use of org.matrix.androidsdk.HomeServerConnectionConfig in project matrix-android-sdk by matrix-org.
the class CryptoTest method test11_testAliceAndBobInAEncryptedRoomBackPaginationFromMemoryStore.
@Test
public void test11_testAliceAndBobInAEncryptedRoomBackPaginationFromMemoryStore() throws Exception {
Log.e(LOG_TAG, "test11_testAliceAndBobInAEncryptedRoomBackPaginationFromMemoryStore");
Context context = InstrumentationRegistry.getContext();
final Map<String, Object> results = new HashMap<>();
CryptoTestData cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceAndBobInARoomWithEncryptedMessages(true);
final MXSession aliceSession = cryptoTestData.getFirstSession();
final String aliceRoomId = cryptoTestData.getRoomId();
final MXSession bobSession = cryptoTestData.getSecondSession();
Credentials bobCredentials = bobSession.getCredentials();
bobSession.clear(context);
HomeServerConnectionConfig hs = mTestHelper.createHomeServerConfig(bobCredentials);
IMXStore store = new MXFileStore(hs, false, context);
final CountDownLatch lock1 = new CountDownLatch(2);
MXSession bobSession2 = new MXSession.Builder(hs, new MXDataHandler(store, bobCredentials), context).withLegacyCryptoStore(mCryptoTestHelper.getUSE_LEGACY_CRYPTO_STORE()).build();
MXEventListener eventListener = new MXEventListener() {
@Override
public void onInitialSyncComplete(String toToken) {
results.put("onInitialSyncComplete", "onInitialSyncComplete");
lock1.countDown();
}
@Override
public void onCryptoSyncComplete() {
results.put("onCryptoSyncComplete", "onCryptoSyncComplete");
lock1.countDown();
}
};
bobSession2.getDataHandler().addListener(eventListener);
bobSession2.getDataHandler().getStore().open();
bobSession2.startEventStream(null);
mTestHelper.await(lock1);
Assert.assertTrue(results.containsKey("onInitialSyncComplete"));
Assert.assertTrue(results.containsKey("onCryptoSyncComplete"));
Assert.assertNotNull(bobSession2.getCrypto());
Room roomFromBobPOV = bobSession2.getDataHandler().getRoom(aliceRoomId);
final CountDownLatch lock2 = new CountDownLatch(6);
final List<Event> receivedEvents = new ArrayList<>();
EventTimeline.Listener eventTimelineListener = new EventTimeline.Listener() {
public void onEvent(Event event, EventTimeline.Direction direction, RoomState roomState) {
if (TextUtils.equals(event.getType(), Event.EVENT_TYPE_MESSAGE)) {
receivedEvents.add(event);
lock2.countDown();
}
}
};
roomFromBobPOV.getTimeline().addEventTimelineListener(eventTimelineListener);
roomFromBobPOV.getTimeline().backPaginate(new TestApiCallback<Integer>(lock2) {
@Override
public void onSuccess(Integer info) {
results.put("backPaginate", "backPaginate");
super.onSuccess(info);
}
});
mTestHelper.await(lock2);
Assert.assertTrue(results.containsKey("backPaginate"));
Assert.assertEquals(receivedEvents.size() + " instead of 5", 5, receivedEvents.size());
mCryptoTestHelper.checkEncryptedEvent(receivedEvents.get(0), aliceRoomId, mCryptoTestHelper.getMessagesFromAlice().get(1), aliceSession);
mCryptoTestHelper.checkEncryptedEvent(receivedEvents.get(1), aliceRoomId, mCryptoTestHelper.getMessagesFromBob().get(2), bobSession);
mCryptoTestHelper.checkEncryptedEvent(receivedEvents.get(2), aliceRoomId, mCryptoTestHelper.getMessagesFromBob().get(1), bobSession);
mCryptoTestHelper.checkEncryptedEvent(receivedEvents.get(3), aliceRoomId, mCryptoTestHelper.getMessagesFromBob().get(0), bobSession);
mCryptoTestHelper.checkEncryptedEvent(receivedEvents.get(4), aliceRoomId, mCryptoTestHelper.getMessagesFromAlice().get(0), aliceSession);
cryptoTestData.clear(context);
bobSession2.clear(context);
}
use of org.matrix.androidsdk.HomeServerConnectionConfig in project matrix-android-sdk by matrix-org.
the class CryptoTest method test09_testAliceInAEncryptedRoomAfterInitialSync.
@Test
public void test09_testAliceInAEncryptedRoomAfterInitialSync() throws Exception {
Log.e(LOG_TAG, "test09_testAliceInAEncryptedRoomAfterInitialSync");
Context context = InstrumentationRegistry.getContext();
final Map<String, Object> results = new HashMap<>();
CryptoTestData cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceInARoom();
MXSession aliceSession = cryptoTestData.getFirstSession();
final String aliceRoomId = cryptoTestData.getRoomId();
aliceSession.getCrypto().setWarnOnUnknownDevices(false);
final String message = "Hello myself!";
Credentials aliceCredentials = aliceSession.getCredentials();
aliceSession.clear(context);
HomeServerConnectionConfig hs = mTestHelper.createHomeServerConfig(aliceCredentials);
IMXStore store = new MXFileStore(hs, false, context);
final CountDownLatch lock1 = new CountDownLatch(1);
final MXSession aliceSession2 = new MXSession.Builder(hs, new MXDataHandler(store, aliceCredentials), context).withLegacyCryptoStore(mCryptoTestHelper.getUSE_LEGACY_CRYPTO_STORE()).build();
MXStoreListener listener = new MXStoreListener() {
@Override
public void postProcess(String accountId) {
}
@Override
public void onStoreReady(String accountId) {
results.put("onStoreReady", "onStoreReady");
lock1.countDown();
}
@Override
public void onStoreCorrupted(String accountId, String description) {
lock1.countDown();
}
@Override
public void onStoreOOM(String accountId, String description) {
lock1.countDown();
}
};
aliceSession2.getDataHandler().getStore().addMXStoreListener(listener);
aliceSession2.getDataHandler().getStore().open();
mTestHelper.await(lock1);
Assert.assertTrue(results.containsKey("onStoreReady"));
final CountDownLatch lock1b = new CountDownLatch(2);
MXEventListener eventListener = new MXEventListener() {
@Override
public void onInitialSyncComplete(String toToken) {
results.put("onInitialSyncComplete", "onInitialSyncComplete");
lock1b.countDown();
}
@Override
public void onCryptoSyncComplete() {
results.put("onCryptoSyncComplete", "onCryptoSyncComplete");
lock1b.countDown();
}
};
aliceSession2.getDataHandler().addListener(eventListener);
aliceSession2.startEventStream(null);
mTestHelper.await(lock1b);
Assert.assertTrue(results.containsKey("onInitialSyncComplete"));
Assert.assertTrue(results.containsKey("onCryptoSyncComplete"));
Room roomFromAlicePOV2 = aliceSession2.getDataHandler().getRoom(aliceRoomId);
Assert.assertTrue(roomFromAlicePOV2.isEncrypted());
final CountDownLatch lock2 = new CountDownLatch(1);
if (false) {
// The android client does not echo its own message
MXEventListener aliceEventListener = new MXEventListener() {
@Override
public void onLiveEvent(Event event, RoomState roomState) {
if (TextUtils.equals(event.getType(), Event.EVENT_TYPE_MESSAGE)) {
mCryptoTestHelper.checkEncryptedEvent(event, aliceRoomId, message, aliceSession2);
lock2.countDown();
}
}
};
roomFromAlicePOV2.addEventListener(aliceEventListener);
}
// the IOS client echoes the message
// the android client does not
roomFromAlicePOV2.sendEvent(mCryptoTestHelper.buildTextEvent(message, aliceSession2, aliceRoomId), new TestApiCallback<Void>(lock2) {
@Override
public void onSuccess(Void info) {
results.put("sendEvent", "sendEvent");
super.onSuccess(info);
}
});
mTestHelper.await(lock2);
Assert.assertTrue(results.containsKey("sendEvent"));
cryptoTestData.clear(context);
aliceSession2.clear(context);
}
use of org.matrix.androidsdk.HomeServerConnectionConfig in project matrix-android-sdk by matrix-org.
the class CryptoTest method test10_testAliceDecryptOldMessageWithANewDeviceInAEncryptedRoom.
@Test
public void test10_testAliceDecryptOldMessageWithANewDeviceInAEncryptedRoom() throws Exception {
Log.e(LOG_TAG, "test10_testAliceDecryptOldMessageWithANewDeviceInAEncryptedRoom");
Context context = InstrumentationRegistry.getContext();
final Map<String, Object> results = new HashMap<>();
CryptoTestData cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceInARoom();
MXSession aliceSession = cryptoTestData.getFirstSession();
String aliceRoomId = cryptoTestData.getRoomId();
aliceSession.getCrypto().setWarnOnUnknownDevices(false);
String message = "Hello myself!";
Room roomFromAlicePOV = aliceSession.getDataHandler().getRoom(aliceRoomId);
CountDownLatch lock1 = new CountDownLatch(1);
roomFromAlicePOV.sendEvent(mCryptoTestHelper.buildTextEvent(message, aliceSession, aliceRoomId), new TestApiCallback<Void>(lock1) {
@Override
public void onSuccess(Void info) {
results.put("sendEvent", "sendEvent");
super.onSuccess(info);
}
});
mTestHelper.await(lock1);
Assert.assertTrue(results.containsKey("sendEvent"));
Credentials aliceCredentials = aliceSession.getCredentials();
Credentials aliceCredentials2 = new Credentials();
// close the session and clear the data (not the crypto store)
aliceSession.clear(context);
aliceCredentials2.userId = aliceCredentials.userId;
aliceCredentials2.homeServer = aliceCredentials.homeServer;
aliceCredentials2.accessToken = aliceCredentials.accessToken;
aliceCredentials2.refreshToken = aliceCredentials.refreshToken;
aliceCredentials2.deviceId = "AliceNewDevice";
HomeServerConnectionConfig hs = mTestHelper.createHomeServerConfig(aliceCredentials2);
IMXStore store = new MXFileStore(hs, false, context);
MXSession aliceSession2 = new MXSession.Builder(hs, new MXDataHandler(store, aliceCredentials2), context).withLegacyCryptoStore(mCryptoTestHelper.getUSE_LEGACY_CRYPTO_STORE()).build();
aliceSession2.enableCryptoWhenStarting();
final CountDownLatch lock1b = new CountDownLatch(1);
MXStoreListener listener = new MXStoreListener() {
@Override
public void postProcess(String accountId) {
}
@Override
public void onStoreReady(String accountId) {
results.put("onStoreReady", "onStoreReady");
lock1b.countDown();
}
@Override
public void onStoreCorrupted(String accountId, String description) {
lock1b.countDown();
}
@Override
public void onStoreOOM(String accountId, String description) {
lock1b.countDown();
}
};
aliceSession2.getDataHandler().getStore().addMXStoreListener(listener);
aliceSession2.getDataHandler().getStore().open();
mTestHelper.await(lock1b);
Assert.assertTrue(results.containsKey("onStoreReady"));
final CountDownLatch lock2 = new CountDownLatch(2);
MXEventListener eventListener = new MXEventListener() {
@Override
public void onInitialSyncComplete(String toToken) {
results.put("onInitialSyncComplete", "onInitialSyncComplete");
lock2.countDown();
}
@Override
public void onCryptoSyncComplete() {
results.put("onCryptoSyncComplete", "onCryptoSyncComplete");
lock2.countDown();
}
};
aliceSession2.getDataHandler().addListener(eventListener);
aliceSession2.startEventStream(null);
mTestHelper.await(lock2);
Assert.assertTrue(results.containsKey("onInitialSyncComplete"));
Assert.assertTrue(results.containsKey("onCryptoSyncComplete"));
Room roomFromAlicePOV2 = aliceSession2.getDataHandler().getRoom(aliceRoomId);
Assert.assertNotNull(roomFromAlicePOV2);
Assert.assertTrue(roomFromAlicePOV2.getState().isEncrypted());
Event event = roomFromAlicePOV2.getDataHandler().getStore().getLatestEvent(aliceRoomId);
Assert.assertNotNull(event);
Assert.assertTrue(event.isEncrypted());
Assert.assertNull(event.getClearEvent());
Assert.assertNotNull(event.getCryptoError());
Assert.assertEquals(MXCryptoError.UNKNOWN_INBOUND_SESSION_ID_ERROR_CODE, event.getCryptoError().errcode);
cryptoTestData.clear(context);
aliceSession2.clear(context);
}
use of org.matrix.androidsdk.HomeServerConnectionConfig in project matrix-android-sdk by matrix-org.
the class CommonTestHelper method logAccountAndSync.
/**
* Start an account login
*
* @param context the context
* @param userName the account username
* @param password the password
* @param sessionTestParams session test params
*/
private MXSession logAccountAndSync(final Context context, final String userName, final String password, final SessionTestParams sessionTestParams) throws InterruptedException {
final HomeServerConnectionConfig hs = createHomeServerConfig(null);
LoginRestClient loginRestClient = new LoginRestClient(hs);
final Map<String, Object> params = new HashMap<>();
CountDownLatch lock = new CountDownLatch(1);
// get the registration session id
loginRestClient.loginWithUser(userName, password, new TestApiCallback<Credentials>(lock) {
@Override
public void onSuccess(Credentials credentials) {
params.put("credentials", credentials);
super.onSuccess(credentials);
}
});
await(lock);
final Credentials credentials = (Credentials) params.get("credentials");
Assert.assertNotNull(credentials);
hs.setCredentials(credentials);
final IMXStore store = new MXFileStore(hs, false, context);
MXDataHandler mxDataHandler = new MXDataHandler(store, credentials);
mxDataHandler.setLazyLoadingEnabled(sessionTestParams.getWithLazyLoading());
final MXSession mxSession = new MXSession.Builder(hs, mxDataHandler, context).withLegacyCryptoStore(sessionTestParams.getWithLegacyCryptoStore()).build();
if (sessionTestParams.getWithCryptoEnabled()) {
mxSession.enableCryptoWhenStarting();
}
if (sessionTestParams.getWithInitialSync()) {
syncSession(mxSession, sessionTestParams.getWithCryptoEnabled());
}
return mxSession;
}
use of org.matrix.androidsdk.HomeServerConnectionConfig in project matrix-android-sdk by matrix-org.
the class CryptoTest method test24_testExportImport.
@Test
public void test24_testExportImport() throws Exception {
Log.e(LOG_TAG, "test24_testExportImport");
Context context = InstrumentationRegistry.getContext();
final Map<String, Object> results = new HashMap<>();
CryptoTestData cryptoTestData = mCryptoTestHelper.doE2ETestWithAliceInARoom();
MXSession aliceSession = cryptoTestData.getFirstSession();
String aliceRoomId = cryptoTestData.getRoomId();
aliceSession.getCrypto().setWarnOnUnknownDevices(false);
String message = "Hello myself!";
String password = "hello";
Room roomFromAlicePOV = aliceSession.getDataHandler().getRoom(aliceRoomId);
CountDownLatch lock1 = new CountDownLatch(1);
roomFromAlicePOV.sendEvent(mCryptoTestHelper.buildTextEvent(message, aliceSession, aliceRoomId), new TestApiCallback<Void>(lock1) {
@Override
public void onSuccess(Void info) {
results.put("sendEvent", "sendEvent");
super.onSuccess(info);
}
});
mTestHelper.await(lock1);
Assert.assertTrue(results.containsKey("sendEvent"));
Credentials aliceCredentials = aliceSession.getCredentials();
Credentials aliceCredentials2 = new Credentials();
CountDownLatch lock1a = new CountDownLatch(1);
aliceSession.getCrypto().exportRoomKeys(password, new TestApiCallback<byte[]>(lock1a) {
@Override
public void onSuccess(byte[] info) {
results.put("exportRoomKeys", info);
super.onSuccess(info);
}
});
mTestHelper.await(lock1a);
Assert.assertTrue(results.containsKey("exportRoomKeys"));
// close the session and clear the data
aliceSession.clear(context);
aliceCredentials2.userId = aliceCredentials.userId;
aliceCredentials2.homeServer = aliceCredentials.homeServer;
aliceCredentials2.accessToken = aliceCredentials.accessToken;
aliceCredentials2.refreshToken = aliceCredentials.refreshToken;
aliceCredentials2.deviceId = "AliceNewDevice";
HomeServerConnectionConfig hs = mTestHelper.createHomeServerConfig(aliceCredentials2);
IMXStore store = new MXFileStore(hs, false, context);
MXSession aliceSession2 = new MXSession.Builder(hs, new MXDataHandler(store, aliceCredentials2), context).withLegacyCryptoStore(mCryptoTestHelper.getUSE_LEGACY_CRYPTO_STORE()).build();
aliceSession2.enableCryptoWhenStarting();
final CountDownLatch lock1b = new CountDownLatch(1);
MXStoreListener listener = new MXStoreListener() {
@Override
public void postProcess(String accountId) {
}
@Override
public void onStoreReady(String accountId) {
results.put("onStoreReady", "onStoreReady");
lock1b.countDown();
}
@Override
public void onStoreCorrupted(String accountId, String description) {
lock1b.countDown();
}
@Override
public void onStoreOOM(String accountId, String description) {
lock1b.countDown();
}
};
aliceSession2.getDataHandler().getStore().addMXStoreListener(listener);
aliceSession2.getDataHandler().getStore().open();
mTestHelper.await(lock1b);
Assert.assertTrue(results.containsKey("onStoreReady"));
final CountDownLatch lock2 = new CountDownLatch(2);
MXEventListener eventListener = new MXEventListener() {
@Override
public void onInitialSyncComplete(String toToken) {
results.put("onInitialSyncComplete", "onInitialSyncComplete");
lock2.countDown();
}
@Override
public void onCryptoSyncComplete() {
results.put("onCryptoSyncComplete", "onCryptoSyncComplete");
lock2.countDown();
}
};
aliceSession2.getDataHandler().addListener(eventListener);
aliceSession2.startEventStream(null);
mTestHelper.await(lock2);
Assert.assertTrue(results.containsKey("onInitialSyncComplete"));
Assert.assertTrue(results.containsKey("onCryptoSyncComplete"));
Room roomFromAlicePOV2 = aliceSession2.getDataHandler().getRoom(aliceRoomId);
Assert.assertNotNull(roomFromAlicePOV2);
Assert.assertTrue(roomFromAlicePOV2.getState().isEncrypted());
Event event = roomFromAlicePOV2.getDataHandler().getStore().getLatestEvent(aliceRoomId);
Assert.assertNotNull(event);
Assert.assertTrue(event.isEncrypted());
Assert.assertNull(event.getClearEvent());
Assert.assertNotNull(event.getCryptoError());
Assert.assertEquals(MXCryptoError.UNKNOWN_INBOUND_SESSION_ID_ERROR_CODE, event.getCryptoError().errcode);
// import the e2e keys
// test with a wrong password
CountDownLatch lock3 = new CountDownLatch(1);
aliceSession2.getCrypto().importRoomKeys((byte[]) results.get("exportRoomKeys"), "wrong password", null, new TestApiCallback<ImportRoomKeysResult>(lock3, false) {
@Override
public void onUnexpectedError(Exception e) {
results.put("importRoomKeys_failed", "importRoomKeys_failed");
super.onUnexpectedError(e);
}
});
mTestHelper.await(lock3);
Assert.assertTrue(results.containsKey("importRoomKeys_failed"));
// check that the message cannot be decrypted
event = roomFromAlicePOV2.getDataHandler().getStore().getLatestEvent(aliceRoomId);
Assert.assertNotNull(event);
Assert.assertTrue(event.isEncrypted());
Assert.assertNull(event.getClearEvent());
Assert.assertNotNull(event.getCryptoError());
Assert.assertEquals(MXCryptoError.UNKNOWN_INBOUND_SESSION_ID_ERROR_CODE, event.getCryptoError().errcode);
CountDownLatch lock4 = new CountDownLatch(1);
aliceSession2.getCrypto().importRoomKeys((byte[]) results.get("exportRoomKeys"), password, null, new TestApiCallback<ImportRoomKeysResult>(lock4) {
@Override
public void onSuccess(ImportRoomKeysResult info) {
Assert.assertEquals(1, info.getTotalNumberOfKeys());
Assert.assertEquals(1, info.getSuccessfullyNumberOfImportedKeys());
results.put("importRoomKeys", "importRoomKeys");
super.onSuccess(info);
}
});
mTestHelper.await(lock4);
Assert.assertTrue(results.containsKey("importRoomKeys"));
// check that the message CAN be decrypted
event = roomFromAlicePOV2.getDataHandler().getStore().getLatestEvent(aliceRoomId);
Assert.assertNotNull(event);
Assert.assertTrue(event.isEncrypted());
Assert.assertNotNull(event.getClearEvent());
Assert.assertNull(event.getCryptoError());
mCryptoTestHelper.checkEncryptedEvent(event, aliceRoomId, message, aliceSession);
cryptoTestData.clear(context);
aliceSession2.clear(context);
}
Aggregations