You've already forked matrix-js-sdk
mirror of
https://github.com/matrix-org/matrix-js-sdk.git
synced 2025-08-09 10:22:46 +03:00
* matrix-mock-request to 2.0.0
Signed-off-by: Kerry Archibald <kerrya@element.io>
* track and destroy timeouts from test client
Signed-off-by: Kerry Archibald <kerrya@element.io>
* remove debug
Signed-off-by: Kerry Archibald <kerrya@element.io>
* fix bad property refernce caught by ts TestClient
Signed-off-by: Kerry Archibald <kerrya@element.io>
* Revert "fix bad property refernce caught by ts TestClient"
This reverts commit 92c9f6cb13
.
* update yarn lock
Signed-off-by: Kerry Archibald <kerrya@element.io>
* correct IUploadKeysRequest type
* fix types in TestClient for typed matrix-mock-request
Signed-off-by: Kerry Archibald <kerrya@element.io>
* update to matrix-mock-request 2.0.1
Signed-off-by: Kerry Archibald <kerrya@element.io>
87 lines
2.9 KiB
JavaScript
87 lines
2.9 KiB
JavaScript
/*
|
|
Copyright 2019 New Vector Ltd
|
|
Copyright 2019 The Matrix.org Foundation C.I.C.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
import "../../../olm-loader";
|
|
import { verificationMethods } from "../../../../src/crypto";
|
|
import { logger } from "../../../../src/logger";
|
|
import { SAS } from "../../../../src/crypto/verification/SAS";
|
|
import { makeTestClients, setupWebcrypto, teardownWebcrypto } from './util';
|
|
|
|
const Olm = global.Olm;
|
|
|
|
jest.useFakeTimers();
|
|
|
|
describe("verification request integration tests with crypto layer", function() {
|
|
if (!global.Olm) {
|
|
logger.warn('Not running device verification unit tests: libolm not present');
|
|
return;
|
|
}
|
|
|
|
beforeAll(function() {
|
|
setupWebcrypto();
|
|
return Olm.init();
|
|
});
|
|
|
|
afterAll(() => {
|
|
teardownWebcrypto();
|
|
});
|
|
|
|
it("should request and accept a verification", async function() {
|
|
const [[alice, bob], clearTestClientTimeouts] = await makeTestClients(
|
|
[
|
|
{ userId: "@alice:example.com", deviceId: "Osborne2" },
|
|
{ userId: "@bob:example.com", deviceId: "Dynabook" },
|
|
],
|
|
{
|
|
verificationMethods: [verificationMethods.SAS],
|
|
},
|
|
);
|
|
alice.client.crypto.deviceList.getRawStoredDevicesForUser = function() {
|
|
return {
|
|
Dynabook: {
|
|
keys: {
|
|
"ed25519:Dynabook": "bob+base64+ed25519+key",
|
|
},
|
|
},
|
|
};
|
|
};
|
|
alice.client.downloadKeys = () => {
|
|
return Promise.resolve();
|
|
};
|
|
bob.client.downloadKeys = () => {
|
|
return Promise.resolve();
|
|
};
|
|
bob.client.on("crypto.verification.request", (request) => {
|
|
const bobVerifier = request.beginKeyVerification(verificationMethods.SAS);
|
|
bobVerifier.verify();
|
|
|
|
// XXX: Private function access (but it's a test, so we're okay)
|
|
bobVerifier.endTimer();
|
|
});
|
|
const aliceRequest = await alice.client.requestVerification("@bob:example.com");
|
|
await aliceRequest.waitFor(r => r.started);
|
|
const aliceVerifier = aliceRequest.verifier;
|
|
expect(aliceVerifier).toBeInstanceOf(SAS);
|
|
|
|
// XXX: Private function access (but it's a test, so we're okay)
|
|
aliceVerifier.endTimer();
|
|
|
|
alice.stop();
|
|
bob.stop();
|
|
clearTestClientTimeouts();
|
|
});
|
|
});
|