add some encrypt / decrypt tests
This commit is contained in:
parent
2e46155f47
commit
f3f3231df6
|
@ -68,9 +68,13 @@ class Encryption {
|
||||||
Future<void> handleToDeviceEvent(ToDeviceEvent event) async {
|
Future<void> handleToDeviceEvent(ToDeviceEvent event) async {
|
||||||
if (['m.room_key', 'm.room_key_request', 'm.forwarded_room_key']
|
if (['m.room_key', 'm.room_key_request', 'm.forwarded_room_key']
|
||||||
.contains(event.type)) {
|
.contains(event.type)) {
|
||||||
|
// a new room key or thelike. We need to handle this asap, before other
|
||||||
|
// events in /sync are handled
|
||||||
await keyManager.handleToDeviceEvent(event);
|
await keyManager.handleToDeviceEvent(event);
|
||||||
}
|
}
|
||||||
if (event.type.startsWith('m.key.verification.')) {
|
if (event.type.startsWith('m.key.verification.')) {
|
||||||
|
// some key verification event. No need to handle it now, we can easily
|
||||||
|
// do this in the background
|
||||||
unawaited(keyVerificationManager.handleToDeviceEvent(event));
|
unawaited(keyVerificationManager.handleToDeviceEvent(event));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -123,13 +123,15 @@ class OlmManager {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Generates new one time keys, signs everything and upload it to the server.
|
/// Generates new one time keys, signs everything and upload it to the server.
|
||||||
Future<bool> uploadKeys({bool uploadDeviceKeys = false}) async {
|
Future<bool> uploadKeys({bool uploadDeviceKeys = false, int oldKeyCount = 0}) async {
|
||||||
if (!enabled) {
|
if (!enabled) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
// generate one-time keys
|
// generate one-time keys
|
||||||
final oneTimeKeysCount = _olmAccount.max_number_of_one_time_keys();
|
// we generate 2/3rds of max, so that other keys people may still have can
|
||||||
|
// still be used
|
||||||
|
final oneTimeKeysCount = (_olmAccount.max_number_of_one_time_keys() * 2 / 3).floor() - oldKeyCount;
|
||||||
_olmAccount.generate_one_time_keys(oneTimeKeysCount);
|
_olmAccount.generate_one_time_keys(oneTimeKeysCount);
|
||||||
final Map<String, dynamic> oneTimeKeys =
|
final Map<String, dynamic> oneTimeKeys =
|
||||||
json.decode(_olmAccount.one_time_keys());
|
json.decode(_olmAccount.one_time_keys());
|
||||||
|
@ -194,7 +196,7 @@ class OlmManager {
|
||||||
if (countJson.containsKey('signed_curve25519') &&
|
if (countJson.containsKey('signed_curve25519') &&
|
||||||
countJson['signed_curve25519'] <
|
countJson['signed_curve25519'] <
|
||||||
(_olmAccount.max_number_of_one_time_keys() / 2)) {
|
(_olmAccount.max_number_of_one_time_keys() / 2)) {
|
||||||
uploadKeys();
|
uploadKeys(oldKeyCount: countJson['signed_curve25519']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -260,11 +262,16 @@ class OlmManager {
|
||||||
|
|
||||||
if (plaintext == null) {
|
if (plaintext == null) {
|
||||||
var newSession = olm.Session();
|
var newSession = olm.Session();
|
||||||
|
try {
|
||||||
newSession.create_inbound_from(_olmAccount, senderKey, body);
|
newSession.create_inbound_from(_olmAccount, senderKey, body);
|
||||||
_olmAccount.remove_one_time_keys(newSession);
|
_olmAccount.remove_one_time_keys(newSession);
|
||||||
client.database?.updateClientKeys(pickledOlmAccount, client.id);
|
client.database?.updateClientKeys(pickledOlmAccount, client.id);
|
||||||
plaintext = newSession.decrypt(type, body);
|
plaintext = newSession.decrypt(type, body);
|
||||||
storeOlmSession(senderKey, newSession);
|
storeOlmSession(senderKey, newSession);
|
||||||
|
} catch (_) {
|
||||||
|
newSession?.free();
|
||||||
|
rethrow;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
final Map<String, dynamic> plainContent = json.decode(plaintext);
|
final Map<String, dynamic> plainContent = json.decode(plaintext);
|
||||||
if (plainContent.containsKey('sender') &&
|
if (plainContent.containsKey('sender') &&
|
||||||
|
@ -292,22 +299,31 @@ class OlmManager {
|
||||||
if (event.type != EventTypes.Encrypted) {
|
if (event.type != EventTypes.Encrypted) {
|
||||||
return event;
|
return event;
|
||||||
}
|
}
|
||||||
|
final senderKey = event.content['sender_key'];
|
||||||
|
final loadFromDb = () async {
|
||||||
|
if (client.database == null) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
final sessions = await client.database.getSingleOlmSessions(
|
||||||
|
client.id, senderKey, client.userID);
|
||||||
|
if (sessions.isEmpty) {
|
||||||
|
return false; // okay, can't do anything
|
||||||
|
}
|
||||||
|
_olmSessions[senderKey] = sessions;
|
||||||
|
return true;
|
||||||
|
};
|
||||||
|
if (!_olmSessions.containsKey(senderKey)) {
|
||||||
|
await loadFromDb();
|
||||||
|
}
|
||||||
event = _decryptToDeviceEvent(event);
|
event = _decryptToDeviceEvent(event);
|
||||||
if (event.type != EventTypes.Encrypted || client.database == null) {
|
if (event.type != EventTypes.Encrypted || !(await loadFromDb())) {
|
||||||
return event;
|
return event;
|
||||||
}
|
}
|
||||||
// load the olm session from the database and re-try to decrypt it
|
// retry to decrypt!
|
||||||
final sessions = await client.database.getSingleOlmSessions(
|
|
||||||
client.id, event.content['sender_key'], client.userID);
|
|
||||||
if (sessions.isEmpty) {
|
|
||||||
return event; // okay, can't do anything
|
|
||||||
}
|
|
||||||
_olmSessions[event.content['sender_key']] = sessions;
|
|
||||||
return _decryptToDeviceEvent(event);
|
return _decryptToDeviceEvent(event);
|
||||||
}
|
}
|
||||||
|
|
||||||
Future<void> startOutgoingOlmSessions(List<DeviceKeys> deviceKeys,
|
Future<void> startOutgoingOlmSessions(List<DeviceKeys> deviceKeys) async {
|
||||||
{bool checkSignature = true}) async {
|
|
||||||
var requestingKeysFrom = <String, Map<String, String>>{};
|
var requestingKeysFrom = <String, Map<String, String>>{};
|
||||||
for (var device in deviceKeys) {
|
for (var device in deviceKeys) {
|
||||||
if (requestingKeysFrom[device.userId] == null) {
|
if (requestingKeysFrom[device.userId] == null) {
|
||||||
|
@ -328,9 +344,7 @@ class OlmManager {
|
||||||
final identityKey =
|
final identityKey =
|
||||||
client.userDeviceKeys[userId].deviceKeys[deviceId].curve25519Key;
|
client.userDeviceKeys[userId].deviceKeys[deviceId].curve25519Key;
|
||||||
for (Map<String, dynamic> deviceKey in deviceKeysEntry.value.values) {
|
for (Map<String, dynamic> deviceKey in deviceKeysEntry.value.values) {
|
||||||
if (checkSignature &&
|
if (!checkJsonSignature(fingerprintKey, deviceKey, userId, deviceId)) {
|
||||||
checkJsonSignature(fingerprintKey, deviceKey, userId, deviceId) ==
|
|
||||||
false) {
|
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
|
|
|
@ -1134,6 +1134,9 @@ class Client {
|
||||||
|
|
||||||
for (final rawDeviceKeyListEntry in response.deviceKeys.entries) {
|
for (final rawDeviceKeyListEntry in response.deviceKeys.entries) {
|
||||||
final userId = rawDeviceKeyListEntry.key;
|
final userId = rawDeviceKeyListEntry.key;
|
||||||
|
if (!userDeviceKeys.containsKey(userId)) {
|
||||||
|
_userDeviceKeys[userId] = DeviceKeysList(userId);
|
||||||
|
}
|
||||||
final oldKeys =
|
final oldKeys =
|
||||||
Map<String, DeviceKeys>.from(_userDeviceKeys[userId].deviceKeys);
|
Map<String, DeviceKeys>.from(_userDeviceKeys[userId].deviceKeys);
|
||||||
_userDeviceKeys[userId].deviceKeys = {};
|
_userDeviceKeys[userId].deviceKeys = {};
|
||||||
|
|
|
@ -38,8 +38,9 @@ void main() {
|
||||||
Future<List<EventUpdate>> eventUpdateListFuture;
|
Future<List<EventUpdate>> eventUpdateListFuture;
|
||||||
Future<List<ToDeviceEvent>> toDeviceUpdateListFuture;
|
Future<List<ToDeviceEvent>> toDeviceUpdateListFuture;
|
||||||
|
|
||||||
|
// key @test:fakeServer.notExisting
|
||||||
const pickledOlmAccount =
|
const pickledOlmAccount =
|
||||||
'N2v1MkIFGcl0mQpo2OCwSopxPQJ0wnl7oe7PKiT4141AijfdTIhRu+ceXzXKy3Kr00nLqXtRv7kid6hU4a+V0rfJWLL0Y51+3Rp/ORDVnQy+SSeo6Fn4FHcXrxifJEJ0djla5u98fBcJ8BSkhIDmtXRPi5/oJAvpiYn+8zMjFHobOeZUAxYR0VfQ9JzSYBsSovoQ7uFkNks1M4EDUvHtuweStA+EKZvvHZO0SnwRp0Hw7sv8UMYvXw';
|
'N2v1MkIFGcl0mQpo2OCwSopxPQJ0wnl7oe7PKiT4141AijfdTIhRu+ceXzXKy3Kr00nLqXtRv7kid6hU4a+V0rfJWLL0Y51+3Rp/ORDVnQy+SSeo6Fn4FHcXrxifJEJ0djla5u98fBcJ8BSkhIDmtXRPi5/oJAvpiYn+8zMjFHobOeZUAxYR0VfQ9JzSYBsSovoQ7uFkNks1M4EDUvHtu/BjDjz0C3ioDgrrFdoSrn+GSeF5FGKsNu8OLkQ9Lq5+BrUutK5QSJI19uoZj2sj/OixvIpnun8XxYpXo7cfh9MEtKI8ob7lLM2OpZ8BogU70ORgkwthsPSOtxQGPhx8+y5Sg7B6KGlU';
|
||||||
const identityKey = '7rvl3jORJkBiK4XX1e5TnGnqz068XfYJ0W++Ml63rgk';
|
const identityKey = '7rvl3jORJkBiK4XX1e5TnGnqz068XfYJ0W++Ml63rgk';
|
||||||
const fingerprintKey = 'gjL//fyaFHADt9KBADGag8g7F8Up78B/K1zXeiEPLJo';
|
const fingerprintKey = 'gjL//fyaFHADt9KBADGag8g7F8Up78B/K1zXeiEPLJo';
|
||||||
|
|
||||||
|
|
96
test/encryption/encrypt_decrypt_room_message_test.dart
Normal file
96
test/encryption/encrypt_decrypt_room_message_test.dart
Normal file
|
@ -0,0 +1,96 @@
|
||||||
|
/*
|
||||||
|
* Ansible inventory script used at Famedly GmbH for managing many hosts
|
||||||
|
* Copyright (C) 2020 Famedly GmbH
|
||||||
|
*
|
||||||
|
* This program is free software: you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU Affero General Public License as
|
||||||
|
* published by the Free Software Foundation, either version 3 of the
|
||||||
|
* License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU Affero General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Affero General Public License
|
||||||
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
import 'package:famedlysdk/famedlysdk.dart';
|
||||||
|
import 'package:test/test.dart';
|
||||||
|
import 'package:olm/olm.dart' as olm;
|
||||||
|
|
||||||
|
import '../fake_matrix_api.dart';
|
||||||
|
import '../fake_database.dart';
|
||||||
|
|
||||||
|
void main() {
|
||||||
|
group('Encrypt/Decrypt room message', () {
|
||||||
|
var olmEnabled = true;
|
||||||
|
try {
|
||||||
|
olm.init();
|
||||||
|
olm.Account();
|
||||||
|
} catch (_) {
|
||||||
|
olmEnabled = false;
|
||||||
|
print('[LibOlm] Failed to load LibOlm: ' + _.toString());
|
||||||
|
}
|
||||||
|
print('[LibOlm] Enabled: $olmEnabled');
|
||||||
|
|
||||||
|
if (!olmEnabled) return;
|
||||||
|
|
||||||
|
var client = Client('testclient', debug: true, httpClient: FakeMatrixApi());
|
||||||
|
final roomId = '!726s6s6q:example.com';
|
||||||
|
Room room;
|
||||||
|
Map<String, dynamic> payload;
|
||||||
|
final now = DateTime.now();
|
||||||
|
|
||||||
|
test('setupClient', () async {
|
||||||
|
client.database = getDatabase();
|
||||||
|
await client.checkServer('https://fakeServer.notExisting');
|
||||||
|
await client.login('test', '1234');
|
||||||
|
room = client.getRoomById(roomId);
|
||||||
|
});
|
||||||
|
|
||||||
|
test('encrypt payload', () async {
|
||||||
|
payload = await client.encryption.encryptGroupMessagePayload(roomId, {
|
||||||
|
'msgtype': 'm.text',
|
||||||
|
'text': 'Hello foxies!',
|
||||||
|
});
|
||||||
|
expect(payload['algorithm'], 'm.megolm.v1.aes-sha2');
|
||||||
|
expect(payload['ciphertext'] is String, true);
|
||||||
|
expect(payload['device_id'], client.deviceID);
|
||||||
|
expect(payload['sender_key'], client.identityKey);
|
||||||
|
expect(payload['session_id'] is String, true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test('decrypt payload', () async {
|
||||||
|
final encryptedEvent = Event(
|
||||||
|
type: EventTypes.Encrypted,
|
||||||
|
content: payload,
|
||||||
|
roomId: roomId,
|
||||||
|
room: room,
|
||||||
|
originServerTs: now,
|
||||||
|
eventId: '\$event',
|
||||||
|
);
|
||||||
|
final decryptedEvent = await client.encryption.decryptRoomEvent(roomId, encryptedEvent);
|
||||||
|
expect(decryptedEvent.type, 'm.room.message');
|
||||||
|
expect(decryptedEvent.content['msgtype'], 'm.text');
|
||||||
|
expect(decryptedEvent.content['text'], 'Hello foxies!');
|
||||||
|
});
|
||||||
|
|
||||||
|
test('decrypt payload nocache', () async {
|
||||||
|
client.encryption.keyManager.clearInboundGroupSessions();
|
||||||
|
final encryptedEvent = Event(
|
||||||
|
type: EventTypes.Encrypted,
|
||||||
|
content: payload,
|
||||||
|
roomId: roomId,
|
||||||
|
room: room,
|
||||||
|
originServerTs: now,
|
||||||
|
eventId: '\$event',
|
||||||
|
);
|
||||||
|
final decryptedEvent = await client.encryption.decryptRoomEvent(roomId, encryptedEvent);
|
||||||
|
expect(decryptedEvent.type, 'm.room.message');
|
||||||
|
expect(decryptedEvent.content['msgtype'], 'm.text');
|
||||||
|
expect(decryptedEvent.content['text'], 'Hello foxies!');
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
127
test/encryption/encrypt_decrypt_to_device_test.dart
Normal file
127
test/encryption/encrypt_decrypt_to_device_test.dart
Normal file
|
@ -0,0 +1,127 @@
|
||||||
|
/*
|
||||||
|
* Ansible inventory script used at Famedly GmbH for managing many hosts
|
||||||
|
* Copyright (C) 2020 Famedly GmbH
|
||||||
|
*
|
||||||
|
* This program is free software: you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU Affero General Public License as
|
||||||
|
* published by the Free Software Foundation, either version 3 of the
|
||||||
|
* License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU Affero General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Affero General Public License
|
||||||
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
import 'package:famedlysdk/famedlysdk.dart';
|
||||||
|
import 'package:test/test.dart';
|
||||||
|
import 'package:olm/olm.dart' as olm;
|
||||||
|
|
||||||
|
import '../fake_matrix_api.dart';
|
||||||
|
import '../fake_database.dart';
|
||||||
|
|
||||||
|
void main() {
|
||||||
|
// key @test:fakeServer.notExisting
|
||||||
|
const pickledOlmAccount =
|
||||||
|
'N2v1MkIFGcl0mQpo2OCwSopxPQJ0wnl7oe7PKiT4141AijfdTIhRu+ceXzXKy3Kr00nLqXtRv7kid6hU4a+V0rfJWLL0Y51+3Rp/ORDVnQy+SSeo6Fn4FHcXrxifJEJ0djla5u98fBcJ8BSkhIDmtXRPi5/oJAvpiYn+8zMjFHobOeZUAxYR0VfQ9JzSYBsSovoQ7uFkNks1M4EDUvHtu/BjDjz0C3ioDgrrFdoSrn+GSeF5FGKsNu8OLkQ9Lq5+BrUutK5QSJI19uoZj2sj/OixvIpnun8XxYpXo7cfh9MEtKI8ob7lLM2OpZ8BogU70ORgkwthsPSOtxQGPhx8+y5Sg7B6KGlU';
|
||||||
|
|
||||||
|
const otherPickledOlmAccount = 'VWhVApbkcilKAEGppsPDf9nNVjaK8/IxT3asSR0sYg0S5KgbfE8vXEPwoiKBX2cEvwX3OessOBOkk+ZE7TTbjlrh/KEd31p8Wo+47qj0AP+Ky+pabnhi+/rTBvZy+gfzTqUfCxZrkzfXI9Op4JnP6gYmy7dVX2lMYIIs9WCO1jcmIXiXum5jnfXu1WLfc7PZtO2hH+k9CDKosOFaXRBmsu8k/BGXPSoWqUpvu6WpEG9t5STk4FeAzA';
|
||||||
|
|
||||||
|
group('Encrypt/Decrypt to-device messages', () {
|
||||||
|
var olmEnabled = true;
|
||||||
|
try {
|
||||||
|
olm.init();
|
||||||
|
olm.Account();
|
||||||
|
} catch (_) {
|
||||||
|
olmEnabled = false;
|
||||||
|
print('[LibOlm] Failed to load LibOlm: ' + _.toString());
|
||||||
|
}
|
||||||
|
print('[LibOlm] Enabled: $olmEnabled');
|
||||||
|
|
||||||
|
if (!olmEnabled) return;
|
||||||
|
|
||||||
|
var client = Client('testclient', debug: true, httpClient: FakeMatrixApi());
|
||||||
|
var otherClient = Client('othertestclient', debug: true, httpClient: FakeMatrixApi());
|
||||||
|
final roomId = '!726s6s6q:example.com';
|
||||||
|
DeviceKeys device;
|
||||||
|
Map<String, dynamic> payload;
|
||||||
|
|
||||||
|
test('setupClient', () async {
|
||||||
|
client.database = getDatabase();
|
||||||
|
otherClient.database = client.database;
|
||||||
|
await client.checkServer('https://fakeServer.notExisting');
|
||||||
|
await otherClient.checkServer('https://fakeServer.notExisting');
|
||||||
|
final resp = await client.api.login(
|
||||||
|
type: 'm.login.password',
|
||||||
|
user: 'test',
|
||||||
|
password: '1234',
|
||||||
|
initialDeviceDisplayName: 'Fluffy Matrix Client',
|
||||||
|
);
|
||||||
|
client.connect(
|
||||||
|
newToken: resp.accessToken,
|
||||||
|
newUserID: resp.userId,
|
||||||
|
newHomeserver: client.api.homeserver,
|
||||||
|
newDeviceName: 'Text Matrix Client',
|
||||||
|
newDeviceID: resp.deviceId,
|
||||||
|
newOlmAccount: pickledOlmAccount,
|
||||||
|
);
|
||||||
|
otherClient.connect(
|
||||||
|
newToken: 'abc',
|
||||||
|
newUserID: '@othertest:fakeServer.notExisting',
|
||||||
|
newHomeserver: otherClient.api.homeserver,
|
||||||
|
newDeviceName: 'Text Matrix Client',
|
||||||
|
newDeviceID: 'FOXDEVICE',
|
||||||
|
newOlmAccount: otherPickledOlmAccount,
|
||||||
|
);
|
||||||
|
|
||||||
|
await Future.delayed(Duration(milliseconds: 50));
|
||||||
|
device = DeviceKeys(
|
||||||
|
userId: resp.userId,
|
||||||
|
deviceId: resp.deviceId,
|
||||||
|
algorithms: ['m.olm.v1.curve25519-aes-sha2', 'm.megolm.v1.aes-sha2'],
|
||||||
|
keys: {
|
||||||
|
'curve25519:${resp.deviceId}': client.identityKey,
|
||||||
|
'ed25519:${resp.deviceId}': client.fingerprintKey,
|
||||||
|
},
|
||||||
|
verified: true,
|
||||||
|
blocked: false,
|
||||||
|
);
|
||||||
|
});
|
||||||
|
|
||||||
|
test('encryptToDeviceMessage', () async {
|
||||||
|
payload = await otherClient.encryption.encryptToDeviceMessage([device], 'm.to_device', {'hello': 'foxies'});
|
||||||
|
});
|
||||||
|
|
||||||
|
test('encryptToDeviceMessagePayload', () async {
|
||||||
|
// just a hard test if nothing errors
|
||||||
|
await otherClient.encryption.encryptToDeviceMessagePayload(device, 'm.to_device', {'hello': 'foxies'});
|
||||||
|
});
|
||||||
|
|
||||||
|
test('decryptToDeviceEvent', () async {
|
||||||
|
final encryptedEvent = ToDeviceEvent(
|
||||||
|
sender: '@othertest:fakeServer.notExisting',
|
||||||
|
type: EventTypes.Encrypted,
|
||||||
|
content: payload[client.userID][client.deviceID],
|
||||||
|
);
|
||||||
|
final decryptedEvent = await client.encryption.decryptToDeviceEvent(encryptedEvent);
|
||||||
|
expect(decryptedEvent.type, 'm.to_device');
|
||||||
|
expect(decryptedEvent.content['hello'], 'foxies');
|
||||||
|
});
|
||||||
|
|
||||||
|
test('decryptToDeviceEvent nocache', () async {
|
||||||
|
client.encryption.olmManager.olmSessions.clear();
|
||||||
|
payload = await otherClient.encryption.encryptToDeviceMessage([device], 'm.to_device', {'hello': 'superfoxies'});
|
||||||
|
final encryptedEvent = ToDeviceEvent(
|
||||||
|
sender: '@othertest:fakeServer.notExisting',
|
||||||
|
type: EventTypes.Encrypted,
|
||||||
|
content: payload[client.userID][client.deviceID],
|
||||||
|
);
|
||||||
|
final decryptedEvent = await client.encryption.decryptToDeviceEvent(encryptedEvent);
|
||||||
|
expect(decryptedEvent.type, 'm.to_device');
|
||||||
|
expect(decryptedEvent.content['hello'], 'superfoxies');
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
|
@ -1,6 +1,6 @@
|
||||||
/*
|
/*
|
||||||
* Ansible inventory script used at Famedly GmbH for managing many hosts
|
* Ansible inventory script used at Famedly GmbH for managing many hosts
|
||||||
* Copyright (C) 2019, 2020 Famedly GmbH
|
* Copyright (C) 2020 Famedly GmbH
|
||||||
*
|
*
|
||||||
* This program is free software: you can redistribute it and/or modify
|
* This program is free software: you can redistribute it and/or modify
|
||||||
* it under the terms of the GNU Affero General Public License as
|
* it under the terms of the GNU Affero General Public License as
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
/*
|
/*
|
||||||
* Ansible inventory script used at Famedly GmbH for managing many hosts
|
* Ansible inventory script used at Famedly GmbH for managing many hosts
|
||||||
* Copyright (C) 2019, 2020 Famedly GmbH
|
* Copyright (C) 2020 Famedly GmbH
|
||||||
*
|
*
|
||||||
* This program is free software: you can redistribute it and/or modify
|
* This program is free software: you can redistribute it and/or modify
|
||||||
* it under the terms of the GNU Affero General Public License as
|
* it under the terms of the GNU Affero General Public License as
|
||||||
|
|
|
@ -1569,7 +1569,19 @@ class FakeMatrixApi extends MockClient {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
},
|
||||||
|
'@test:fakeServer.notExisting': {
|
||||||
|
'GHTYAJCE': {
|
||||||
|
'signed_curve25519:AAAAAQ': {
|
||||||
|
'key': 'qc72ve94cA28iuE0fXa98QO3uls39DHWdQlYyvvhGh0',
|
||||||
|
'signatures': {
|
||||||
|
'@test:fakeServer.notExisting': {
|
||||||
|
'ed25519:GHTYAJCE': 'dFwffr5kTKefO7sjnWLMhTzw7oV31nkPIDRxFy5OQT2OP5++Ao0KRbaBZ6qfuT7lW1owKK0Xk3s7QTBvc/eNDA',
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
'/client/r0/rooms/!localpart%3Aexample.com/invite': (var req) => {},
|
'/client/r0/rooms/!localpart%3Aexample.com/invite': (var req) => {},
|
||||||
|
@ -1586,7 +1598,7 @@ class FakeMatrixApi extends MockClient {
|
||||||
'/client/r0/keys/upload': (var req) => {
|
'/client/r0/keys/upload': (var req) => {
|
||||||
'one_time_key_counts': {
|
'one_time_key_counts': {
|
||||||
'curve25519': 10,
|
'curve25519': 10,
|
||||||
'signed_curve25519': 100,
|
'signed_curve25519': 66,
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
'/client/r0/keys/query': (var req) => {
|
'/client/r0/keys/query': (var req) => {
|
||||||
|
@ -1627,8 +1639,40 @@ class FakeMatrixApi extends MockClient {
|
||||||
},
|
},
|
||||||
'signatures': {},
|
'signatures': {},
|
||||||
},
|
},
|
||||||
}
|
},
|
||||||
}
|
'@test:fakeServer.notExisting': {
|
||||||
|
'GHTYAJCE': {
|
||||||
|
'user_id': '@test:fakeServer.notExisting',
|
||||||
|
'device_id': 'GHTYAJCE',
|
||||||
|
'algorithms': [
|
||||||
|
'm.olm.v1.curve25519-aes-sha2',
|
||||||
|
'm.megolm.v1.aes-sha2'
|
||||||
|
],
|
||||||
|
'keys': {
|
||||||
|
'curve25519:GHTYAJCE':
|
||||||
|
'7rvl3jORJkBiK4XX1e5TnGnqz068XfYJ0W++Ml63rgk',
|
||||||
|
'ed25519:GHTYAJCE':
|
||||||
|
'gjL//fyaFHADt9KBADGag8g7F8Up78B/K1zXeiEPLJo'
|
||||||
|
},
|
||||||
|
'signatures': {},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
'@othertest:fakeServer.notExisting': {
|
||||||
|
'FOXDEVICE': {
|
||||||
|
'user_id': '@othertest:fakeServer.notExisting',
|
||||||
|
'device_id': 'FOXDEVICE',
|
||||||
|
'algorithms': [
|
||||||
|
'm.olm.v1.curve25519-aes-sha2',
|
||||||
|
'm.megolm.v1.aes-sha2'
|
||||||
|
],
|
||||||
|
'keys': {
|
||||||
|
'curve25519:FOXDEVICE': 'JBG7ZaPn54OBC7TuIEiylW3BZ+7WcGQhFBPB9pogbAg',
|
||||||
|
'ed25519:FOXDEVICE': 'R5/p04tticvdlNIxiiBIP0j9OQWv8ep6eEU6/lWKDxw',
|
||||||
|
},
|
||||||
|
'signatures': {},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
},
|
},
|
||||||
'/client/r0/register': (var req) => {
|
'/client/r0/register': (var req) => {
|
||||||
'user_id': '@testuser:example.com',
|
'user_id': '@testuser:example.com',
|
||||||
|
|
Loading…
Reference in a new issue