2022-05-18 10:42:51 +00:00
|
|
|
package protocol
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/status-im/status-go/multiaccounts/accounts"
|
|
|
|
"github.com/status-im/status-go/protocol/encryption/multidevice"
|
|
|
|
"github.com/status-im/status-go/protocol/tt"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestMessengerSyncWalletSuite(t *testing.T) {
|
|
|
|
suite.Run(t, new(MessengerSyncWalletSuite))
|
|
|
|
}
|
|
|
|
|
|
|
|
type MessengerSyncWalletSuite struct {
|
2023-07-13 10:28:34 +00:00
|
|
|
MessengerBaseTestSuite
|
2022-05-18 10:42:51 +00:00
|
|
|
}
|
|
|
|
|
2023-05-24 14:42:31 +00:00
|
|
|
// user should not be able to change a keypair name directly, it follows display name
|
|
|
|
func (s *MessengerSyncWalletSuite) TestProfileKeypairNameChange() {
|
|
|
|
profileKp := accounts.GetProfileKeypairForTest(true, false, false)
|
|
|
|
profileKp.KeyUID = s.m.account.KeyUID
|
|
|
|
profileKp.Name = s.m.account.Name
|
|
|
|
profileKp.Accounts[0].KeyUID = s.m.account.KeyUID
|
|
|
|
|
|
|
|
// Create a main account on alice
|
|
|
|
err := s.m.settings.SaveOrUpdateKeypair(profileKp)
|
|
|
|
s.Require().NoError(err, "profile keypair alice.settings.SaveOrUpdateKeypair")
|
|
|
|
|
|
|
|
// Check account is present in the db
|
|
|
|
dbProfileKp, err := s.m.settings.GetKeypairByKeyUID(profileKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairs(profileKp, dbProfileKp))
|
|
|
|
|
|
|
|
// Try to change profile keypair name using `SaveOrUpdateKeypair` function
|
|
|
|
profileKp1 := accounts.GetProfileKeypairForTest(true, false, false)
|
|
|
|
profileKp1.Name = profileKp1.Name + "updated"
|
|
|
|
profileKp1.KeyUID = s.m.account.KeyUID
|
|
|
|
profileKp1.Accounts[0].KeyUID = s.m.account.KeyUID
|
|
|
|
|
|
|
|
err = s.m.SaveOrUpdateKeypair(profileKp1)
|
|
|
|
s.Require().Error(err)
|
|
|
|
s.Require().True(err == ErrCannotChangeKeypairName)
|
|
|
|
|
|
|
|
// Check the db
|
|
|
|
dbProfileKp, err = s.m.settings.GetKeypairByKeyUID(profileKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairs(profileKp, dbProfileKp))
|
|
|
|
|
|
|
|
// Try to change profile keypair name using `UpdateKeypairName` function
|
|
|
|
err = s.m.UpdateKeypairName(profileKp1.KeyUID, profileKp1.Name)
|
|
|
|
s.Require().Error(err)
|
|
|
|
s.Require().True(err == ErrCannotChangeKeypairName)
|
|
|
|
|
|
|
|
// Check the db
|
|
|
|
dbProfileKp, err = s.m.settings.GetKeypairByKeyUID(profileKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairs(profileKp, dbProfileKp))
|
|
|
|
}
|
|
|
|
|
2023-04-19 14:44:57 +00:00
|
|
|
func (s *MessengerSyncWalletSuite) TestSyncWallets() {
|
2023-05-24 14:40:40 +00:00
|
|
|
profileKp := accounts.GetProfileKeypairForTest(true, true, true)
|
2023-06-28 19:45:36 +00:00
|
|
|
// set clocks for accounts
|
|
|
|
profileKp.Clock = uint64(len(profileKp.Accounts) - 1)
|
|
|
|
for i, acc := range profileKp.Accounts {
|
|
|
|
acc.Clock = uint64(i)
|
|
|
|
}
|
2022-05-18 10:42:51 +00:00
|
|
|
|
|
|
|
// Create a main account on alice
|
2023-05-16 10:50:04 +00:00
|
|
|
err := s.m.settings.SaveOrUpdateKeypair(profileKp)
|
|
|
|
s.Require().NoError(err, "profile keypair alice.settings.SaveOrUpdateKeypair")
|
2022-05-18 10:42:51 +00:00
|
|
|
|
|
|
|
// Check account is present in the db
|
2023-05-16 10:50:04 +00:00
|
|
|
dbProfileKp1, err := s.m.settings.GetKeypairByKeyUID(profileKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairs(profileKp, dbProfileKp1))
|
2022-05-18 10:42:51 +00:00
|
|
|
|
|
|
|
// Create new device and add main account to
|
|
|
|
alicesOtherDevice, err := newMessengerWithKey(s.shh, s.m.identity, s.logger, nil)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
// Store only chat and default wallet account on other device
|
2023-05-24 14:40:40 +00:00
|
|
|
profileKpOtherDevice := accounts.GetProfileKeypairForTest(true, true, false)
|
2023-05-16 10:50:04 +00:00
|
|
|
err = alicesOtherDevice.settings.SaveOrUpdateKeypair(profileKpOtherDevice)
|
|
|
|
s.Require().NoError(err, "profile keypair alicesOtherDevice.settings.SaveOrUpdateKeypair")
|
2022-05-18 10:42:51 +00:00
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
// Check account is present in the db
|
|
|
|
dbProfileKp2, err := alicesOtherDevice.settings.GetKeypairByKeyUID(profileKpOtherDevice.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairs(profileKpOtherDevice, dbProfileKp2))
|
2022-05-18 10:42:51 +00:00
|
|
|
|
|
|
|
// Pair devices
|
|
|
|
im1 := &multidevice.InstallationMetadata{
|
|
|
|
Name: "alice's-other-device",
|
|
|
|
DeviceType: "alice's-other-device-type",
|
|
|
|
}
|
|
|
|
err = alicesOtherDevice.SetInstallationMetadata(alicesOtherDevice.installationID, im1)
|
|
|
|
s.Require().NoError(err)
|
2023-02-28 12:32:45 +00:00
|
|
|
response, err := alicesOtherDevice.SendPairInstallation(context.Background(), nil)
|
2022-05-18 10:42:51 +00:00
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().NotNil(response)
|
|
|
|
s.Require().Len(response.Chats(), 1)
|
|
|
|
s.Require().False(response.Chats()[0].Active)
|
|
|
|
|
|
|
|
// Wait for the message to reach its destination
|
|
|
|
response, err = WaitOnMessengerResponse(
|
|
|
|
s.m,
|
|
|
|
func(r *MessengerResponse) bool { return len(r.Installations) > 0 },
|
|
|
|
"installation not received",
|
|
|
|
)
|
|
|
|
|
|
|
|
s.Require().NoError(err)
|
|
|
|
actualInstallation := response.Installations[0]
|
|
|
|
s.Require().Equal(alicesOtherDevice.installationID, actualInstallation.ID)
|
|
|
|
s.Require().NotNil(actualInstallation.InstallationMetadata)
|
|
|
|
s.Require().Equal("alice's-other-device", actualInstallation.InstallationMetadata.Name)
|
|
|
|
s.Require().Equal("alice's-other-device-type", actualInstallation.InstallationMetadata.DeviceType)
|
|
|
|
|
|
|
|
err = s.m.EnableInstallation(alicesOtherDevice.installationID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
// Store seed phrase keypair with accounts on alice's device
|
|
|
|
seedPhraseKp := accounts.GetSeedImportedKeypair1ForTest()
|
|
|
|
err = s.m.settings.SaveOrUpdateKeypair(seedPhraseKp)
|
|
|
|
s.Require().NoError(err, "seed phrase keypair alice.settings.SaveOrUpdateKeypair")
|
|
|
|
|
|
|
|
dbSeedPhraseKp1, err := s.m.settings.GetKeypairByKeyUID(seedPhraseKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairs(seedPhraseKp, dbSeedPhraseKp1))
|
|
|
|
|
|
|
|
// Store private key keypair with accounts on alice's device
|
|
|
|
privKeyKp := accounts.GetPrivKeyImportedKeypairForTest()
|
|
|
|
err = s.m.settings.SaveOrUpdateKeypair(privKeyKp)
|
|
|
|
s.Require().NoError(err, "private key keypair alice.settings.SaveOrUpdateKeypair")
|
|
|
|
|
|
|
|
dbPrivKeyKp1, err := s.m.settings.GetKeypairByKeyUID(privKeyKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairs(privKeyKp, dbPrivKeyKp1))
|
|
|
|
|
|
|
|
// Store watch only accounts on alice's device
|
|
|
|
woAccounts := accounts.GetWatchOnlyAccountsForTest()
|
2023-06-28 19:45:36 +00:00
|
|
|
err = s.m.settings.SaveOrUpdateAccounts(woAccounts, false)
|
2023-05-16 10:50:04 +00:00
|
|
|
s.Require().NoError(err)
|
|
|
|
dbWoAccounts1, err := s.m.settings.GetWatchOnlyAccounts()
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(len(woAccounts), len(dbWoAccounts1))
|
|
|
|
s.Require().True(haveSameElements(woAccounts, dbWoAccounts1, accounts.SameAccounts))
|
|
|
|
|
|
|
|
dbAccounts1, err := s.m.settings.GetAccounts()
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(len(profileKp.Accounts)+len(seedPhraseKp.Accounts)+len(privKeyKp.Accounts)+len(woAccounts), len(dbAccounts1))
|
2022-05-18 10:42:51 +00:00
|
|
|
|
|
|
|
// Trigger's a sync between devices
|
2023-01-06 12:21:14 +00:00
|
|
|
err = s.m.SyncDevices(context.Background(), "ens-name", "profile-image", nil)
|
2022-05-18 10:42:51 +00:00
|
|
|
s.Require().NoError(err)
|
|
|
|
|
|
|
|
err = tt.RetryWithBackOff(func() error {
|
2023-04-19 14:44:57 +00:00
|
|
|
response, err := alicesOtherDevice.RetrieveAll()
|
2022-05-18 10:42:51 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
if len(response.Keypairs) != 3 || // 3 keypairs (profile, seed, priv key)
|
2023-06-28 19:45:36 +00:00
|
|
|
len(response.WatchOnlyAccounts) != len(woAccounts) {
|
2022-05-18 10:42:51 +00:00
|
|
|
return errors.New("no sync wallet account received")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
s.Require().NoError(err)
|
|
|
|
|
2023-06-28 19:45:36 +00:00
|
|
|
dbProfileKp2, err = alicesOtherDevice.settings.GetKeypairByKeyUID(profileKp.KeyUID)
|
2023-05-16 10:50:04 +00:00
|
|
|
s.Require().NoError(err)
|
2023-06-28 19:45:36 +00:00
|
|
|
s.Require().True(profileKp.KeyUID == dbProfileKp2.KeyUID &&
|
|
|
|
profileKp.Name == dbProfileKp2.Name &&
|
|
|
|
profileKp.Type == dbProfileKp2.Type &&
|
|
|
|
profileKp.DerivedFrom == dbProfileKp2.DerivedFrom &&
|
|
|
|
profileKp.LastUsedDerivationIndex == dbProfileKp2.LastUsedDerivationIndex &&
|
|
|
|
profileKp.Clock == dbProfileKp2.Clock &&
|
|
|
|
len(profileKp.Accounts) == len(dbProfileKp2.Accounts))
|
|
|
|
// chat and default wallet account should be fully operable, other accounts partially operable
|
|
|
|
for i := range profileKp.Accounts {
|
|
|
|
match := false
|
|
|
|
expectedOperableValue := accounts.AccountPartiallyOperable
|
|
|
|
if profileKp.Accounts[i].Chat || profileKp.Accounts[i].Wallet {
|
|
|
|
expectedOperableValue = accounts.AccountFullyOperable
|
|
|
|
}
|
|
|
|
for j := range dbProfileKp2.Accounts {
|
|
|
|
if accounts.SameAccountsWithDifferentOperable(profileKp.Accounts[i], dbProfileKp2.Accounts[j], expectedOperableValue) {
|
|
|
|
match = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
s.Require().True(match)
|
|
|
|
}
|
2023-04-19 14:44:57 +00:00
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
dbSeedPhraseKp2, err := alicesOtherDevice.settings.GetKeypairByKeyUID(seedPhraseKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairsWithDifferentSyncedFrom(seedPhraseKp, dbSeedPhraseKp2, true, "", accounts.AccountNonOperable))
|
2022-05-18 10:42:51 +00:00
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
dbPrivKeyKp2, err := alicesOtherDevice.settings.GetKeypairByKeyUID(privKeyKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().True(accounts.SameKeypairsWithDifferentSyncedFrom(privKeyKp, dbPrivKeyKp2, true, "", accounts.AccountNonOperable))
|
|
|
|
|
|
|
|
dbWoAccounts2, err := alicesOtherDevice.settings.GetWatchOnlyAccounts()
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(len(woAccounts), len(dbWoAccounts2))
|
|
|
|
s.Require().True(haveSameElements(woAccounts, dbWoAccounts2, accounts.SameAccounts))
|
|
|
|
|
|
|
|
dbAccounts2, err := alicesOtherDevice.settings.GetAccounts()
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(len(profileKp.Accounts)+len(seedPhraseKp.Accounts)+len(privKeyKp.Accounts)+len(woAccounts), len(dbAccounts2))
|
|
|
|
|
|
|
|
s.Require().True(haveSameElements(dbAccounts1, dbAccounts2, accounts.SameAccounts))
|
|
|
|
|
|
|
|
// Update keypair name on alice's primary device
|
2023-05-24 14:40:40 +00:00
|
|
|
profileKpUpdated := accounts.GetProfileKeypairForTest(true, true, false)
|
2023-05-16 10:50:04 +00:00
|
|
|
profileKpUpdated.Name = profileKp.Name + "Updated"
|
|
|
|
profileKpUpdated.Accounts = profileKp.Accounts[:0]
|
|
|
|
err = s.m.SaveOrUpdateKeypair(profileKpUpdated)
|
|
|
|
s.Require().NoError(err, "updated keypair name on alice primary device")
|
2022-05-18 10:42:51 +00:00
|
|
|
|
|
|
|
// Sync between devices is triggered automatically
|
|
|
|
// via watch account changes subscription
|
|
|
|
// Retrieve community link & community
|
|
|
|
err = tt.RetryWithBackOff(func() error {
|
2023-04-19 14:44:57 +00:00
|
|
|
response, err := alicesOtherDevice.RetrieveAll()
|
2022-05-18 10:42:51 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
if len(response.Keypairs) != 1 {
|
2023-06-28 19:45:36 +00:00
|
|
|
return errors.New("no sync keypairs received")
|
2022-05-18 10:42:51 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
s.Require().NoError(err)
|
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
// check on alice's other device
|
|
|
|
dbProfileKp2, err = alicesOtherDevice.settings.GetKeypairByKeyUID(profileKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
s.Require().Equal(profileKpUpdated.Name, dbProfileKp2.Name)
|
|
|
|
|
|
|
|
// Update accounts on alice's primary device
|
2023-05-24 14:40:40 +00:00
|
|
|
profileKpUpdated = accounts.GetProfileKeypairForTest(true, true, true)
|
2023-05-16 10:50:04 +00:00
|
|
|
accountsToUpdate := profileKpUpdated.Accounts[2:]
|
|
|
|
for _, acc := range accountsToUpdate {
|
|
|
|
acc.Name = acc.Name + "Updated"
|
2023-06-02 15:06:51 +00:00
|
|
|
acc.ColorID = acc.ColorID + "Updated"
|
2023-05-16 10:50:04 +00:00
|
|
|
acc.Emoji = acc.Emoji + "Updated"
|
|
|
|
err = s.m.SaveOrUpdateAccount(acc)
|
|
|
|
s.Require().NoError(err, "updated account on alice primary device")
|
|
|
|
}
|
2023-04-19 14:44:57 +00:00
|
|
|
|
2023-05-16 10:50:04 +00:00
|
|
|
err = tt.RetryWithBackOff(func() error {
|
|
|
|
response, err := alicesOtherDevice.RetrieveAll()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2023-04-19 14:44:57 +00:00
|
|
|
}
|
2023-05-16 10:50:04 +00:00
|
|
|
|
2023-06-28 19:45:36 +00:00
|
|
|
if len(response.Keypairs) != 2 {
|
|
|
|
return errors.New("no sync keypairs received")
|
2022-05-18 10:42:51 +00:00
|
|
|
}
|
2023-05-16 10:50:04 +00:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
s.Require().NoError(err)
|
|
|
|
|
|
|
|
// check on alice's other device
|
|
|
|
dbProfileKp2, err = alicesOtherDevice.settings.GetKeypairByKeyUID(profileKp.KeyUID)
|
|
|
|
s.Require().NoError(err)
|
|
|
|
for _, acc := range accountsToUpdate {
|
|
|
|
s.Require().True(contains(dbProfileKp2.Accounts, acc, accounts.SameAccounts))
|
2022-05-18 10:42:51 +00:00
|
|
|
}
|
|
|
|
}
|