Handling the case where device has no CryptoDeviceInfo
This commit is contained in:
parent
041fcef1db
commit
f014866d06
|
@ -3305,6 +3305,7 @@
|
|||
<string name="device_manager_verification_status_detail_current_session_unverified">Verify your current session for enhanced secure messaging.</string>
|
||||
<string name="device_manager_verification_status_detail_other_session_unverified">Verify or sign out from this session for best security and reliability.</string>
|
||||
<string name="device_manager_verification_status_detail_other_session_unknown">Verify your current session to reveal this session\'s verification status.</string>
|
||||
<string name="device_manager_verification_status_detail_session_encryption_not_supported">This session doesn\'t support encryption and thus can\'t be verified.</string>
|
||||
<string name="device_manager_verify_session">Verify Session</string>
|
||||
<string name="device_manager_view_details">View Details</string>
|
||||
<string name="device_manager_other_sessions_view_all">View All (%1$d)</string>
|
||||
|
@ -3397,6 +3398,7 @@
|
|||
<!-- TODO TO BE REMOVED -->
|
||||
<string name="device_manager_learn_more_sessions_verified" tools:ignore="UnusedResources">Verified sessions have logged in with your credentials and then been verified, either using your secure passphrase or by cross-verifying.\n\nThis means they hold encryption keys for your previous messages, and confirm to other users you are communicating with that these sessions are really you.</string>
|
||||
<string name="device_manager_learn_more_sessions_verified_description">Verified sessions are anywhere you are using this account after entering your passphrase or confirming your identity with another verified session.\n\nThis means that you have all the keys needed to unlock your encrypted messages and confirm to other users that you trust this session.</string>
|
||||
<string name="device_manager_learn_more_sessions_encryption_not_supported">This session doesn\'t support encryption, so it can\'t be verified.\n\nYou won\'t be able to participate in rooms where encryption is enabled when using this session.\n\nFor best security and privacy, it is recommended to use Matrix clients that support encryption.</string>
|
||||
<string name="device_manager_learn_more_session_rename_title">Renaming sessions</string>
|
||||
<string name="device_manager_learn_more_session_rename">Other users in direct messages and rooms that you join are able to view a full list of your sessions.\n\nThis provides them with confidence that they are really speaking to you, but it also means they can see the session name you enter here.</string>
|
||||
<string name="labs_enable_session_manager_title">Enable new session manager</string>
|
||||
|
|
|
@ -40,20 +40,26 @@ class ShieldImageView @JvmOverloads constructor(
|
|||
|
||||
/**
|
||||
* Renders device shield with the support of unknown shields instead of black shields which is used for rooms.
|
||||
* @param roomEncryptionTrustLevel trust level that is usally calculated with [im.vector.app.features.settings.devices.TrustUtils.shieldForTrust]
|
||||
* @param roomEncryptionTrustLevel trust level that is usually calculated with [im.vector.app.features.settings.devices.TrustUtils.shieldForTrust]
|
||||
* @param borderLess if true then the shield icon with border around is used
|
||||
*/
|
||||
fun renderDeviceShield(roomEncryptionTrustLevel: RoomEncryptionTrustLevel?, borderLess: Boolean = false) {
|
||||
isVisible = roomEncryptionTrustLevel != null
|
||||
|
||||
if (roomEncryptionTrustLevel == RoomEncryptionTrustLevel.Default) {
|
||||
contentDescription = context.getString(R.string.a11y_trust_level_default)
|
||||
setImageResource(
|
||||
if (borderLess) R.drawable.ic_shield_unknown_no_border
|
||||
else R.drawable.ic_shield_unknown
|
||||
)
|
||||
} else {
|
||||
render(roomEncryptionTrustLevel, borderLess)
|
||||
when (roomEncryptionTrustLevel) {
|
||||
null -> {
|
||||
contentDescription = context.getString(R.string.a11y_trust_level_warning)
|
||||
setImageResource(
|
||||
if (borderLess) R.drawable.ic_shield_warning_no_border
|
||||
else R.drawable.ic_shield_warning
|
||||
)
|
||||
}
|
||||
RoomEncryptionTrustLevel.Default -> {
|
||||
contentDescription = context.getString(R.string.a11y_trust_level_default)
|
||||
setImageResource(
|
||||
if (borderLess) R.drawable.ic_shield_unknown_no_border
|
||||
else R.drawable.ic_shield_unknown
|
||||
)
|
||||
}
|
||||
else -> render(roomEncryptionTrustLevel, borderLess)
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -88,7 +88,7 @@ data class DevicesViewState(
|
|||
data class DeviceFullInfo(
|
||||
val deviceInfo: DeviceInfo,
|
||||
val cryptoDeviceInfo: CryptoDeviceInfo?,
|
||||
val trustLevelForShield: RoomEncryptionTrustLevel,
|
||||
val trustLevelForShield: RoomEncryptionTrustLevel?,
|
||||
val isInactive: Boolean,
|
||||
)
|
||||
|
||||
|
|
|
@ -25,7 +25,7 @@ import org.matrix.android.sdk.api.session.crypto.model.RoomEncryptionTrustLevel
|
|||
data class DeviceFullInfo(
|
||||
val deviceInfo: DeviceInfo,
|
||||
val cryptoDeviceInfo: CryptoDeviceInfo?,
|
||||
val roomEncryptionTrustLevel: RoomEncryptionTrustLevel,
|
||||
val roomEncryptionTrustLevel: RoomEncryptionTrustLevel?,
|
||||
val isInactive: Boolean,
|
||||
val isCurrentDevice: Boolean,
|
||||
val deviceExtendedInfo: DeviceExtendedInfo,
|
||||
|
|
|
@ -85,13 +85,14 @@ class SessionInfoView @JvmOverloads constructor(
|
|||
}
|
||||
|
||||
private fun renderVerificationStatus(
|
||||
encryptionTrustLevel: RoomEncryptionTrustLevel,
|
||||
encryptionTrustLevel: RoomEncryptionTrustLevel?,
|
||||
isCurrentSession: Boolean,
|
||||
hasLearnMoreLink: Boolean,
|
||||
isVerifyButtonVisible: Boolean,
|
||||
) {
|
||||
views.sessionInfoVerificationStatusImageView.renderDeviceShield(encryptionTrustLevel)
|
||||
when {
|
||||
encryptionTrustLevel == null -> renderCrossSigningEncryptionNotSupported()
|
||||
encryptionTrustLevel == RoomEncryptionTrustLevel.Trusted -> renderCrossSigningVerified(isCurrentSession)
|
||||
encryptionTrustLevel == RoomEncryptionTrustLevel.Default && !isCurrentSession -> renderCrossSigningUnknown()
|
||||
else -> renderCrossSigningUnverified(isCurrentSession, isVerifyButtonVisible)
|
||||
|
@ -149,6 +150,14 @@ class SessionInfoView @JvmOverloads constructor(
|
|||
views.sessionInfoVerifySessionButton.isVisible = false
|
||||
}
|
||||
|
||||
private fun renderCrossSigningEncryptionNotSupported() {
|
||||
views.sessionInfoVerificationStatusTextView.text = context.getString(R.string.device_manager_verification_status_unverified)
|
||||
views.sessionInfoVerificationStatusTextView.setTextColor(ThemeUtils.getColor(context, R.attr.colorError))
|
||||
views.sessionInfoVerificationStatusDetailTextView.text =
|
||||
context.getString(R.string.device_manager_verification_status_detail_session_encryption_not_supported)
|
||||
views.sessionInfoVerifySessionButton.isVisible = false
|
||||
}
|
||||
|
||||
private fun renderDeviceInfo(sessionName: String, deviceType: DeviceType, stringProvider: StringProvider) {
|
||||
setDeviceTypeIconUseCase.execute(deviceType, views.sessionInfoDeviceTypeImageView, stringProvider)
|
||||
views.sessionInfoNameTextView.text = sessionName
|
||||
|
|
|
@ -229,7 +229,7 @@ class SessionOverviewFragment :
|
|||
)
|
||||
views.sessionOverviewInfo.render(infoViewState, dateFormatter, drawableProvider, colorProvider, stringProvider)
|
||||
views.sessionOverviewInfo.onLearnMoreClickListener = {
|
||||
showLearnMoreInfoVerificationStatus(deviceInfo.roomEncryptionTrustLevel == RoomEncryptionTrustLevel.Trusted)
|
||||
showLearnMoreInfoVerificationStatus(deviceInfo.roomEncryptionTrustLevel)
|
||||
}
|
||||
} else {
|
||||
views.sessionOverviewInfo.isVisible = false
|
||||
|
@ -293,21 +293,28 @@ class SessionOverviewFragment :
|
|||
}
|
||||
}
|
||||
|
||||
private fun showLearnMoreInfoVerificationStatus(isVerified: Boolean) {
|
||||
val titleResId = if (isVerified) {
|
||||
R.string.device_manager_verification_status_verified
|
||||
} else {
|
||||
R.string.device_manager_verification_status_unverified
|
||||
private fun showLearnMoreInfoVerificationStatus(roomEncryptionTrustLevel: RoomEncryptionTrustLevel?) {
|
||||
val args = when(roomEncryptionTrustLevel) {
|
||||
null -> {
|
||||
// encryption not supported
|
||||
SessionLearnMoreBottomSheet.Args(
|
||||
title = getString(R.string.device_manager_verification_status_unverified),
|
||||
description = getString(R.string.device_manager_learn_more_sessions_encryption_not_supported),
|
||||
)
|
||||
}
|
||||
RoomEncryptionTrustLevel.Trusted -> {
|
||||
SessionLearnMoreBottomSheet.Args(
|
||||
title = getString(R.string.device_manager_verification_status_verified),
|
||||
description = getString(R.string.device_manager_learn_more_sessions_verified_description),
|
||||
)
|
||||
}
|
||||
else -> {
|
||||
SessionLearnMoreBottomSheet.Args(
|
||||
title = getString(R.string.device_manager_verification_status_unverified),
|
||||
description = getString(R.string.device_manager_learn_more_sessions_unverified),
|
||||
)
|
||||
}
|
||||
}
|
||||
val descriptionResId = if (isVerified) {
|
||||
R.string.device_manager_learn_more_sessions_verified_description
|
||||
} else {
|
||||
R.string.device_manager_learn_more_sessions_unverified
|
||||
}
|
||||
val args = SessionLearnMoreBottomSheet.Args(
|
||||
title = getString(titleResId),
|
||||
description = getString(descriptionResId),
|
||||
)
|
||||
SessionLearnMoreBottomSheet.show(childFragmentManager, args)
|
||||
}
|
||||
}
|
||||
|
|
|
@ -25,11 +25,15 @@ class GetEncryptionTrustLevelForDeviceUseCase @Inject constructor(
|
|||
private val getEncryptionTrustLevelForOtherDeviceUseCase: GetEncryptionTrustLevelForOtherDeviceUseCase,
|
||||
) {
|
||||
|
||||
fun execute(currentSessionCrossSigningInfo: CurrentSessionCrossSigningInfo, cryptoDeviceInfo: CryptoDeviceInfo?): RoomEncryptionTrustLevel {
|
||||
fun execute(currentSessionCrossSigningInfo: CurrentSessionCrossSigningInfo, cryptoDeviceInfo: CryptoDeviceInfo?): RoomEncryptionTrustLevel? {
|
||||
if(cryptoDeviceInfo == null) {
|
||||
return null
|
||||
}
|
||||
|
||||
val legacyMode = !currentSessionCrossSigningInfo.isCrossSigningInitialized
|
||||
val trustMSK = currentSessionCrossSigningInfo.isCrossSigningVerified
|
||||
val isCurrentDevice = !cryptoDeviceInfo?.deviceId.isNullOrEmpty() && cryptoDeviceInfo?.deviceId == currentSessionCrossSigningInfo.deviceId
|
||||
val deviceTrustLevel = cryptoDeviceInfo?.trustLevel
|
||||
val isCurrentDevice = !cryptoDeviceInfo.deviceId.isNullOrEmpty() && cryptoDeviceInfo.deviceId == currentSessionCrossSigningInfo.deviceId
|
||||
val deviceTrustLevel = cryptoDeviceInfo.trustLevel
|
||||
|
||||
return when {
|
||||
isCurrentDevice -> getEncryptionTrustLevelForCurrentDeviceUseCase.execute(trustMSK, legacyMode)
|
||||
|
|
|
@ -19,6 +19,7 @@ package im.vector.app.features.settings.devices.v2.verification
|
|||
import io.mockk.every
|
||||
import io.mockk.mockk
|
||||
import io.mockk.verify
|
||||
import org.amshove.kluent.shouldBe
|
||||
import org.amshove.kluent.shouldBeEqualTo
|
||||
import org.junit.Test
|
||||
import org.matrix.android.sdk.api.session.crypto.crosssigning.DeviceTrustLevel
|
||||
|
@ -89,6 +90,20 @@ class GetEncryptionTrustLevelForDeviceUseCaseTest {
|
|||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
fun `given no crypto device info when computing trust level then result is null`() {
|
||||
val currentSessionCrossSigningInfo = givenCurrentSessionCrossSigningInfo(
|
||||
deviceId = A_DEVICE_ID,
|
||||
isCrossSigningInitialized = true,
|
||||
isCrossSigningVerified = false
|
||||
)
|
||||
val cryptoDeviceInfo = null
|
||||
|
||||
val result = getEncryptionTrustLevelForDeviceUseCase.execute(currentSessionCrossSigningInfo, cryptoDeviceInfo)
|
||||
|
||||
result shouldBe null
|
||||
}
|
||||
|
||||
private fun givenCurrentSessionCrossSigningInfo(
|
||||
deviceId: String,
|
||||
isCrossSigningInitialized: Boolean,
|
||||
|
|
Loading…
Reference in New Issue