Make test compile
This commit is contained in:
parent
fd0dceb597
commit
91cbcebf73
@ -230,9 +230,9 @@ class CryptoTestHelper(val mTestHelper: CommonTestHelper) {
|
|||||||
val aliceRoomId = cryptoTestData.roomId
|
val aliceRoomId = cryptoTestData.roomId
|
||||||
val bobSession = cryptoTestData.secondSession!!
|
val bobSession = cryptoTestData.secondSession!!
|
||||||
|
|
||||||
bobSession.setWarnOnUnknownDevices(false)
|
bobSession.cryptoService().setWarnOnUnknownDevices(false)
|
||||||
|
|
||||||
aliceSession.setWarnOnUnknownDevices(false)
|
aliceSession.cryptoService().setWarnOnUnknownDevices(false)
|
||||||
|
|
||||||
val roomFromBobPOV = bobSession.getRoom(aliceRoomId)!!
|
val roomFromBobPOV = bobSession.getRoom(aliceRoomId)!!
|
||||||
val roomFromAlicePOV = aliceSession.getRoom(aliceRoomId)!!
|
val roomFromAlicePOV = aliceSession.getRoom(aliceRoomId)!!
|
||||||
|
@ -35,7 +35,7 @@ class XSigningTest : InstrumentedTest {
|
|||||||
val aliceSession = mTestHelper.createAccount(TestConstants.USER_ALICE, SessionTestParams(true))
|
val aliceSession = mTestHelper.createAccount(TestConstants.USER_ALICE, SessionTestParams(true))
|
||||||
|
|
||||||
val aliceLatch = CountDownLatch(1)
|
val aliceLatch = CountDownLatch(1)
|
||||||
aliceSession.getCrossSigningService()
|
aliceSession.cryptoService().crossSigningService()
|
||||||
.initializeCrossSigning(UserPasswordAuth(
|
.initializeCrossSigning(UserPasswordAuth(
|
||||||
user = aliceSession.myUserId,
|
user = aliceSession.myUserId,
|
||||||
password = TestConstants.PASSWORD
|
password = TestConstants.PASSWORD
|
||||||
@ -43,7 +43,7 @@ class XSigningTest : InstrumentedTest {
|
|||||||
|
|
||||||
mTestHelper.await(aliceLatch)
|
mTestHelper.await(aliceLatch)
|
||||||
|
|
||||||
val myCrossSigningKeys = aliceSession.getCrossSigningService().getMyCrossSigningKeys()
|
val myCrossSigningKeys = aliceSession.cryptoService().crossSigningService().getMyCrossSigningKeys()
|
||||||
val masterPubKey = myCrossSigningKeys?.masterKey()
|
val masterPubKey = myCrossSigningKeys?.masterKey()
|
||||||
assertNotNull("Master key should be stored", masterPubKey?.unpaddedBase64PublicKey)
|
assertNotNull("Master key should be stored", masterPubKey?.unpaddedBase64PublicKey)
|
||||||
val selfSigningKey = myCrossSigningKeys?.selfSigningKey()
|
val selfSigningKey = myCrossSigningKeys?.selfSigningKey()
|
||||||
@ -53,7 +53,7 @@ class XSigningTest : InstrumentedTest {
|
|||||||
|
|
||||||
assertTrue("Signing Keys should be trusted", myCrossSigningKeys?.isTrusted() == true)
|
assertTrue("Signing Keys should be trusted", myCrossSigningKeys?.isTrusted() == true)
|
||||||
|
|
||||||
assertTrue("Signing Keys should be trusted", aliceSession.getCrossSigningService().checkUserTrust(aliceSession.myUserId).isVerified())
|
assertTrue("Signing Keys should be trusted", aliceSession.cryptoService().crossSigningService().checkUserTrust(aliceSession.myUserId).isVerified())
|
||||||
|
|
||||||
mTestHelper.signout(aliceSession)
|
mTestHelper.signout(aliceSession)
|
||||||
}
|
}
|
||||||
@ -76,23 +76,23 @@ class XSigningTest : InstrumentedTest {
|
|||||||
|
|
||||||
val latch = CountDownLatch(2)
|
val latch = CountDownLatch(2)
|
||||||
|
|
||||||
aliceSession.getCrossSigningService().initializeCrossSigning(aliceAuthParams, TestMatrixCallback(latch))
|
aliceSession.cryptoService().crossSigningService().initializeCrossSigning(aliceAuthParams, TestMatrixCallback(latch))
|
||||||
bobSession.getCrossSigningService().initializeCrossSigning(bobAuthParams, TestMatrixCallback(latch))
|
bobSession.cryptoService().crossSigningService().initializeCrossSigning(bobAuthParams, TestMatrixCallback(latch))
|
||||||
|
|
||||||
mTestHelper.await(latch)
|
mTestHelper.await(latch)
|
||||||
|
|
||||||
// Check that alice can see bob keys
|
// Check that alice can see bob keys
|
||||||
val downloadLatch = CountDownLatch(1)
|
val downloadLatch = CountDownLatch(1)
|
||||||
aliceSession.downloadKeys(listOf(bobSession.myUserId), true, TestMatrixCallback(downloadLatch))
|
aliceSession.cryptoService().downloadKeys(listOf(bobSession.myUserId), true, TestMatrixCallback(downloadLatch))
|
||||||
mTestHelper.await(downloadLatch)
|
mTestHelper.await(downloadLatch)
|
||||||
|
|
||||||
val bobKeysFromAlicePOV = aliceSession.getCrossSigningService().getUserCrossSigningKeys(bobSession.myUserId)
|
val bobKeysFromAlicePOV = aliceSession.cryptoService().crossSigningService().getUserCrossSigningKeys(bobSession.myUserId)
|
||||||
assertNotNull("Alice can see bob Master key", bobKeysFromAlicePOV!!.masterKey())
|
assertNotNull("Alice can see bob Master key", bobKeysFromAlicePOV!!.masterKey())
|
||||||
assertNull("Alice should not see bob User key", bobKeysFromAlicePOV.userKey())
|
assertNull("Alice should not see bob User key", bobKeysFromAlicePOV.userKey())
|
||||||
assertNotNull("Alice can see bob SelfSigned key", bobKeysFromAlicePOV.selfSigningKey())
|
assertNotNull("Alice can see bob SelfSigned key", bobKeysFromAlicePOV.selfSigningKey())
|
||||||
|
|
||||||
assertEquals("Bob keys from alice pov should match", bobKeysFromAlicePOV.masterKey()?.unpaddedBase64PublicKey, bobSession.getCrossSigningService().getMyCrossSigningKeys()?.masterKey()?.unpaddedBase64PublicKey)
|
assertEquals("Bob keys from alice pov should match", bobKeysFromAlicePOV.masterKey()?.unpaddedBase64PublicKey, bobSession.cryptoService().crossSigningService().getMyCrossSigningKeys()?.masterKey()?.unpaddedBase64PublicKey)
|
||||||
assertEquals("Bob keys from alice pov should match", bobKeysFromAlicePOV.selfSigningKey()?.unpaddedBase64PublicKey, bobSession.getCrossSigningService().getMyCrossSigningKeys()?.selfSigningKey()?.unpaddedBase64PublicKey)
|
assertEquals("Bob keys from alice pov should match", bobKeysFromAlicePOV.selfSigningKey()?.unpaddedBase64PublicKey, bobSession.cryptoService().crossSigningService().getMyCrossSigningKeys()?.selfSigningKey()?.unpaddedBase64PublicKey)
|
||||||
|
|
||||||
assertFalse("Bob keys from alice pov should not be trusted", bobKeysFromAlicePOV.isTrusted())
|
assertFalse("Bob keys from alice pov should not be trusted", bobKeysFromAlicePOV.isTrusted())
|
||||||
|
|
||||||
@ -118,22 +118,22 @@ class XSigningTest : InstrumentedTest {
|
|||||||
|
|
||||||
val latch = CountDownLatch(2)
|
val latch = CountDownLatch(2)
|
||||||
|
|
||||||
aliceSession.getCrossSigningService().initializeCrossSigning(aliceAuthParams, TestMatrixCallback(latch))
|
aliceSession.cryptoService().crossSigningService().initializeCrossSigning(aliceAuthParams, TestMatrixCallback(latch))
|
||||||
bobSession.getCrossSigningService().initializeCrossSigning(bobAuthParams, TestMatrixCallback(latch))
|
bobSession.cryptoService().crossSigningService().initializeCrossSigning(bobAuthParams, TestMatrixCallback(latch))
|
||||||
|
|
||||||
mTestHelper.await(latch)
|
mTestHelper.await(latch)
|
||||||
|
|
||||||
// Check that alice can see bob keys
|
// Check that alice can see bob keys
|
||||||
val downloadLatch = CountDownLatch(1)
|
val downloadLatch = CountDownLatch(1)
|
||||||
val bobUserId = bobSession.myUserId
|
val bobUserId = bobSession.myUserId
|
||||||
aliceSession.downloadKeys(listOf(bobUserId), true, TestMatrixCallback(downloadLatch))
|
aliceSession.cryptoService().downloadKeys(listOf(bobUserId), true, TestMatrixCallback(downloadLatch))
|
||||||
mTestHelper.await(downloadLatch)
|
mTestHelper.await(downloadLatch)
|
||||||
|
|
||||||
val bobKeysFromAlicePOV = aliceSession.getCrossSigningService().getUserCrossSigningKeys(bobUserId)
|
val bobKeysFromAlicePOV = aliceSession.cryptoService().crossSigningService().getUserCrossSigningKeys(bobUserId)
|
||||||
assertTrue("Bob keys from alice pov should not be trusted", bobKeysFromAlicePOV?.isTrusted() == false)
|
assertTrue("Bob keys from alice pov should not be trusted", bobKeysFromAlicePOV?.isTrusted() == false)
|
||||||
|
|
||||||
val trustLatch = CountDownLatch(1)
|
val trustLatch = CountDownLatch(1)
|
||||||
aliceSession.getCrossSigningService().trustUser(bobUserId, object : MatrixCallback<Unit> {
|
aliceSession.cryptoService().crossSigningService().trustUser(bobUserId, object : MatrixCallback<Unit> {
|
||||||
override fun onSuccess(data: Unit) {
|
override fun onSuccess(data: Unit) {
|
||||||
trustLatch.countDown()
|
trustLatch.countDown()
|
||||||
}
|
}
|
||||||
@ -152,7 +152,7 @@ class XSigningTest : InstrumentedTest {
|
|||||||
|
|
||||||
// Check that bob first session sees the new login
|
// Check that bob first session sees the new login
|
||||||
val bobKeysLatch = CountDownLatch(1)
|
val bobKeysLatch = CountDownLatch(1)
|
||||||
bobSession.downloadKeys(listOf(bobUserId), true, object : MatrixCallback<MXUsersDevicesMap<CryptoDeviceInfo>> {
|
bobSession.cryptoService().downloadKeys(listOf(bobUserId), true, object : MatrixCallback<MXUsersDevicesMap<CryptoDeviceInfo>> {
|
||||||
override fun onFailure(failure: Throwable) {
|
override fun onFailure(failure: Throwable) {
|
||||||
fail("Failed to get device")
|
fail("Failed to get device")
|
||||||
}
|
}
|
||||||
@ -166,12 +166,12 @@ class XSigningTest : InstrumentedTest {
|
|||||||
})
|
})
|
||||||
mTestHelper.await(bobKeysLatch)
|
mTestHelper.await(bobKeysLatch)
|
||||||
|
|
||||||
val bobSecondDevicePOVFirstDevice = bobSession.getDeviceInfo(bobUserId, bobSecondDeviceId)
|
val bobSecondDevicePOVFirstDevice = bobSession.cryptoService().getDeviceInfo(bobUserId, bobSecondDeviceId)
|
||||||
assertNotNull("Bob Second device should be known and persisted from first", bobSecondDevicePOVFirstDevice)
|
assertNotNull("Bob Second device should be known and persisted from first", bobSecondDevicePOVFirstDevice)
|
||||||
|
|
||||||
// Manually mark it as trusted from first session
|
// Manually mark it as trusted from first session
|
||||||
val bobSignLatch = CountDownLatch(1)
|
val bobSignLatch = CountDownLatch(1)
|
||||||
bobSession.getCrossSigningService().signDevice(bobSecondDeviceId!!, object : MatrixCallback<Unit> {
|
bobSession.cryptoService().crossSigningService().signDevice(bobSecondDeviceId!!, object : MatrixCallback<Unit> {
|
||||||
override fun onSuccess(data: Unit) {
|
override fun onSuccess(data: Unit) {
|
||||||
bobSignLatch.countDown()
|
bobSignLatch.countDown()
|
||||||
}
|
}
|
||||||
@ -184,7 +184,7 @@ class XSigningTest : InstrumentedTest {
|
|||||||
|
|
||||||
// Now alice should cross trust bob's second device
|
// Now alice should cross trust bob's second device
|
||||||
val aliceKeysLatch = CountDownLatch(1)
|
val aliceKeysLatch = CountDownLatch(1)
|
||||||
aliceSession.downloadKeys(listOf(bobUserId), true, object : MatrixCallback<MXUsersDevicesMap<CryptoDeviceInfo>> {
|
aliceSession.cryptoService().downloadKeys(listOf(bobUserId), true, object : MatrixCallback<MXUsersDevicesMap<CryptoDeviceInfo>> {
|
||||||
override fun onFailure(failure: Throwable) {
|
override fun onFailure(failure: Throwable) {
|
||||||
fail("Failed to get device")
|
fail("Failed to get device")
|
||||||
}
|
}
|
||||||
@ -199,7 +199,7 @@ class XSigningTest : InstrumentedTest {
|
|||||||
})
|
})
|
||||||
mTestHelper.await(aliceKeysLatch)
|
mTestHelper.await(aliceKeysLatch)
|
||||||
|
|
||||||
val result = aliceSession.getCrossSigningService().checkDeviceTrust(bobUserId, bobSecondDeviceId, null)
|
val result = aliceSession.cryptoService().crossSigningService().checkDeviceTrust(bobUserId, bobSecondDeviceId, null)
|
||||||
assertTrue("Bob second device should be trusted from alice POV", result.isCrossSignedVerified())
|
assertTrue("Bob second device should be trusted from alice POV", result.isCrossSignedVerified())
|
||||||
|
|
||||||
mTestHelper.signout(aliceSession)
|
mTestHelper.signout(aliceSession)
|
||||||
|
@ -77,21 +77,21 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
// From doE2ETestWithAliceAndBobInARoomWithEncryptedMessages, we should have no backed up keys
|
// From doE2ETestWithAliceAndBobInARoomWithEncryptedMessages, we should have no backed up keys
|
||||||
val cryptoStore = (cryptoTestData.firstSession.getKeysBackupService() as KeysBackup).store
|
val cryptoStore = (cryptoTestData.firstSession.cryptoService().keysBackupService() as KeysBackup).store
|
||||||
val sessions = cryptoStore.inboundGroupSessionsToBackup(100)
|
val sessions = cryptoStore.inboundGroupSessionsToBackup(100)
|
||||||
val sessionsCount = sessions.size
|
val sessionsCount = sessions.size
|
||||||
|
|
||||||
assertFalse(sessions.isEmpty())
|
assertFalse(sessions.isEmpty())
|
||||||
assertEquals(sessionsCount, cryptoTestData.firstSession.inboundGroupSessionsCount(false))
|
assertEquals(sessionsCount, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false))
|
||||||
assertEquals(0, cryptoTestData.firstSession.inboundGroupSessionsCount(true))
|
assertEquals(0, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true))
|
||||||
|
|
||||||
// - Check backup keys after having marked one as backed up
|
// - Check backup keys after having marked one as backed up
|
||||||
val session = sessions[0]
|
val session = sessions[0]
|
||||||
|
|
||||||
cryptoStore.markBackupDoneForInboundGroupSessions(Collections.singletonList(session))
|
cryptoStore.markBackupDoneForInboundGroupSessions(Collections.singletonList(session))
|
||||||
|
|
||||||
assertEquals(sessionsCount, cryptoTestData.firstSession.inboundGroupSessionsCount(false))
|
assertEquals(sessionsCount, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false))
|
||||||
assertEquals(1, cryptoTestData.firstSession.inboundGroupSessionsCount(true))
|
assertEquals(1, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true))
|
||||||
|
|
||||||
val sessions2 = cryptoStore.inboundGroupSessionsToBackup(100)
|
val sessions2 = cryptoStore.inboundGroupSessionsToBackup(100)
|
||||||
assertEquals(sessionsCount - 1, sessions2.size)
|
assertEquals(sessionsCount - 1, sessions2.size)
|
||||||
@ -101,8 +101,8 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
|
|
||||||
val sessions3 = cryptoStore.inboundGroupSessionsToBackup(100)
|
val sessions3 = cryptoStore.inboundGroupSessionsToBackup(100)
|
||||||
assertEquals(sessionsCount, sessions3.size)
|
assertEquals(sessionsCount, sessions3.size)
|
||||||
assertEquals(sessionsCount, cryptoTestData.firstSession.inboundGroupSessionsCount(false))
|
assertEquals(sessionsCount, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false))
|
||||||
assertEquals(0, cryptoTestData.firstSession.inboundGroupSessionsCount(true))
|
assertEquals(0, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true))
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -112,9 +112,9 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
fun prepareKeysBackupVersionTest() {
|
fun prepareKeysBackupVersionTest() {
|
||||||
val bobSession = mTestHelper.createAccount(TestConstants.USER_BOB, defaultSessionParams)
|
val bobSession = mTestHelper.createAccount(TestConstants.USER_BOB, defaultSessionParams)
|
||||||
|
|
||||||
assertNotNull(bobSession.getKeysBackupService())
|
assertNotNull(bobSession.cryptoService().keysBackupService())
|
||||||
|
|
||||||
val keysBackup = bobSession.getKeysBackupService()
|
val keysBackup = bobSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -154,7 +154,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
fun createKeysBackupVersionTest() {
|
fun createKeysBackupVersionTest() {
|
||||||
val bobSession = mTestHelper.createAccount(TestConstants.USER_BOB, defaultSessionParams)
|
val bobSession = mTestHelper.createAccount(TestConstants.USER_BOB, defaultSessionParams)
|
||||||
|
|
||||||
val keysBackup = bobSession.getKeysBackupService()
|
val keysBackup = bobSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -209,12 +209,12 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
fun backupAfterCreateKeysBackupVersionTest() {
|
fun backupAfterCreateKeysBackupVersionTest() {
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService()
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val latch = CountDownLatch(1)
|
val latch = CountDownLatch(1)
|
||||||
|
|
||||||
assertEquals(2, cryptoTestData.firstSession.inboundGroupSessionsCount(false))
|
assertEquals(2, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false))
|
||||||
assertEquals(0, cryptoTestData.firstSession.inboundGroupSessionsCount(true))
|
assertEquals(0, cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true))
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup, latch, 5)
|
val stateObserver = StateObserver(keysBackup, latch, 5)
|
||||||
|
|
||||||
@ -222,8 +222,8 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
|
|
||||||
mTestHelper.await(latch)
|
mTestHelper.await(latch)
|
||||||
|
|
||||||
val nbOfKeys = cryptoTestData.firstSession.inboundGroupSessionsCount(false)
|
val nbOfKeys = cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false)
|
||||||
val backedUpKeys = cryptoTestData.firstSession.inboundGroupSessionsCount(true)
|
val backedUpKeys = cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true)
|
||||||
|
|
||||||
assertEquals(2, nbOfKeys)
|
assertEquals(2, nbOfKeys)
|
||||||
assertEquals("All keys must have been marked as backed up", nbOfKeys, backedUpKeys)
|
assertEquals("All keys must have been marked as backed up", nbOfKeys, backedUpKeys)
|
||||||
@ -248,14 +248,14 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
fun backupAllGroupSessionsTest() {
|
fun backupAllGroupSessionsTest() {
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService()
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
prepareAndCreateKeysBackupData(keysBackup)
|
prepareAndCreateKeysBackupData(keysBackup)
|
||||||
|
|
||||||
// Check that backupAllGroupSessions returns valid data
|
// Check that backupAllGroupSessions returns valid data
|
||||||
val nbOfKeys = cryptoTestData.firstSession.inboundGroupSessionsCount(false)
|
val nbOfKeys = cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(false)
|
||||||
|
|
||||||
assertEquals(2, nbOfKeys)
|
assertEquals(2, nbOfKeys)
|
||||||
|
|
||||||
@ -273,7 +273,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
mTestHelper.await(latch)
|
mTestHelper.await(latch)
|
||||||
assertEquals(nbOfKeys, lastBackedUpKeysProgress)
|
assertEquals(nbOfKeys, lastBackedUpKeysProgress)
|
||||||
|
|
||||||
val backedUpKeys = cryptoTestData.firstSession.inboundGroupSessionsCount(true)
|
val backedUpKeys = cryptoTestData.firstSession.cryptoService().inboundGroupSessionsCount(true)
|
||||||
|
|
||||||
assertEquals("All keys must have been marked as backed up", nbOfKeys, backedUpKeys)
|
assertEquals("All keys must have been marked as backed up", nbOfKeys, backedUpKeys)
|
||||||
|
|
||||||
@ -293,7 +293,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
fun testEncryptAndDecryptKeysBackupData() {
|
fun testEncryptAndDecryptKeysBackupData() {
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService() as KeysBackup
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService() as KeysBackup
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -337,7 +337,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Restore the e2e backup from the homeserver
|
// - Restore the e2e backup from the homeserver
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var importRoomKeysResult: ImportRoomKeysResult? = null
|
var importRoomKeysResult: ImportRoomKeysResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey,
|
testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey,
|
||||||
null,
|
null,
|
||||||
null,
|
null,
|
||||||
@ -373,7 +373,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
val testData = createKeysBackupScenarioWithPassword(null)
|
val testData = createKeysBackupScenarioWithPassword(null)
|
||||||
|
|
||||||
// - Check the SDK sent key share requests
|
// - Check the SDK sent key share requests
|
||||||
val cryptoStore2 = (testData.aliceSession2.getKeysBackupService() as KeysBackup).store
|
val cryptoStore2 = (testData.aliceSession2.cryptoService().keysBackupService() as KeysBackup).store
|
||||||
val unsentRequest = cryptoStore2
|
val unsentRequest = cryptoStore2
|
||||||
.getOutgoingRoomKeyRequestByState(setOf(OutgoingRoomKeyRequest.RequestState.UNSENT))
|
.getOutgoingRoomKeyRequestByState(setOf(OutgoingRoomKeyRequest.RequestState.UNSENT))
|
||||||
val sentRequest = cryptoStore2
|
val sentRequest = cryptoStore2
|
||||||
@ -385,7 +385,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Restore the e2e backup from the homeserver
|
// - Restore the e2e backup from the homeserver
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var importRoomKeysResult: ImportRoomKeysResult? = null
|
var importRoomKeysResult: ImportRoomKeysResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey,
|
testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey,
|
||||||
null,
|
null,
|
||||||
null,
|
null,
|
||||||
@ -429,17 +429,17 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - And log Alice on a new device
|
// - And log Alice on a new device
|
||||||
val testData = createKeysBackupScenarioWithPassword(null)
|
val testData = createKeysBackupScenarioWithPassword(null)
|
||||||
|
|
||||||
val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService())
|
val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService())
|
||||||
|
|
||||||
// - The new device must see the previous backup as not trusted
|
// - The new device must see the previous backup as not trusted
|
||||||
assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion)
|
assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion)
|
||||||
assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state)
|
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state)
|
||||||
|
|
||||||
// - Trust the backup from the new device
|
// - Trust the backup from the new device
|
||||||
val latch = CountDownLatch(1)
|
val latch = CountDownLatch(1)
|
||||||
testData.aliceSession2.getKeysBackupService().trustKeysBackupVersion(
|
testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersion(
|
||||||
testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
true,
|
true,
|
||||||
TestMatrixCallback(latch)
|
TestMatrixCallback(latch)
|
||||||
)
|
)
|
||||||
@ -449,13 +449,13 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp)
|
waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp)
|
||||||
|
|
||||||
// - Backup must be enabled on the new device, on the same version
|
// - Backup must be enabled on the new device, on the same version
|
||||||
assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.getKeysBackupService().keysBackupVersion?.version)
|
assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion?.version)
|
||||||
assertTrue(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertTrue(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
|
|
||||||
// - Retrieve the last version from the server
|
// - Retrieve the last version from the server
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var keysVersionResult: KeysVersionResult? = null
|
var keysVersionResult: KeysVersionResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().getCurrentVersion(
|
testData.aliceSession2.cryptoService().keysBackupService().getCurrentVersion(
|
||||||
object : TestMatrixCallback<KeysVersionResult?>(latch2) {
|
object : TestMatrixCallback<KeysVersionResult?>(latch2) {
|
||||||
override fun onSuccess(data: KeysVersionResult?) {
|
override fun onSuccess(data: KeysVersionResult?) {
|
||||||
keysVersionResult = data
|
keysVersionResult = data
|
||||||
@ -470,7 +470,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
|
|
||||||
val latch3 = CountDownLatch(1)
|
val latch3 = CountDownLatch(1)
|
||||||
var keysBackupVersionTrust: KeysBackupVersionTrust? = null
|
var keysBackupVersionTrust: KeysBackupVersionTrust? = null
|
||||||
testData.aliceSession2.getKeysBackupService().getKeysBackupTrust(keysVersionResult!!,
|
testData.aliceSession2.cryptoService().keysBackupService().getKeysBackupTrust(keysVersionResult!!,
|
||||||
object : TestMatrixCallback<KeysBackupVersionTrust>(latch3) {
|
object : TestMatrixCallback<KeysBackupVersionTrust>(latch3) {
|
||||||
override fun onSuccess(data: KeysBackupVersionTrust) {
|
override fun onSuccess(data: KeysBackupVersionTrust) {
|
||||||
keysBackupVersionTrust = data
|
keysBackupVersionTrust = data
|
||||||
@ -503,17 +503,17 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - And log Alice on a new device
|
// - And log Alice on a new device
|
||||||
val testData = createKeysBackupScenarioWithPassword(null)
|
val testData = createKeysBackupScenarioWithPassword(null)
|
||||||
|
|
||||||
val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService())
|
val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService())
|
||||||
|
|
||||||
// - The new device must see the previous backup as not trusted
|
// - The new device must see the previous backup as not trusted
|
||||||
assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion)
|
assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion)
|
||||||
assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state)
|
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state)
|
||||||
|
|
||||||
// - Trust the backup from the new device with the recovery key
|
// - Trust the backup from the new device with the recovery key
|
||||||
val latch = CountDownLatch(1)
|
val latch = CountDownLatch(1)
|
||||||
testData.aliceSession2.getKeysBackupService().trustKeysBackupVersionWithRecoveryKey(
|
testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersionWithRecoveryKey(
|
||||||
testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey,
|
testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey,
|
||||||
TestMatrixCallback(latch)
|
TestMatrixCallback(latch)
|
||||||
)
|
)
|
||||||
@ -523,13 +523,13 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp)
|
waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp)
|
||||||
|
|
||||||
// - Backup must be enabled on the new device, on the same version
|
// - Backup must be enabled on the new device, on the same version
|
||||||
assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.getKeysBackupService().keysBackupVersion?.version)
|
assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion?.version)
|
||||||
assertTrue(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertTrue(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
|
|
||||||
// - Retrieve the last version from the server
|
// - Retrieve the last version from the server
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var keysVersionResult: KeysVersionResult? = null
|
var keysVersionResult: KeysVersionResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().getCurrentVersion(
|
testData.aliceSession2.cryptoService().keysBackupService().getCurrentVersion(
|
||||||
object : TestMatrixCallback<KeysVersionResult?>(latch2) {
|
object : TestMatrixCallback<KeysVersionResult?>(latch2) {
|
||||||
override fun onSuccess(data: KeysVersionResult?) {
|
override fun onSuccess(data: KeysVersionResult?) {
|
||||||
keysVersionResult = data
|
keysVersionResult = data
|
||||||
@ -544,7 +544,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
|
|
||||||
val latch3 = CountDownLatch(1)
|
val latch3 = CountDownLatch(1)
|
||||||
var keysBackupVersionTrust: KeysBackupVersionTrust? = null
|
var keysBackupVersionTrust: KeysBackupVersionTrust? = null
|
||||||
testData.aliceSession2.getKeysBackupService().getKeysBackupTrust(keysVersionResult!!,
|
testData.aliceSession2.cryptoService().keysBackupService().getKeysBackupTrust(keysVersionResult!!,
|
||||||
object : TestMatrixCallback<KeysBackupVersionTrust>(latch3) {
|
object : TestMatrixCallback<KeysBackupVersionTrust>(latch3) {
|
||||||
override fun onSuccess(data: KeysBackupVersionTrust) {
|
override fun onSuccess(data: KeysBackupVersionTrust) {
|
||||||
keysBackupVersionTrust = data
|
keysBackupVersionTrust = data
|
||||||
@ -575,26 +575,26 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - And log Alice on a new device
|
// - And log Alice on a new device
|
||||||
val testData = createKeysBackupScenarioWithPassword(null)
|
val testData = createKeysBackupScenarioWithPassword(null)
|
||||||
|
|
||||||
val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService())
|
val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService())
|
||||||
|
|
||||||
// - The new device must see the previous backup as not trusted
|
// - The new device must see the previous backup as not trusted
|
||||||
assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion)
|
assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion)
|
||||||
assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state)
|
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state)
|
||||||
|
|
||||||
// - Try to trust the backup from the new device with a wrong recovery key
|
// - Try to trust the backup from the new device with a wrong recovery key
|
||||||
val latch = CountDownLatch(1)
|
val latch = CountDownLatch(1)
|
||||||
testData.aliceSession2.getKeysBackupService().trustKeysBackupVersionWithRecoveryKey(
|
testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersionWithRecoveryKey(
|
||||||
testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
"Bad recovery key",
|
"Bad recovery key",
|
||||||
TestMatrixCallback(latch, false)
|
TestMatrixCallback(latch, false)
|
||||||
)
|
)
|
||||||
mTestHelper.await(latch)
|
mTestHelper.await(latch)
|
||||||
|
|
||||||
// - The new device must still see the previous backup as not trusted
|
// - The new device must still see the previous backup as not trusted
|
||||||
assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion)
|
assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion)
|
||||||
assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state)
|
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state)
|
||||||
|
|
||||||
stateObserver.stopAndCheckStates(null)
|
stateObserver.stopAndCheckStates(null)
|
||||||
testData.cryptoTestData.close()
|
testData.cryptoTestData.close()
|
||||||
@ -618,17 +618,17 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - And log Alice on a new device
|
// - And log Alice on a new device
|
||||||
val testData = createKeysBackupScenarioWithPassword(password)
|
val testData = createKeysBackupScenarioWithPassword(password)
|
||||||
|
|
||||||
val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService())
|
val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService())
|
||||||
|
|
||||||
// - The new device must see the previous backup as not trusted
|
// - The new device must see the previous backup as not trusted
|
||||||
assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion)
|
assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion)
|
||||||
assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state)
|
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state)
|
||||||
|
|
||||||
// - Trust the backup from the new device with the password
|
// - Trust the backup from the new device with the password
|
||||||
val latch = CountDownLatch(1)
|
val latch = CountDownLatch(1)
|
||||||
testData.aliceSession2.getKeysBackupService().trustKeysBackupVersionWithPassphrase(
|
testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersionWithPassphrase(
|
||||||
testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
password,
|
password,
|
||||||
TestMatrixCallback(latch)
|
TestMatrixCallback(latch)
|
||||||
)
|
)
|
||||||
@ -638,13 +638,13 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp)
|
waitForKeysBackupToBeInState(testData.aliceSession2, KeysBackupState.ReadyToBackUp)
|
||||||
|
|
||||||
// - Backup must be enabled on the new device, on the same version
|
// - Backup must be enabled on the new device, on the same version
|
||||||
assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.getKeysBackupService().keysBackupVersion?.version)
|
assertEquals(testData.prepareKeysBackupDataResult.version, testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion?.version)
|
||||||
assertTrue(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertTrue(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
|
|
||||||
// - Retrieve the last version from the server
|
// - Retrieve the last version from the server
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var keysVersionResult: KeysVersionResult? = null
|
var keysVersionResult: KeysVersionResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().getCurrentVersion(
|
testData.aliceSession2.cryptoService().keysBackupService().getCurrentVersion(
|
||||||
object : TestMatrixCallback<KeysVersionResult?>(latch2) {
|
object : TestMatrixCallback<KeysVersionResult?>(latch2) {
|
||||||
override fun onSuccess(data: KeysVersionResult?) {
|
override fun onSuccess(data: KeysVersionResult?) {
|
||||||
keysVersionResult = data
|
keysVersionResult = data
|
||||||
@ -659,7 +659,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
|
|
||||||
val latch3 = CountDownLatch(1)
|
val latch3 = CountDownLatch(1)
|
||||||
var keysBackupVersionTrust: KeysBackupVersionTrust? = null
|
var keysBackupVersionTrust: KeysBackupVersionTrust? = null
|
||||||
testData.aliceSession2.getKeysBackupService().getKeysBackupTrust(keysVersionResult!!,
|
testData.aliceSession2.cryptoService().keysBackupService().getKeysBackupTrust(keysVersionResult!!,
|
||||||
object : TestMatrixCallback<KeysBackupVersionTrust>(latch3) {
|
object : TestMatrixCallback<KeysBackupVersionTrust>(latch3) {
|
||||||
override fun onSuccess(data: KeysBackupVersionTrust) {
|
override fun onSuccess(data: KeysBackupVersionTrust) {
|
||||||
keysBackupVersionTrust = data
|
keysBackupVersionTrust = data
|
||||||
@ -693,26 +693,26 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - And log Alice on a new device
|
// - And log Alice on a new device
|
||||||
val testData = createKeysBackupScenarioWithPassword(password)
|
val testData = createKeysBackupScenarioWithPassword(password)
|
||||||
|
|
||||||
val stateObserver = StateObserver(testData.aliceSession2.getKeysBackupService())
|
val stateObserver = StateObserver(testData.aliceSession2.cryptoService().keysBackupService())
|
||||||
|
|
||||||
// - The new device must see the previous backup as not trusted
|
// - The new device must see the previous backup as not trusted
|
||||||
assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion)
|
assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion)
|
||||||
assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state)
|
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state)
|
||||||
|
|
||||||
// - Try to trust the backup from the new device with a wrong password
|
// - Try to trust the backup from the new device with a wrong password
|
||||||
val latch = CountDownLatch(1)
|
val latch = CountDownLatch(1)
|
||||||
testData.aliceSession2.getKeysBackupService().trustKeysBackupVersionWithPassphrase(
|
testData.aliceSession2.cryptoService().keysBackupService().trustKeysBackupVersionWithPassphrase(
|
||||||
testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
badPassword,
|
badPassword,
|
||||||
TestMatrixCallback(latch, false)
|
TestMatrixCallback(latch, false)
|
||||||
)
|
)
|
||||||
mTestHelper.await(latch)
|
mTestHelper.await(latch)
|
||||||
|
|
||||||
// - The new device must still see the previous backup as not trusted
|
// - The new device must still see the previous backup as not trusted
|
||||||
assertNotNull(testData.aliceSession2.getKeysBackupService().keysBackupVersion)
|
assertNotNull(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion)
|
||||||
assertFalse(testData.aliceSession2.getKeysBackupService().isEnabled)
|
assertFalse(testData.aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.getKeysBackupService().state)
|
assertEquals(KeysBackupState.NotTrusted, testData.aliceSession2.cryptoService().keysBackupService().state)
|
||||||
|
|
||||||
stateObserver.stopAndCheckStates(null)
|
stateObserver.stopAndCheckStates(null)
|
||||||
testData.cryptoTestData.close()
|
testData.cryptoTestData.close()
|
||||||
@ -731,7 +731,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Try to restore the e2e backup with a wrong recovery key
|
// - Try to restore the e2e backup with a wrong recovery key
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var importRoomKeysResult: ImportRoomKeysResult? = null
|
var importRoomKeysResult: ImportRoomKeysResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
"EsTc LW2K PGiF wKEA 3As5 g5c4 BXwk qeeJ ZJV8 Q9fu gUMN UE4d",
|
"EsTc LW2K PGiF wKEA 3As5 g5c4 BXwk qeeJ ZJV8 Q9fu gUMN UE4d",
|
||||||
null,
|
null,
|
||||||
null,
|
null,
|
||||||
@ -768,7 +768,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
var importRoomKeysResult: ImportRoomKeysResult? = null
|
var importRoomKeysResult: ImportRoomKeysResult? = null
|
||||||
val steps = ArrayList<StepProgressListener.Step>()
|
val steps = ArrayList<StepProgressListener.Step>()
|
||||||
|
|
||||||
testData.aliceSession2.getKeysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
password,
|
password,
|
||||||
null,
|
null,
|
||||||
null,
|
null,
|
||||||
@ -828,7 +828,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Try to restore the e2e backup with a wrong password
|
// - Try to restore the e2e backup with a wrong password
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var importRoomKeysResult: ImportRoomKeysResult? = null
|
var importRoomKeysResult: ImportRoomKeysResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
wrongPassword,
|
wrongPassword,
|
||||||
null,
|
null,
|
||||||
null,
|
null,
|
||||||
@ -863,7 +863,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Restore the e2e backup with the recovery key.
|
// - Restore the e2e backup with the recovery key.
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var importRoomKeysResult: ImportRoomKeysResult? = null
|
var importRoomKeysResult: ImportRoomKeysResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().restoreKeysWithRecoveryKey(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey,
|
testData.prepareKeysBackupDataResult.megolmBackupCreationInfo.recoveryKey,
|
||||||
null,
|
null,
|
||||||
null,
|
null,
|
||||||
@ -895,7 +895,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Try to restore the e2e backup with a password
|
// - Try to restore the e2e backup with a password
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
var importRoomKeysResult: ImportRoomKeysResult? = null
|
var importRoomKeysResult: ImportRoomKeysResult? = null
|
||||||
testData.aliceSession2.getKeysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.getKeysBackupService().keysBackupVersion!!,
|
testData.aliceSession2.cryptoService().keysBackupService().restoreKeyBackupWithPassword(testData.aliceSession2.cryptoService().keysBackupService().keysBackupVersion!!,
|
||||||
"password",
|
"password",
|
||||||
null,
|
null,
|
||||||
null,
|
null,
|
||||||
@ -924,7 +924,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Create a backup version
|
// - Create a backup version
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService()
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -967,7 +967,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
val signature = keysBackupVersionTrust!!.signatures[0]
|
val signature = keysBackupVersionTrust!!.signatures[0]
|
||||||
assertTrue(signature.valid)
|
assertTrue(signature.valid)
|
||||||
assertNotNull(signature.device)
|
assertNotNull(signature.device)
|
||||||
assertEquals(cryptoTestData.firstSession.getMyDevice().deviceId, signature.deviceId)
|
assertEquals(cryptoTestData.firstSession.cryptoService().getMyDevice().deviceId, signature.deviceId)
|
||||||
assertEquals(signature.device!!.deviceId, cryptoTestData.firstSession.sessionParams.credentials.deviceId)
|
assertEquals(signature.device!!.deviceId, cryptoTestData.firstSession.sessionParams.credentials.deviceId)
|
||||||
|
|
||||||
stateObserver.stopAndCheckStates(null)
|
stateObserver.stopAndCheckStates(null)
|
||||||
@ -986,7 +986,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Create a backup version
|
// - Create a backup version
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService()
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -1002,7 +1002,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
|
|
||||||
cryptoTestData.close()
|
cryptoTestData.close()
|
||||||
|
|
||||||
val keysBackup2 = aliceSession2.getKeysBackupService()
|
val keysBackup2 = aliceSession2.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver2 = StateObserver(keysBackup2)
|
val stateObserver2 = StateObserver(keysBackup2)
|
||||||
|
|
||||||
@ -1046,7 +1046,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Create a backup version
|
// - Create a backup version
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService()
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -1086,7 +1086,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
mTestHelper.await(latch)
|
mTestHelper.await(latch)
|
||||||
|
|
||||||
// Reset the store backup status for keys
|
// Reset the store backup status for keys
|
||||||
(cryptoTestData.firstSession.getKeysBackupService() as KeysBackup).store.resetBackupMarkers()
|
(cryptoTestData.firstSession.cryptoService().keysBackupService() as KeysBackup).store.resetBackupMarkers()
|
||||||
|
|
||||||
// - Make alice back up all her keys again
|
// - Make alice back up all her keys again
|
||||||
val latch2 = CountDownLatch(1)
|
val latch2 = CountDownLatch(1)
|
||||||
@ -1121,7 +1121,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Create a backup version
|
// - Create a backup version
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService()
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -1147,14 +1147,14 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
val aliceSession2 = mTestHelper.logIntoAccount(aliceUserId, defaultSessionParamsWithInitialSync)
|
val aliceSession2 = mTestHelper.logIntoAccount(aliceUserId, defaultSessionParamsWithInitialSync)
|
||||||
|
|
||||||
// - Post a message to have a new megolm session
|
// - Post a message to have a new megolm session
|
||||||
aliceSession2.setWarnOnUnknownDevices(false)
|
aliceSession2.cryptoService().setWarnOnUnknownDevices(false)
|
||||||
|
|
||||||
val room2 = aliceSession2.getRoom(cryptoTestData.roomId)!!
|
val room2 = aliceSession2.getRoom(cryptoTestData.roomId)!!
|
||||||
|
|
||||||
mTestHelper.sendTextMessage(room2, "New key", 1)
|
mTestHelper.sendTextMessage(room2, "New key", 1)
|
||||||
|
|
||||||
// - Try to backup all in aliceSession2, it must fail
|
// - Try to backup all in aliceSession2, it must fail
|
||||||
val keysBackup2 = aliceSession2.getKeysBackupService()
|
val keysBackup2 = aliceSession2.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver2 = StateObserver(keysBackup2)
|
val stateObserver2 = StateObserver(keysBackup2)
|
||||||
|
|
||||||
@ -1178,7 +1178,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
assertFalse(keysBackup2.isEnabled)
|
assertFalse(keysBackup2.isEnabled)
|
||||||
|
|
||||||
// - Validate the old device from the new one
|
// - Validate the old device from the new one
|
||||||
aliceSession2.setDeviceVerification(DeviceTrustLevel(false, true), aliceSession2.myUserId, oldDeviceId)
|
aliceSession2.cryptoService().setDeviceVerification(DeviceTrustLevel(false, true), aliceSession2.myUserId, oldDeviceId)
|
||||||
|
|
||||||
// -> Backup should automatically enable on the new device
|
// -> Backup should automatically enable on the new device
|
||||||
val latch4 = CountDownLatch(1)
|
val latch4 = CountDownLatch(1)
|
||||||
@ -1196,14 +1196,14 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
mTestHelper.await(latch4)
|
mTestHelper.await(latch4)
|
||||||
|
|
||||||
// -> It must use the same backup version
|
// -> It must use the same backup version
|
||||||
assertEquals(oldKeyBackupVersion, aliceSession2.getKeysBackupService().currentBackupVersion)
|
assertEquals(oldKeyBackupVersion, aliceSession2.cryptoService().keysBackupService().currentBackupVersion)
|
||||||
|
|
||||||
val latch5 = CountDownLatch(1)
|
val latch5 = CountDownLatch(1)
|
||||||
aliceSession2.getKeysBackupService().backupAllGroupSessions(null, TestMatrixCallback(latch5))
|
aliceSession2.cryptoService().keysBackupService().backupAllGroupSessions(null, TestMatrixCallback(latch5))
|
||||||
mTestHelper.await(latch5)
|
mTestHelper.await(latch5)
|
||||||
|
|
||||||
// -> It must success
|
// -> It must success
|
||||||
assertTrue(aliceSession2.getKeysBackupService().isEnabled)
|
assertTrue(aliceSession2.cryptoService().keysBackupService().isEnabled)
|
||||||
|
|
||||||
stateObserver.stopAndCheckStates(null)
|
stateObserver.stopAndCheckStates(null)
|
||||||
stateObserver2.stopAndCheckStates(null)
|
stateObserver2.stopAndCheckStates(null)
|
||||||
@ -1220,7 +1220,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
// - Create a backup version
|
// - Create a backup version
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService()
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -1254,17 +1254,17 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
*/
|
*/
|
||||||
private fun waitForKeysBackupToBeInState(session: Session, state: KeysBackupState) {
|
private fun waitForKeysBackupToBeInState(session: Session, state: KeysBackupState) {
|
||||||
// If already in the wanted state, return
|
// If already in the wanted state, return
|
||||||
if (session.getKeysBackupService().state == state) {
|
if (session.cryptoService().keysBackupService().state == state) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Else observe state changes
|
// Else observe state changes
|
||||||
val latch = CountDownLatch(1)
|
val latch = CountDownLatch(1)
|
||||||
|
|
||||||
session.getKeysBackupService().addListener(object : KeysBackupStateListener {
|
session.cryptoService().keysBackupService().addListener(object : KeysBackupStateListener {
|
||||||
override fun onStateChange(newState: KeysBackupState) {
|
override fun onStateChange(newState: KeysBackupState) {
|
||||||
if (newState == state) {
|
if (newState == state) {
|
||||||
session.getKeysBackupService().removeListener(this)
|
session.cryptoService().keysBackupService().removeListener(this)
|
||||||
latch.countDown()
|
latch.countDown()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1359,8 +1359,8 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
private fun createKeysBackupScenarioWithPassword(password: String?): KeysBackupScenarioData {
|
private fun createKeysBackupScenarioWithPassword(password: String?): KeysBackupScenarioData {
|
||||||
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
val cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages()
|
||||||
|
|
||||||
val cryptoStore = (cryptoTestData.firstSession.getKeysBackupService() as KeysBackup).store
|
val cryptoStore = (cryptoTestData.firstSession.cryptoService().keysBackupService() as KeysBackup).store
|
||||||
val keysBackup = cryptoTestData.firstSession.getKeysBackupService()
|
val keysBackup = cryptoTestData.firstSession.cryptoService().keysBackupService()
|
||||||
|
|
||||||
val stateObserver = StateObserver(keysBackup)
|
val stateObserver = StateObserver(keysBackup)
|
||||||
|
|
||||||
@ -1394,7 +1394,7 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
val aliceSession2 = mTestHelper.logIntoAccount(aliceUserId, defaultSessionParamsWithInitialSync)
|
val aliceSession2 = mTestHelper.logIntoAccount(aliceUserId, defaultSessionParamsWithInitialSync)
|
||||||
|
|
||||||
// Test check: aliceSession2 has no keys at login
|
// Test check: aliceSession2 has no keys at login
|
||||||
assertEquals(0, aliceSession2.inboundGroupSessionsCount(false))
|
assertEquals(0, aliceSession2.cryptoService().inboundGroupSessionsCount(false))
|
||||||
|
|
||||||
// Wait for backup state to be NotTrusted
|
// Wait for backup state to be NotTrusted
|
||||||
waitForKeysBackupToBeInState(aliceSession2, KeysBackupState.NotTrusted)
|
waitForKeysBackupToBeInState(aliceSession2, KeysBackupState.NotTrusted)
|
||||||
@ -1421,11 +1421,11 @@ class KeysBackupTest : InstrumentedTest {
|
|||||||
assertEquals(total, imported)
|
assertEquals(total, imported)
|
||||||
|
|
||||||
// - The new device must have the same count of megolm keys
|
// - The new device must have the same count of megolm keys
|
||||||
assertEquals(testData.aliceKeys.size, testData.aliceSession2.inboundGroupSessionsCount(false))
|
assertEquals(testData.aliceKeys.size, testData.aliceSession2.cryptoService().inboundGroupSessionsCount(false))
|
||||||
|
|
||||||
// - Alice must have the same keys on both devices
|
// - Alice must have the same keys on both devices
|
||||||
for (aliceKey1 in testData.aliceKeys) {
|
for (aliceKey1 in testData.aliceKeys) {
|
||||||
val aliceKey2 = (testData.aliceSession2.getKeysBackupService() as KeysBackup).store
|
val aliceKey2 = (testData.aliceSession2.cryptoService().keysBackupService() as KeysBackup).store
|
||||||
.getInboundGroupSession(aliceKey1.olmInboundGroupSession!!.sessionIdentifier(), aliceKey1.senderKey!!)
|
.getInboundGroupSession(aliceKey1.olmInboundGroupSession!!.sessionIdentifier(), aliceKey1.senderKey!!)
|
||||||
assertNotNull(aliceKey2)
|
assertNotNull(aliceKey2)
|
||||||
assertKeysEquals(aliceKey1.exportKeys(), aliceKey2!!.exportKeys())
|
assertKeysEquals(aliceKey1.exportKeys(), aliceKey2!!.exportKeys())
|
||||||
|
@ -62,8 +62,8 @@ class SASTest : InstrumentedTest {
|
|||||||
val aliceSession = cryptoTestData.firstSession
|
val aliceSession = cryptoTestData.firstSession
|
||||||
val bobSession = cryptoTestData.secondSession
|
val bobSession = cryptoTestData.secondSession
|
||||||
|
|
||||||
val aliceVerificationService = aliceSession.getVerificationService()
|
val aliceVerificationService = aliceSession.cryptoService().verificationService()
|
||||||
val bobVerificationService = bobSession!!.getVerificationService()
|
val bobVerificationService = bobSession!!.cryptoService().verificationService()
|
||||||
|
|
||||||
val bobTxCreatedLatch = CountDownLatch(1)
|
val bobTxCreatedLatch = CountDownLatch(1)
|
||||||
val bobListener = object : VerificationService.Listener {
|
val bobListener = object : VerificationService.Listener {
|
||||||
@ -75,7 +75,7 @@ class SASTest : InstrumentedTest {
|
|||||||
|
|
||||||
val txID = aliceVerificationService.beginKeyVerification(VerificationMethod.SAS,
|
val txID = aliceVerificationService.beginKeyVerification(VerificationMethod.SAS,
|
||||||
bobSession.myUserId,
|
bobSession.myUserId,
|
||||||
bobSession.getMyDevice().deviceId,
|
bobSession.cryptoService().getMyDevice().deviceId,
|
||||||
null)
|
null)
|
||||||
assertNotNull("Alice should have a started transaction", txID)
|
assertNotNull("Alice should have a started transaction", txID)
|
||||||
|
|
||||||
@ -157,7 +157,7 @@ class SASTest : InstrumentedTest {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
bobSession.getVerificationService().addListener(bobListener)
|
bobSession.cryptoService().verificationService().addListener(bobListener)
|
||||||
|
|
||||||
// TODO bobSession!!.dataHandler.addListener(object : MXEventListener() {
|
// TODO bobSession!!.dataHandler.addListener(object : MXEventListener() {
|
||||||
// TODO override fun onToDeviceEvent(event: Event?) {
|
// TODO override fun onToDeviceEvent(event: Event?) {
|
||||||
@ -172,7 +172,7 @@ class SASTest : InstrumentedTest {
|
|||||||
|
|
||||||
val aliceSession = cryptoTestData.firstSession
|
val aliceSession = cryptoTestData.firstSession
|
||||||
val aliceUserID = aliceSession.myUserId
|
val aliceUserID = aliceSession.myUserId
|
||||||
val aliceDevice = aliceSession.getMyDevice().deviceId
|
val aliceDevice = aliceSession.cryptoService().getMyDevice().deviceId
|
||||||
|
|
||||||
val aliceListener = object : VerificationService.Listener {
|
val aliceListener = object : VerificationService.Listener {
|
||||||
override fun transactionUpdated(tx: VerificationTransaction) {
|
override fun transactionUpdated(tx: VerificationTransaction) {
|
||||||
@ -181,7 +181,7 @@ class SASTest : InstrumentedTest {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
aliceSession.getVerificationService().addListener(aliceListener)
|
aliceSession.cryptoService().verificationService().addListener(aliceListener)
|
||||||
|
|
||||||
fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, protocols = protocols)
|
fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, protocols = protocols)
|
||||||
|
|
||||||
@ -218,7 +218,7 @@ class SASTest : InstrumentedTest {
|
|||||||
|
|
||||||
val aliceSession = cryptoTestData.firstSession
|
val aliceSession = cryptoTestData.firstSession
|
||||||
val aliceUserID = aliceSession.myUserId
|
val aliceUserID = aliceSession.myUserId
|
||||||
val aliceDevice = aliceSession.getMyDevice().deviceId
|
val aliceDevice = aliceSession.cryptoService().getMyDevice().deviceId
|
||||||
|
|
||||||
fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, mac = mac)
|
fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, mac = mac)
|
||||||
|
|
||||||
@ -256,7 +256,7 @@ class SASTest : InstrumentedTest {
|
|||||||
|
|
||||||
val aliceSession = cryptoTestData.firstSession
|
val aliceSession = cryptoTestData.firstSession
|
||||||
val aliceUserID = aliceSession.myUserId
|
val aliceUserID = aliceSession.myUserId
|
||||||
val aliceDevice = aliceSession.getMyDevice().deviceId
|
val aliceDevice = aliceSession.cryptoService().getMyDevice().deviceId
|
||||||
|
|
||||||
fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, codes = codes)
|
fakeBobStart(bobSession, aliceUserID, aliceDevice, tid, codes = codes)
|
||||||
|
|
||||||
@ -277,7 +277,7 @@ class SASTest : InstrumentedTest {
|
|||||||
mac: List<String> = SASDefaultVerificationTransaction.KNOWN_MACS,
|
mac: List<String> = SASDefaultVerificationTransaction.KNOWN_MACS,
|
||||||
codes: List<String> = SASDefaultVerificationTransaction.KNOWN_SHORT_CODES) {
|
codes: List<String> = SASDefaultVerificationTransaction.KNOWN_SHORT_CODES) {
|
||||||
val startMessage = KeyVerificationStart(
|
val startMessage = KeyVerificationStart(
|
||||||
fromDevice = bobSession.getMyDevice().deviceId,
|
fromDevice = bobSession.cryptoService().getMyDevice().deviceId,
|
||||||
method = VerificationMethod.SAS.toValue(),
|
method = VerificationMethod.SAS.toValue(),
|
||||||
transactionID = tid,
|
transactionID = tid,
|
||||||
keyAgreementProtocols = protocols,
|
keyAgreementProtocols = protocols,
|
||||||
@ -307,7 +307,7 @@ class SASTest : InstrumentedTest {
|
|||||||
val aliceSession = cryptoTestData.firstSession
|
val aliceSession = cryptoTestData.firstSession
|
||||||
val bobSession = cryptoTestData.secondSession
|
val bobSession = cryptoTestData.secondSession
|
||||||
|
|
||||||
val aliceVerificationService = aliceSession.getVerificationService()
|
val aliceVerificationService = aliceSession.cryptoService().verificationService()
|
||||||
|
|
||||||
val aliceCreatedLatch = CountDownLatch(2)
|
val aliceCreatedLatch = CountDownLatch(2)
|
||||||
val aliceCancelledLatch = CountDownLatch(2)
|
val aliceCancelledLatch = CountDownLatch(2)
|
||||||
@ -327,7 +327,7 @@ class SASTest : InstrumentedTest {
|
|||||||
aliceVerificationService.addListener(aliceListener)
|
aliceVerificationService.addListener(aliceListener)
|
||||||
|
|
||||||
val bobUserId = bobSession!!.myUserId
|
val bobUserId = bobSession!!.myUserId
|
||||||
val bobDeviceId = bobSession.getMyDevice().deviceId
|
val bobDeviceId = bobSession.cryptoService().getMyDevice().deviceId
|
||||||
aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
||||||
aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
||||||
|
|
||||||
@ -347,8 +347,8 @@ class SASTest : InstrumentedTest {
|
|||||||
val aliceSession = cryptoTestData.firstSession
|
val aliceSession = cryptoTestData.firstSession
|
||||||
val bobSession = cryptoTestData.secondSession
|
val bobSession = cryptoTestData.secondSession
|
||||||
|
|
||||||
val aliceVerificationService = aliceSession.getVerificationService()
|
val aliceVerificationService = aliceSession.cryptoService().verificationService()
|
||||||
val bobVerificationService = bobSession!!.getVerificationService()
|
val bobVerificationService = bobSession!!.cryptoService().verificationService()
|
||||||
|
|
||||||
var accepted: KeyVerificationAccept? = null
|
var accepted: KeyVerificationAccept? = null
|
||||||
var startReq: KeyVerificationStart? = null
|
var startReq: KeyVerificationStart? = null
|
||||||
@ -377,7 +377,7 @@ class SASTest : InstrumentedTest {
|
|||||||
bobVerificationService.addListener(bobListener)
|
bobVerificationService.addListener(bobListener)
|
||||||
|
|
||||||
val bobUserId = bobSession.myUserId
|
val bobUserId = bobSession.myUserId
|
||||||
val bobDeviceId = bobSession.getMyDevice().deviceId
|
val bobDeviceId = bobSession.cryptoService().getMyDevice().deviceId
|
||||||
aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
||||||
mTestHelper.await(aliceAcceptedLatch)
|
mTestHelper.await(aliceAcceptedLatch)
|
||||||
|
|
||||||
@ -403,8 +403,8 @@ class SASTest : InstrumentedTest {
|
|||||||
val aliceSession = cryptoTestData.firstSession
|
val aliceSession = cryptoTestData.firstSession
|
||||||
val bobSession = cryptoTestData.secondSession
|
val bobSession = cryptoTestData.secondSession
|
||||||
|
|
||||||
val aliceVerificationService = aliceSession.getVerificationService()
|
val aliceVerificationService = aliceSession.cryptoService().verificationService()
|
||||||
val bobVerificationService = bobSession!!.getVerificationService()
|
val bobVerificationService = bobSession!!.cryptoService().verificationService()
|
||||||
|
|
||||||
val aliceSASLatch = CountDownLatch(1)
|
val aliceSASLatch = CountDownLatch(1)
|
||||||
val aliceListener = object : VerificationService.Listener {
|
val aliceListener = object : VerificationService.Listener {
|
||||||
@ -438,7 +438,7 @@ class SASTest : InstrumentedTest {
|
|||||||
bobVerificationService.addListener(bobListener)
|
bobVerificationService.addListener(bobListener)
|
||||||
|
|
||||||
val bobUserId = bobSession.myUserId
|
val bobUserId = bobSession.myUserId
|
||||||
val bobDeviceId = bobSession.getMyDevice().deviceId
|
val bobDeviceId = bobSession.cryptoService().getMyDevice().deviceId
|
||||||
val verificationSAS = aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
val verificationSAS = aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
||||||
mTestHelper.await(aliceSASLatch)
|
mTestHelper.await(aliceSASLatch)
|
||||||
mTestHelper.await(bobSASLatch)
|
mTestHelper.await(bobSASLatch)
|
||||||
@ -459,8 +459,8 @@ class SASTest : InstrumentedTest {
|
|||||||
val aliceSession = cryptoTestData.firstSession
|
val aliceSession = cryptoTestData.firstSession
|
||||||
val bobSession = cryptoTestData.secondSession
|
val bobSession = cryptoTestData.secondSession
|
||||||
|
|
||||||
val aliceVerificationService = aliceSession.getVerificationService()
|
val aliceVerificationService = aliceSession.cryptoService().verificationService()
|
||||||
val bobVerificationService = bobSession!!.getVerificationService()
|
val bobVerificationService = bobSession!!.cryptoService().verificationService()
|
||||||
|
|
||||||
val aliceSASLatch = CountDownLatch(1)
|
val aliceSASLatch = CountDownLatch(1)
|
||||||
val aliceListener = object : VerificationService.Listener {
|
val aliceListener = object : VerificationService.Listener {
|
||||||
@ -500,14 +500,14 @@ class SASTest : InstrumentedTest {
|
|||||||
bobVerificationService.addListener(bobListener)
|
bobVerificationService.addListener(bobListener)
|
||||||
|
|
||||||
val bobUserId = bobSession.myUserId
|
val bobUserId = bobSession.myUserId
|
||||||
val bobDeviceId = bobSession.getMyDevice().deviceId
|
val bobDeviceId = bobSession.cryptoService().getMyDevice().deviceId
|
||||||
aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
aliceVerificationService.beginKeyVerification(VerificationMethod.SAS, bobUserId, bobDeviceId, null)
|
||||||
mTestHelper.await(aliceSASLatch)
|
mTestHelper.await(aliceSASLatch)
|
||||||
mTestHelper.await(bobSASLatch)
|
mTestHelper.await(bobSASLatch)
|
||||||
|
|
||||||
// Assert that devices are verified
|
// Assert that devices are verified
|
||||||
val bobDeviceInfoFromAlicePOV: CryptoDeviceInfo? = aliceSession.getDeviceInfo(bobUserId, bobDeviceId)
|
val bobDeviceInfoFromAlicePOV: CryptoDeviceInfo? = aliceSession.cryptoService().getDeviceInfo(bobUserId, bobDeviceId)
|
||||||
val aliceDeviceInfoFromBobPOV: CryptoDeviceInfo? = bobSession.getDeviceInfo(aliceSession.myUserId, aliceSession.getMyDevice().deviceId)
|
val aliceDeviceInfoFromBobPOV: CryptoDeviceInfo? = bobSession.cryptoService().getDeviceInfo(aliceSession.myUserId, aliceSession.cryptoService().getMyDevice().deviceId)
|
||||||
|
|
||||||
// latch wait a bit again
|
// latch wait a bit again
|
||||||
Thread.sleep(1000)
|
Thread.sleep(1000)
|
||||||
|
@ -156,7 +156,7 @@ class VerificationTest : InstrumentedTest {
|
|||||||
val bobSession = cryptoTestData.secondSession!!
|
val bobSession = cryptoTestData.secondSession!!
|
||||||
|
|
||||||
mTestHelper.doSync<Unit> { callback ->
|
mTestHelper.doSync<Unit> { callback ->
|
||||||
aliceSession.getCrossSigningService()
|
aliceSession.cryptoService().crossSigningService()
|
||||||
.initializeCrossSigning(UserPasswordAuth(
|
.initializeCrossSigning(UserPasswordAuth(
|
||||||
user = aliceSession.myUserId,
|
user = aliceSession.myUserId,
|
||||||
password = TestConstants.PASSWORD
|
password = TestConstants.PASSWORD
|
||||||
@ -164,15 +164,15 @@ class VerificationTest : InstrumentedTest {
|
|||||||
}
|
}
|
||||||
|
|
||||||
mTestHelper.doSync<Unit> { callback ->
|
mTestHelper.doSync<Unit> { callback ->
|
||||||
bobSession.getCrossSigningService()
|
bobSession.cryptoService().crossSigningService()
|
||||||
.initializeCrossSigning(UserPasswordAuth(
|
.initializeCrossSigning(UserPasswordAuth(
|
||||||
user = bobSession.myUserId,
|
user = bobSession.myUserId,
|
||||||
password = TestConstants.PASSWORD
|
password = TestConstants.PASSWORD
|
||||||
), callback)
|
), callback)
|
||||||
}
|
}
|
||||||
|
|
||||||
val aliceVerificationService = aliceSession.getVerificationService()
|
val aliceVerificationService = aliceSession.cryptoService().verificationService()
|
||||||
val bobVerificationService = bobSession.getVerificationService()
|
val bobVerificationService = bobSession.cryptoService().verificationService()
|
||||||
|
|
||||||
var aliceReadyPendingVerificationRequest: PendingVerificationRequest? = null
|
var aliceReadyPendingVerificationRequest: PendingVerificationRequest? = null
|
||||||
var bobReadyPendingVerificationRequest: PendingVerificationRequest? = null
|
var bobReadyPendingVerificationRequest: PendingVerificationRequest? = null
|
||||||
|
Loading…
x
Reference in New Issue
Block a user