* Remove Deployment.Client and change Deploy - `Deployment.Client` was used to get pre-registered clients. Now we want tests to register new users for each test, for dirty runs. So swap for `Deployment.Register` everywhere. - `Deploy` was used to deploy a blueprint. We don't want this to enable dirty runs. So replace it with the number of servers you need e.g `Deploy(t, 2)`. * Fix up more broken refactoring * unbreak tests; make user localpart look nicer * Alice and bob must share a room for presence * Fix user directory test * Fix race condition caused by making the room later than before
142 lines
5.2 KiB
Go
142 lines
5.2 KiB
Go
package tests
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/tidwall/gjson"
|
|
|
|
"github.com/matrix-org/complement"
|
|
"github.com/matrix-org/complement/client"
|
|
"github.com/matrix-org/complement/helpers"
|
|
"github.com/matrix-org/complement/match"
|
|
"github.com/matrix-org/complement/must"
|
|
)
|
|
|
|
func TestFederationKeyUploadQuery(t *testing.T) {
|
|
deployment := complement.Deploy(t, 2)
|
|
defer deployment.Destroy(t)
|
|
|
|
alice := deployment.Register(t, "hs1", helpers.RegistrationOpts{})
|
|
bob := deployment.Register(t, "hs2", helpers.RegistrationOpts{})
|
|
|
|
// for device lists to be shared between alice and bob they must share a room
|
|
roomID := alice.MustCreateRoom(t, map[string]interface{}{"preset": "public_chat"})
|
|
bob.MustJoinRoom(t, roomID, []string{"hs1"})
|
|
|
|
// Do an initial sync so that we can see the changes come down sync.
|
|
// We wait until we see the newly joined room as that can cause alice to appear in device_lists
|
|
// which we want to ignore for now.
|
|
nextBatchBeforeKeyUpload := bob.MustSyncUntil(t, client.SyncReq{}, client.SyncJoinedTo(bob.UserID, roomID))
|
|
|
|
deviceKeys, oneTimeKeys := alice.MustGenerateOneTimeKeys(t, 1)
|
|
// Upload keys
|
|
reqBody := client.WithJSONBody(t, map[string]interface{}{
|
|
"device_keys": deviceKeys,
|
|
"one_time_keys": oneTimeKeys,
|
|
})
|
|
resp := alice.MustDo(t, "POST", []string{"_matrix", "client", "v3", "keys", "upload"}, reqBody)
|
|
must.MatchResponse(t, resp, match.HTTPResponse{
|
|
StatusCode: http.StatusOK,
|
|
JSON: []match.JSON{
|
|
match.JSONMapEach("one_time_key_counts", func(k, v gjson.Result) error {
|
|
keyCount := 0
|
|
for key := range oneTimeKeys {
|
|
// check that the returned algorithms -> key count matches those we uploaded
|
|
if strings.HasPrefix(key, k.Str) {
|
|
keyCount++
|
|
}
|
|
}
|
|
if int(v.Float()) != keyCount {
|
|
return fmt.Errorf("expected %d one time keys, got %d", keyCount, int(v.Float()))
|
|
}
|
|
return nil
|
|
}),
|
|
},
|
|
})
|
|
|
|
// sytest: Can claim remote one time key using POST
|
|
t.Run("Can claim remote one time key using POST", func(t *testing.T) {
|
|
// check keys on remote server
|
|
reqBody = client.WithJSONBody(t, map[string]interface{}{
|
|
"one_time_keys": map[string]interface{}{
|
|
alice.UserID: map[string]string{
|
|
alice.DeviceID: "signed_curve25519",
|
|
},
|
|
},
|
|
})
|
|
resp = bob.MustDo(t, "POST", []string{"_matrix", "client", "v3", "keys", "claim"}, reqBody)
|
|
otksField := "one_time_keys." + client.GjsonEscape(alice.UserID) + "." + client.GjsonEscape(alice.DeviceID)
|
|
must.MatchResponse(t, resp, match.HTTPResponse{
|
|
StatusCode: http.StatusOK,
|
|
JSON: []match.JSON{
|
|
match.JSONKeyTypeEqual(otksField, gjson.JSON),
|
|
match.JSONKeyEqual(otksField, oneTimeKeys),
|
|
},
|
|
})
|
|
// there should be no OTK left now
|
|
resp = bob.MustDo(t, "POST", []string{"_matrix", "client", "v3", "keys", "claim"}, reqBody)
|
|
must.MatchResponse(t, resp, match.HTTPResponse{
|
|
StatusCode: http.StatusOK,
|
|
JSON: []match.JSON{
|
|
match.JSONKeyMissing("one_time_keys." + client.GjsonEscape(alice.UserID)),
|
|
},
|
|
})
|
|
})
|
|
|
|
// sytest: Can query remote device keys using POST
|
|
t.Run("Can query remote device keys using POST", func(t *testing.T) {
|
|
// We expect the key upload to come down /sync. We need to do this so
|
|
// that can tell the next device update actually triggers the
|
|
// notification to go down /sync.
|
|
nextBatch := bob.MustSyncUntil(t, client.SyncReq{Since: nextBatchBeforeKeyUpload}, func(clientUserID string, topLevelSyncJSON gjson.Result) error {
|
|
devicesChanged := topLevelSyncJSON.Get("device_lists.changed")
|
|
if devicesChanged.Exists() {
|
|
for _, userID := range devicesChanged.Array() {
|
|
if userID.Str == alice.UserID {
|
|
return nil
|
|
}
|
|
}
|
|
}
|
|
return fmt.Errorf("no device_lists found")
|
|
})
|
|
|
|
displayName := "My new displayname"
|
|
body := client.WithJSONBody(t, map[string]interface{}{
|
|
"display_name": displayName,
|
|
})
|
|
alice.MustDo(t, http.MethodPut, []string{"_matrix", "client", "v3", "devices", alice.DeviceID}, body)
|
|
// wait for bob to receive the displayname change
|
|
bob.MustSyncUntil(t, client.SyncReq{Since: nextBatch}, func(clientUserID string, topLevelSyncJSON gjson.Result) error {
|
|
devicesChanged := topLevelSyncJSON.Get("device_lists.changed")
|
|
if devicesChanged.Exists() {
|
|
for _, userID := range devicesChanged.Array() {
|
|
if userID.Str == alice.UserID {
|
|
return nil
|
|
}
|
|
}
|
|
}
|
|
return fmt.Errorf("no device_lists found")
|
|
})
|
|
reqBody = client.WithJSONBody(t, map[string]interface{}{
|
|
"device_keys": map[string]interface{}{
|
|
alice.UserID: []string{},
|
|
},
|
|
})
|
|
resp = bob.MustDo(t, "POST", []string{"_matrix", "client", "v3", "keys", "query"}, reqBody)
|
|
deviceKeysField := "device_keys." + client.GjsonEscape(alice.UserID) + "." + client.GjsonEscape(alice.DeviceID)
|
|
|
|
must.MatchResponse(t, resp, match.HTTPResponse{
|
|
StatusCode: http.StatusOK,
|
|
JSON: []match.JSON{
|
|
match.JSONKeyTypeEqual(deviceKeysField, gjson.JSON),
|
|
match.JSONKeyEqual(deviceKeysField+".algorithms", deviceKeys["algorithms"]),
|
|
match.JSONKeyEqual(deviceKeysField+".keys", deviceKeys["keys"]),
|
|
match.JSONKeyEqual(deviceKeysField+".signatures", deviceKeys["signatures"]),
|
|
match.JSONKeyEqual(deviceKeysField+".unsigned.device_display_name", displayName),
|
|
},
|
|
})
|
|
})
|
|
}
|