliceSession = cryptoTestData.firstSession val bobSession = cryptoTestData.secondSession - val aliceVerificationService = aliceSession.getVerificationService() - val bobVerificationService = bobSession!!.getVerificationService() + val aliceVerificationService = aliceSession.cryptoService().verificationService() + val bobVerificationService = bobSession!!.cryptoService().verificationService() val aliceSASLatch = CountDownLatch(1) val aliceListener = object : VerificationService.Listener { @@ -438,7 +438,7 @@ class SASTest : InstrumentedTest { bobVerificationService.addListener(bobListener) val bobUserId = bobSession.myUserId - val bobDeviceId = bobSession.getMyDevice().deviceId + val bobDeviceId = bobSession.cryptoService().getMyDevice().deviceId val verificationSAS = aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null) mTestHelper.await(aliceSASLatch) mTestHelper.await(bobSASLatch) @@ -459,8 +459,8 @@ class SASTest : InstrumentedTest { val aliceSession = cryptoTestData.firstSession val bobSession = cryptoTestData.secondSession - val aliceVerificationService = aliceSession.getVerificationService() - val bobVerificationService = bobSession!!.getVerificationService() + val aliceVerificationService = aliceSession.cryptoService().verificationService() + val bobVerificationService = bobSession!!.cryptoService().verificationService() val aliceSASLatch = CountDownLatch(1) val aliceListener = object : VerificationService.Listener { @@ -500,14 +500,14 @@ class SASTest : InstrumentedTest { bobVerificationService.addListener(bobListener) val bobUserId = bobSession.myUserId - val bobDeviceId = bobSession.getMyDevice().deviceId + val bobDeviceId = bobSession.cryptoService().getMyDevice().deviceId aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null) mTestHelper.await(aliceSASLatch) mTestHelper.await(bobSASLatch) // Assert that devices are verified - val bobDeviceInfoFromAlicePOV: CryptoDeviceInfo? = aliceSession.getDeviceInfo(bobUserId, bobDeviceId) - val aliceDeviceInfoFromBobPOV: CryptoDeviceInfo? = bobSession.getDeviceInfo(aliceSession.myUserId, aliceSession.getMyDevice().deviceId) + val bobDeviceInfoFromAlicePOV: CryptoDeviceInfo? = aliceSession.cryptoService().getDeviceInfo(bobUserId, bobDeviceId) + val aliceDeviceInfoFromBobPOV: CryptoDeviceInfo? = bobSession.cryptoService().getDeviceInfo(aliceSession.myUserId, aliceSession.cryptoService().getMyDevice().deviceId) // latch wait a bit again Thread.sleep(1000) diff --git a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/verification/qrcode/VerificationTest.kt b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/verification/qrcode/VerificationTest.kt index 61ea0f35b4..d62aef077e 100644 --- a/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/verification/qrcode/VerificationTest.kt +++ b/matrix-sdk-android/src/androidTest/java/im/vector/matrix/android/internal/crypto/verification/qrcode/VerificationTest.kt @@ -156,7 +156,7 @@ class VerificationTest : InstrumentedTest { val bobSession = cryptoTestData.secondSession!! mTestHelper.doSync { callback -> - aliceSession.getCrossSigningService() + aliceSession.cryptoService().crossSigningService() .initializeCrossSigning(UserPasswordAuth( user = aliceSession.myUserId, password = TestConstants.PASSWORD @@ -164,15 +164,15 @@ class VerificationTest : InstrumentedTest { } mTestHelper.doSync { callback -> - bobSession.getCrossSigningService() + bobSession.cryptoService().crossSigningService() .initializeCrossSigning(UserPasswordAuth( user = bobSession.myUserId, password = TestConstants.PASSWORD ), callback) } - val aliceVerificationService = aliceSession.getVerificationService() - val bobVerificationService = bobSession.getVerificationService() + val aliceVerificationService = aliceSession.cryptoService().verificationService() + val bobVerificationService = bobSession.cryptoService().verificationService() var aliceReadyPendingVerificationRequest: PendingVerificationRequest? = null var bobReadyPendingVerificationRequest: PendingVerificationRequest? = null