2023-01-06 12:21:14 +00:00
package pairing
import (
"context"
"encoding/json"
2024-02-19 18:00:44 +00:00
"errors"
2023-08-18 08:51:16 +00:00
"fmt"
"os"
2023-01-06 12:21:14 +00:00
"path/filepath"
2024-02-17 18:07:20 +00:00
"reflect"
2023-08-18 08:51:16 +00:00
"strings"
2023-01-06 12:21:14 +00:00
"testing"
2023-05-12 08:31:34 +00:00
"time"
2023-04-19 22:59:09 +00:00
2023-07-12 09:46:56 +00:00
"go.uber.org/zap"
2023-10-02 09:28:42 +00:00
"github.com/status-im/status-go/common/dbsetup"
2023-07-12 09:46:56 +00:00
"github.com/status-im/status-go/eth-node/crypto"
2024-02-17 18:07:20 +00:00
"github.com/status-im/status-go/protocol"
2024-02-19 18:00:44 +00:00
"github.com/status-im/status-go/protocol/encryption/multidevice"
2023-07-12 09:46:56 +00:00
"github.com/status-im/status-go/protocol/tt"
2023-01-06 12:21:14 +00:00
"github.com/google/uuid"
"github.com/stretchr/testify/require"
"github.com/stretchr/testify/suite"
"github.com/status-im/status-go/account/generator"
"github.com/status-im/status-go/api"
"github.com/status-im/status-go/eth-node/types"
"github.com/status-im/status-go/multiaccounts"
"github.com/status-im/status-go/multiaccounts/accounts"
"github.com/status-im/status-go/multiaccounts/settings"
"github.com/status-im/status-go/params"
2023-05-12 08:31:34 +00:00
"github.com/status-im/status-go/protocol/common"
2023-01-06 12:21:14 +00:00
"github.com/status-im/status-go/protocol/identity/alias"
2023-05-12 08:31:34 +00:00
"github.com/status-im/status-go/protocol/protobuf"
"github.com/status-im/status-go/protocol/requests"
2023-08-18 08:51:16 +00:00
accservice "github.com/status-im/status-go/services/accounts"
2023-01-06 12:21:14 +00:00
"github.com/status-im/status-go/services/browsers"
)
2023-03-23 11:44:15 +00:00
const (
2024-02-19 18:00:44 +00:00
pathWalletRoot = "m/44'/60'/0'/0"
pathEIP1581 = "m/43'/60'/1581'"
pathDefaultChat = pathEIP1581 + "/0'/0"
pathDefaultWallet = pathWalletRoot + "/0"
currentNetwork = "mainnet_rpc"
socialLinkURL = "https://github.com/status-im"
ensUsername = "bob.stateofus.eth"
ensChainID = 1
publicChatID = "localpairtest"
profileKeypairMnemonic = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon"
seedKeypairMnemonic = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about"
profileKeypairMnemonic1 = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about about"
seedKeypairMnemonic1 = "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about abandon"
path0 = "m/44'/60'/0'/0/0"
path1 = "m/44'/60'/0'/0/1"
expectedKDFIterations = 1024
2023-03-23 11:44:15 +00:00
)
2023-01-06 12:21:14 +00:00
var paths = [ ] string { pathWalletRoot , pathEIP1581 , pathDefaultChat , pathDefaultWallet }
func TestSyncDeviceSuite ( t * testing . T ) {
suite . Run ( t , new ( SyncDeviceSuite ) )
}
type SyncDeviceSuite struct {
suite . Suite
2024-03-26 13:47:12 +00:00
logger * zap . Logger
password string
tmpdir string
2023-01-06 12:21:14 +00:00
}
func ( s * SyncDeviceSuite ) SetupTest ( ) {
2023-07-12 09:46:56 +00:00
s . logger = tt . MustCreateTestLogger ( )
2023-01-06 12:21:14 +00:00
s . password = "password"
2024-03-26 13:47:12 +00:00
s . tmpdir = s . T ( ) . TempDir ( )
2023-01-06 12:21:14 +00:00
}
2023-08-18 08:51:16 +00:00
func ( s * SyncDeviceSuite ) prepareBackendWithAccount ( mnemonic , tmpdir string ) * api . GethStatusBackend {
2023-01-06 12:21:14 +00:00
backend := s . prepareBackendWithoutAccount ( tmpdir )
accountManager := backend . AccountManager ( )
2023-08-18 08:51:16 +00:00
accGenerator := accountManager . AccountsGenerator ( )
var (
generatedAccountInfo generator . GeneratedAndDerivedAccountInfo
err error
)
if len ( mnemonic ) > 0 {
generatedAccountInfo . GeneratedAccountInfo , err = accGenerator . ImportMnemonic ( mnemonic , "" )
require . NoError ( s . T ( ) , err )
generatedAccountInfo . Derived , err = accGenerator . DeriveAddresses ( generatedAccountInfo . ID , paths )
require . NoError ( s . T ( ) , err )
} else {
generatedAccountInfos , err := accGenerator . GenerateAndDeriveAddresses ( 12 , 1 , "" , paths )
require . NoError ( s . T ( ) , err )
generatedAccountInfo = generatedAccountInfos [ 0 ]
}
2023-01-06 12:21:14 +00:00
account := multiaccounts . Account {
KeyUID : generatedAccountInfo . KeyUID ,
2023-10-02 09:28:42 +00:00
KDFIterations : dbsetup . ReducedKDFIterationsNumber ,
2023-01-06 12:21:14 +00:00
}
err = accountManager . InitKeystore ( filepath . Join ( tmpdir , keystoreDir , account . KeyUID ) )
require . NoError ( s . T ( ) , err )
err = backend . OpenAccounts ( )
require . NoError ( s . T ( ) , err )
derivedAddresses := generatedAccountInfo . Derived
2023-08-18 08:51:16 +00:00
_ , err = accGenerator . StoreDerivedAccounts ( generatedAccountInfo . ID , s . password , paths )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
settings , err := defaultSettings ( generatedAccountInfo . GeneratedAccountInfo , derivedAddresses , nil )
require . NoError ( s . T ( ) , err )
2023-01-12 03:00:24 +00:00
account . Name = settings . Name
2024-04-22 12:33:23 +00:00
nodeConfig , err := nodeConfigForLocalPairSync ( settings . InstallationID , account . KeyUID , tmpdir )
2024-04-26 14:11:49 +00:00
nodeConfig . RootDataDir = tmpdir
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
2024-04-26 14:11:49 +00:00
require . NoError ( s . T ( ) , setDefaultNodeConfig ( nodeConfig ) )
2023-01-06 12:21:14 +00:00
walletDerivedAccount := derivedAddresses [ pathDefaultWallet ]
walletAccount := & accounts . Account {
PublicKey : types . Hex2Bytes ( walletDerivedAccount . PublicKey ) ,
KeyUID : generatedAccountInfo . KeyUID ,
Address : types . HexToAddress ( walletDerivedAccount . Address ) ,
2023-06-02 15:06:51 +00:00
ColorID : "" ,
2023-01-06 12:21:14 +00:00
Wallet : true ,
Path : pathDefaultWallet ,
Name : "Ethereum account" ,
}
chatDerivedAccount := derivedAddresses [ pathDefaultChat ]
chatAccount := & accounts . Account {
PublicKey : types . Hex2Bytes ( chatDerivedAccount . PublicKey ) ,
KeyUID : generatedAccountInfo . KeyUID ,
Address : types . HexToAddress ( chatDerivedAccount . Address ) ,
Name : settings . Name ,
Chat : true ,
Path : pathDefaultChat ,
}
accounts := [ ] * accounts . Account { walletAccount , chatAccount }
2024-06-26 11:14:27 +00:00
err = backend . StartNodeWithAccountAndInitialConfig ( account , s . password , * settings , nodeConfig , accounts , nil )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
2023-05-18 06:27:16 +00:00
multiaccounts , err := backend . GetAccounts ( )
require . NoError ( s . T ( ) , err )
require . NotEmpty ( s . T ( ) , multiaccounts [ 0 ] . ColorHash )
2023-02-28 12:32:45 +00:00
2023-01-06 12:21:14 +00:00
return backend
}
func ( s * SyncDeviceSuite ) prepareBackendWithoutAccount ( tmpdir string ) * api . GethStatusBackend {
backend := api . NewGethStatusBackend ( )
backend . UpdateRootDataDir ( tmpdir )
return backend
}
2023-07-12 09:46:56 +00:00
func ( s * SyncDeviceSuite ) pairAccounts ( serverBackend * api . GethStatusBackend , serverDir string ,
clientBackend * api . GethStatusBackend , clientDir string ) {
// Start sender server
serverActiveAccount , err := serverBackend . GetActiveAccount ( )
require . NoError ( s . T ( ) , err )
serverKeystorePath := filepath . Join ( serverDir , keystoreDir , serverActiveAccount . KeyUID )
serverConfig := & SenderServerConfig {
SenderConfig : & SenderConfig {
KeystorePath : serverKeystorePath ,
DeviceType : "desktop" ,
KeyUID : serverActiveAccount . KeyUID ,
Password : s . password ,
} ,
ServerConfig : new ( ServerConfig ) ,
}
configBytes , err := json . Marshal ( serverConfig )
require . NoError ( s . T ( ) , err )
connectionString , err := StartUpSenderServer ( serverBackend , string ( configBytes ) )
require . NoError ( s . T ( ) , err )
// Start receiving client
err = clientBackend . AccountManager ( ) . InitKeystore ( filepath . Join ( clientDir , keystoreDir ) )
require . NoError ( s . T ( ) , err )
err = clientBackend . OpenAccounts ( )
require . NoError ( s . T ( ) , err )
2024-04-22 12:33:23 +00:00
clientNodeConfig , err := nodeConfigForLocalPairSync ( uuid . New ( ) . String ( ) , "" , clientDir )
2023-07-12 09:46:56 +00:00
require . NoError ( s . T ( ) , err )
clientKeystoreDir := filepath . Join ( clientDir , keystoreDir )
clientPayloadSourceConfig := ReceiverClientConfig {
ReceiverConfig : & ReceiverConfig {
KeystorePath : clientKeystoreDir ,
DeviceType : "desktop" ,
KDFIterations : expectedKDFIterations ,
NodeConfig : clientNodeConfig ,
SettingCurrentNetwork : currentNetwork ,
} ,
ClientConfig : new ( ClientConfig ) ,
}
clientNodeConfig . RootDataDir = clientDir
clientConfigBytes , err := json . Marshal ( clientPayloadSourceConfig )
require . NoError ( s . T ( ) , err )
err = StartUpReceivingClient ( clientBackend , connectionString , string ( clientConfigBytes ) )
require . NoError ( s . T ( ) , err )
require . True ( s . T ( ) , serverBackend . Messenger ( ) . HasPairedDevices ( ) )
require . True ( s . T ( ) , clientBackend . Messenger ( ) . HasPairedDevices ( ) )
}
func ( s * SyncDeviceSuite ) sendContactRequest ( request * requests . SendContactRequest , messenger * protocol . Messenger ) {
senderPublicKey := common . PubkeyToHex ( messenger . IdentityPublicKey ( ) )
s . logger . Info ( "sendContactRequest" , zap . String ( "sender" , senderPublicKey ) , zap . String ( "receiver" , request . ID ) )
resp , err := messenger . SendContactRequest ( context . Background ( ) , request )
s . Require ( ) . NoError ( err )
s . Require ( ) . NotNil ( resp )
}
func ( s * SyncDeviceSuite ) receiveContactRequest ( messageText string , messenger * protocol . Messenger ) * common . Message {
receiverPublicKey := types . EncodeHex ( crypto . FromECDSAPub ( messenger . IdentityPublicKey ( ) ) )
s . logger . Info ( "receiveContactRequest" , zap . String ( "receiver" , receiverPublicKey ) )
// Wait for the message to reach its destination
resp , err := protocol . WaitOnMessengerResponse (
messenger ,
func ( r * protocol . MessengerResponse ) bool {
return len ( r . Contacts ) == 1 && len ( r . Messages ( ) ) == 2 && len ( r . ActivityCenterNotifications ( ) ) == 1
} ,
"no messages" ,
)
s . Require ( ) . NoError ( err )
s . Require ( ) . NotNil ( resp )
contactRequest := protocol . FindFirstByContentType ( resp . Messages ( ) , protobuf . ChatMessage_CONTACT_REQUEST )
s . Require ( ) . NotNil ( contactRequest )
return contactRequest
}
func ( s * SyncDeviceSuite ) acceptContactRequest ( contactRequest * common . Message , sender * protocol . Messenger , receiver * protocol . Messenger ) {
senderPublicKey := types . EncodeHex ( crypto . FromECDSAPub ( sender . IdentityPublicKey ( ) ) )
receiverPublicKey := types . EncodeHex ( crypto . FromECDSAPub ( receiver . IdentityPublicKey ( ) ) )
s . logger . Info ( "acceptContactRequest" , zap . String ( "sender" , senderPublicKey ) , zap . String ( "receiver" , receiverPublicKey ) )
_ , err := receiver . AcceptContactRequest ( context . Background ( ) , & requests . AcceptContactRequest { ID : types . Hex2Bytes ( contactRequest . ID ) } )
s . Require ( ) . NoError ( err )
// Wait for the message to reach its destination
resp , err := protocol . WaitOnMessengerResponse (
sender ,
func ( r * protocol . MessengerResponse ) bool {
return len ( r . Contacts ) == 1 && len ( r . Messages ( ) ) == 2 && len ( r . ActivityCenterNotifications ( ) ) == 1
} ,
"no messages" ,
)
s . Require ( ) . NoError ( err )
s . Require ( ) . NotNil ( resp )
}
func ( s * SyncDeviceSuite ) checkMutualContact ( backend * api . GethStatusBackend , contactPublicKey string ) {
messenger := backend . Messenger ( )
contacts := messenger . MutualContacts ( )
s . Require ( ) . Len ( contacts , 1 )
contact := contacts [ 0 ]
s . Require ( ) . Equal ( contactPublicKey , contact . ID )
s . Require ( ) . Equal ( protocol . ContactRequestStateSent , contact . ContactRequestLocalState )
s . Require ( ) . Equal ( protocol . ContactRequestStateReceived , contact . ContactRequestRemoteState )
s . Require ( ) . NotNil ( contact . DisplayName )
}
2023-01-06 12:21:14 +00:00
func ( s * SyncDeviceSuite ) TestPairingSyncDeviceClientAsSender ( ) {
2024-03-26 13:47:12 +00:00
clientTmpDir := filepath . Join ( s . tmpdir , "client" )
2023-08-18 08:51:16 +00:00
clientBackend := s . prepareBackendWithAccount ( "" , clientTmpDir )
2024-03-26 13:47:12 +00:00
serverTmpDir := filepath . Join ( s . tmpdir , "server" )
2023-01-06 12:21:14 +00:00
serverBackend := s . prepareBackendWithoutAccount ( serverTmpDir )
defer func ( ) {
require . NoError ( s . T ( ) , serverBackend . Logout ( ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , clientBackend . Logout ( ) )
2023-01-06 12:21:14 +00:00
} ( )
2023-05-12 08:31:34 +00:00
ctx := context . TODO ( )
2023-01-06 12:21:14 +00:00
err := serverBackend . AccountManager ( ) . InitKeystore ( filepath . Join ( serverTmpDir , keystoreDir ) )
require . NoError ( s . T ( ) , err )
err = serverBackend . OpenAccounts ( )
require . NoError ( s . T ( ) , err )
2024-04-22 12:33:23 +00:00
serverNodeConfig , err := nodeConfigForLocalPairSync ( uuid . New ( ) . String ( ) , "" , serverTmpDir )
2023-02-17 13:02:42 +00:00
require . NoError ( s . T ( ) , err )
serverKeystoreDir := filepath . Join ( serverTmpDir , keystoreDir )
2023-03-23 11:44:15 +00:00
serverPayloadSourceConfig := & ReceiverServerConfig {
ReceiverConfig : & ReceiverConfig {
2023-02-17 13:02:42 +00:00
NodeConfig : serverNodeConfig ,
2023-03-23 11:44:15 +00:00
KeystorePath : serverKeystoreDir ,
DeviceType : "desktop" ,
KDFIterations : expectedKDFIterations ,
2023-02-17 13:02:42 +00:00
SettingCurrentNetwork : currentNetwork ,
} ,
2023-03-23 11:44:15 +00:00
ServerConfig : new ( ServerConfig ) ,
2023-02-17 13:02:42 +00:00
}
2023-03-23 11:44:15 +00:00
serverNodeConfig . RootDataDir = serverTmpDir
2023-02-17 13:02:42 +00:00
serverConfigBytes , err := json . Marshal ( serverPayloadSourceConfig )
require . NoError ( s . T ( ) , err )
2023-03-21 13:08:28 +00:00
cs , err := StartUpReceiverServer ( serverBackend , string ( serverConfigBytes ) )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
// generate some data for the client
2023-05-12 08:31:34 +00:00
// generate bookmark
2023-01-06 12:21:14 +00:00
clientBrowserAPI := clientBackend . StatusNode ( ) . BrowserService ( ) . APIs ( ) [ 0 ] . Service . ( * browsers . API )
2023-05-12 08:31:34 +00:00
_ , err = clientBrowserAPI . StoreBookmark ( ctx , browsers . Bookmark {
2023-01-06 12:21:14 +00:00
Name : "status.im" ,
URL : "https://status.im" ,
} )
require . NoError ( s . T ( ) , err )
2024-05-24 08:35:34 +00:00
2023-05-12 08:31:34 +00:00
// generate ens username
err = clientBackend . StatusNode ( ) . EnsService ( ) . API ( ) . Add ( ctx , ensChainID , ensUsername )
2023-04-26 15:37:18 +00:00
require . NoError ( s . T ( ) , err )
2024-02-17 18:07:20 +00:00
// generate profile showcase preferences
2024-02-22 08:08:58 +00:00
profileShowcasePreferences := protocol . DummyProfileShowcasePreferences ( false )
2024-02-17 18:07:20 +00:00
err = clientBackend . Messenger ( ) . SetProfileShowcasePreferences ( profileShowcasePreferences , false )
require . NoError ( s . T ( ) , err )
// startup sending client
2023-01-12 03:00:24 +00:00
clientActiveAccount , err := clientBackend . GetActiveAccount ( )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
2023-01-12 03:00:24 +00:00
clientKeystorePath := filepath . Join ( clientTmpDir , keystoreDir , clientActiveAccount . KeyUID )
2023-03-23 11:44:15 +00:00
clientPayloadSourceConfig := SenderClientConfig {
SenderConfig : & SenderConfig {
KeystorePath : clientKeystorePath ,
DeviceType : "android" ,
KeyUID : clientActiveAccount . KeyUID ,
Password : s . password ,
2023-02-17 13:02:42 +00:00
} ,
2023-03-23 11:44:15 +00:00
ClientConfig : new ( ClientConfig ) ,
2023-01-06 12:21:14 +00:00
}
2023-02-17 13:02:42 +00:00
clientConfigBytes , err := json . Marshal ( clientPayloadSourceConfig )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
2023-03-23 11:44:15 +00:00
err = StartUpSendingClient ( clientBackend , cs , string ( clientConfigBytes ) )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
2023-04-19 22:59:09 +00:00
// check that the server has the same data as the client
2023-01-06 12:21:14 +00:00
serverBrowserAPI := serverBackend . StatusNode ( ) . BrowserService ( ) . APIs ( ) [ 0 ] . Service . ( * browsers . API )
2024-05-24 08:35:34 +00:00
2023-05-12 08:31:34 +00:00
bookmarks , err := serverBrowserAPI . GetBookmarks ( ctx )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , 1 , len ( bookmarks ) )
require . Equal ( s . T ( ) , "status.im" , bookmarks [ 0 ] . Name )
2024-05-24 08:35:34 +00:00
2023-05-12 08:31:34 +00:00
uds , err := serverBackend . StatusNode ( ) . EnsService ( ) . API ( ) . GetEnsUsernames ( ctx )
2023-04-26 15:37:18 +00:00
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , 1 , len ( uds ) )
require . Equal ( s . T ( ) , ensUsername , uds [ 0 ] . Username )
require . Equal ( s . T ( ) , uint64 ( ensChainID ) , uds [ 0 ] . ChainID )
require . False ( s . T ( ) , uds [ 0 ] . Removed )
require . Greater ( s . T ( ) , uds [ 0 ] . Clock , uint64 ( 0 ) )
2024-05-24 08:35:34 +00:00
2024-02-17 18:07:20 +00:00
serverProfileShowcasePreferences , err := serverBackend . Messenger ( ) . GetProfileShowcasePreferences ( )
require . NoError ( s . T ( ) , err )
require . True ( s . T ( ) , reflect . DeepEqual ( profileShowcasePreferences , serverProfileShowcasePreferences ) )
2023-01-12 03:00:24 +00:00
serverActiveAccount , err := serverBackend . GetActiveAccount ( )
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , serverActiveAccount . Name , clientActiveAccount . Name )
2023-02-17 13:02:42 +00:00
require . Equal ( s . T ( ) , serverActiveAccount . KDFIterations , expectedKDFIterations )
2023-02-28 12:32:45 +00:00
serverMessenger := serverBackend . Messenger ( )
clientMessenger := clientBackend . Messenger ( )
require . True ( s . T ( ) , serverMessenger . HasPairedDevices ( ) )
require . True ( s . T ( ) , clientMessenger . HasPairedDevices ( ) )
err = clientMessenger . DisableInstallation ( serverNodeConfig . ShhextConfig . InstallationID )
require . NoError ( s . T ( ) , err )
require . False ( s . T ( ) , clientMessenger . HasPairedDevices ( ) )
2024-05-24 08:35:34 +00:00
2023-02-28 12:32:45 +00:00
clientNodeConfig , err := clientBackend . GetNodeConfig ( )
require . NoError ( s . T ( ) , err )
err = serverMessenger . DisableInstallation ( clientNodeConfig . ShhextConfig . InstallationID )
require . NoError ( s . T ( ) , err )
require . False ( s . T ( ) , serverMessenger . HasPairedDevices ( ) )
// repeat local pairing, we should expect no error after receiver logged in
2023-03-21 13:08:28 +00:00
cs , err = StartUpReceiverServer ( serverBackend , string ( serverConfigBytes ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , err )
2023-03-23 11:44:15 +00:00
err = StartUpSendingClient ( clientBackend , cs , string ( clientConfigBytes ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , err )
require . True ( s . T ( ) , clientMessenger . HasPairedDevices ( ) )
require . True ( s . T ( ) , serverMessenger . HasPairedDevices ( ) )
// test if it's okay when account already exist but not logged in
require . NoError ( s . T ( ) , serverBackend . Logout ( ) )
2023-03-21 13:08:28 +00:00
cs , err = StartUpReceiverServer ( serverBackend , string ( serverConfigBytes ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , err )
2023-03-23 11:44:15 +00:00
err = StartUpSendingClient ( clientBackend , cs , string ( clientConfigBytes ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , err )
2023-01-06 12:21:14 +00:00
}
func ( s * SyncDeviceSuite ) TestPairingSyncDeviceClientAsReceiver ( ) {
2024-03-26 13:47:12 +00:00
clientTmpDir := filepath . Join ( s . tmpdir , "client" )
2023-01-06 12:21:14 +00:00
clientBackend := s . prepareBackendWithoutAccount ( clientTmpDir )
2023-05-12 08:31:34 +00:00
ctx := context . TODO ( )
2023-01-06 12:21:14 +00:00
2024-03-26 13:47:12 +00:00
serverTmpDir := filepath . Join ( s . tmpdir , "server" )
2023-08-18 08:51:16 +00:00
serverBackend := s . prepareBackendWithAccount ( "" , serverTmpDir )
2023-01-06 12:21:14 +00:00
defer func ( ) {
require . NoError ( s . T ( ) , clientBackend . Logout ( ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , serverBackend . Logout ( ) )
2023-01-06 12:21:14 +00:00
} ( )
2023-01-12 03:00:24 +00:00
serverActiveAccount , err := serverBackend . GetActiveAccount ( )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
2023-01-12 03:00:24 +00:00
serverKeystorePath := filepath . Join ( serverTmpDir , keystoreDir , serverActiveAccount . KeyUID )
2023-03-23 11:44:15 +00:00
var config = & SenderServerConfig {
SenderConfig : & SenderConfig {
KeystorePath : serverKeystorePath ,
DeviceType : "desktop" ,
KeyUID : serverActiveAccount . KeyUID ,
Password : s . password ,
2023-02-17 13:02:42 +00:00
} ,
2023-03-23 11:44:15 +00:00
ServerConfig : new ( ServerConfig ) ,
2023-01-06 12:21:14 +00:00
}
configBytes , err := json . Marshal ( config )
require . NoError ( s . T ( ) , err )
2023-03-21 13:08:28 +00:00
cs , err := StartUpSenderServer ( serverBackend , string ( configBytes ) )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
// generate some data for the server
2023-05-12 08:31:34 +00:00
// generate bookmark
2023-01-06 12:21:14 +00:00
serverBrowserAPI := serverBackend . StatusNode ( ) . BrowserService ( ) . APIs ( ) [ 0 ] . Service . ( * browsers . API )
2023-05-12 08:31:34 +00:00
_ , err = serverBrowserAPI . StoreBookmark ( ctx , browsers . Bookmark {
2023-01-06 12:21:14 +00:00
Name : "status.im" ,
URL : "https://status.im" ,
} )
require . NoError ( s . T ( ) , err )
2023-05-12 08:31:34 +00:00
serverMessenger := serverBackend . Messenger ( )
2024-05-24 08:35:34 +00:00
2023-05-12 08:31:34 +00:00
// generate ens username
err = serverBackend . StatusNode ( ) . EnsService ( ) . API ( ) . Add ( ctx , ensChainID , ensUsername )
require . NoError ( s . T ( ) , err )
2024-02-26 13:53:40 +00:00
// generate profile showcase preferences
profileShowcasePreferences := protocol . DummyProfileShowcasePreferences ( false )
err = serverMessenger . SetProfileShowcasePreferences ( profileShowcasePreferences , false )
require . NoError ( s . T ( ) , err )
2023-05-12 08:31:34 +00:00
// generate local deleted message
_ , err = serverMessenger . CreatePublicChat ( & requests . CreatePublicChat { ID : publicChatID } )
require . NoError ( s . T ( ) , err )
serverChat := serverMessenger . Chat ( publicChatID )
serverMessage := buildTestMessage ( serverChat )
serverMessengerResponse , err := serverMessenger . SendChatMessage ( ctx , serverMessage )
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , 1 , len ( serverMessengerResponse . Messages ( ) ) )
serverMessageID := serverMessengerResponse . Messages ( ) [ 0 ] . ID
_ , err = serverMessenger . DeleteMessageForMeAndSync ( ctx , publicChatID , serverMessageID )
2023-04-26 15:37:18 +00:00
require . NoError ( s . T ( ) , err )
2023-01-06 12:21:14 +00:00
err = clientBackend . AccountManager ( ) . InitKeystore ( filepath . Join ( clientTmpDir , keystoreDir ) )
require . NoError ( s . T ( ) , err )
err = clientBackend . OpenAccounts ( )
require . NoError ( s . T ( ) , err )
2024-04-22 12:33:23 +00:00
clientNodeConfig , err := nodeConfigForLocalPairSync ( uuid . New ( ) . String ( ) , "" , clientTmpDir )
2023-02-17 13:02:42 +00:00
require . NoError ( s . T ( ) , err )
clientKeystoreDir := filepath . Join ( clientTmpDir , keystoreDir )
2023-03-23 11:44:15 +00:00
clientPayloadSourceConfig := ReceiverClientConfig {
ReceiverConfig : & ReceiverConfig {
KeystorePath : clientKeystoreDir ,
DeviceType : "iphone" ,
2023-02-17 13:02:42 +00:00
KDFIterations : expectedKDFIterations ,
NodeConfig : clientNodeConfig ,
SettingCurrentNetwork : currentNetwork ,
} ,
2023-03-23 11:44:15 +00:00
ClientConfig : new ( ClientConfig ) ,
2023-02-17 13:02:42 +00:00
}
2023-03-23 11:44:15 +00:00
clientNodeConfig . RootDataDir = clientTmpDir
2023-02-17 13:02:42 +00:00
clientConfigBytes , err := json . Marshal ( clientPayloadSourceConfig )
require . NoError ( s . T ( ) , err )
2023-03-23 11:44:15 +00:00
err = StartUpReceivingClient ( clientBackend , cs , string ( clientConfigBytes ) )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
2023-04-19 22:59:09 +00:00
// check that the client has the same data as the server
2023-05-12 08:31:34 +00:00
clientMessenger := clientBackend . Messenger ( )
2023-01-06 12:21:14 +00:00
clientBrowserAPI := clientBackend . StatusNode ( ) . BrowserService ( ) . APIs ( ) [ 0 ] . Service . ( * browsers . API )
2023-05-12 08:31:34 +00:00
bookmarks , err := clientBrowserAPI . GetBookmarks ( ctx )
2023-01-06 12:21:14 +00:00
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , 1 , len ( bookmarks ) )
require . Equal ( s . T ( ) , "status.im" , bookmarks [ 0 ] . Name )
2024-02-26 13:53:40 +00:00
clientProfileShowcasePreferences , err := clientMessenger . GetProfileShowcasePreferences ( )
require . NoError ( s . T ( ) , err )
require . True ( s . T ( ) , reflect . DeepEqual ( profileShowcasePreferences , clientProfileShowcasePreferences ) )
2023-05-12 08:31:34 +00:00
uds , err := clientBackend . StatusNode ( ) . EnsService ( ) . API ( ) . GetEnsUsernames ( ctx )
2023-04-26 15:37:18 +00:00
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , 1 , len ( uds ) )
require . Equal ( s . T ( ) , ensUsername , uds [ 0 ] . Username )
require . Equal ( s . T ( ) , uint64 ( ensChainID ) , uds [ 0 ] . ChainID )
2023-05-12 08:31:34 +00:00
deleteForMeMessages , err := clientMessenger . GetDeleteForMeMessages ( )
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , 1 , len ( deleteForMeMessages ) )
2023-01-12 03:00:24 +00:00
clientActiveAccount , err := clientBackend . GetActiveAccount ( )
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , serverActiveAccount . Name , clientActiveAccount . Name )
2023-02-17 13:02:42 +00:00
require . Equal ( s . T ( ) , clientActiveAccount . KDFIterations , expectedKDFIterations )
2023-02-28 12:32:45 +00:00
require . True ( s . T ( ) , serverMessenger . HasPairedDevices ( ) )
require . True ( s . T ( ) , clientMessenger . HasPairedDevices ( ) )
err = serverMessenger . DisableInstallation ( clientNodeConfig . ShhextConfig . InstallationID )
require . NoError ( s . T ( ) , err )
require . False ( s . T ( ) , serverMessenger . HasPairedDevices ( ) )
serverNodeConfig , err := serverBackend . GetNodeConfig ( )
require . NoError ( s . T ( ) , err )
err = clientMessenger . DisableInstallation ( serverNodeConfig . ShhextConfig . InstallationID )
require . NoError ( s . T ( ) , err )
require . False ( s . T ( ) , clientMessenger . HasPairedDevices ( ) )
// repeat local pairing, we should expect no error after receiver logged in
2023-03-21 13:08:28 +00:00
cs , err = StartUpSenderServer ( serverBackend , string ( configBytes ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , err )
2023-03-23 11:44:15 +00:00
err = StartUpReceivingClient ( clientBackend , cs , string ( clientConfigBytes ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , err )
require . True ( s . T ( ) , serverMessenger . HasPairedDevices ( ) )
require . True ( s . T ( ) , clientMessenger . HasPairedDevices ( ) )
// test if it's okay when account already exist but not logged in
require . NoError ( s . T ( ) , clientBackend . Logout ( ) )
2023-03-21 13:08:28 +00:00
cs , err = StartUpSenderServer ( serverBackend , string ( configBytes ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , err )
2023-03-23 11:44:15 +00:00
err = StartUpReceivingClient ( clientBackend , cs , string ( clientConfigBytes ) )
2023-02-28 12:32:45 +00:00
require . NoError ( s . T ( ) , err )
2023-01-06 12:21:14 +00:00
}
2023-07-12 09:46:56 +00:00
func ( s * SyncDeviceSuite ) TestPairingThreeDevices ( ) {
2024-03-26 13:47:12 +00:00
bobTmpDir := filepath . Join ( s . tmpdir , "bob" )
2023-08-18 08:51:16 +00:00
bobBackend := s . prepareBackendWithAccount ( "" , bobTmpDir )
2023-07-12 09:46:56 +00:00
bobMessenger := bobBackend . Messenger ( )
_ , err := bobMessenger . Start ( )
s . Require ( ) . NoError ( err )
2024-03-26 13:47:12 +00:00
alice1TmpDir := filepath . Join ( s . tmpdir , "alice1" )
2023-08-18 08:51:16 +00:00
alice1Backend := s . prepareBackendWithAccount ( "" , alice1TmpDir )
2023-07-12 09:46:56 +00:00
alice1Messenger := alice1Backend . Messenger ( )
_ , err = alice1Messenger . Start ( )
s . Require ( ) . NoError ( err )
2024-03-26 13:47:12 +00:00
alice2TmpDir := filepath . Join ( s . tmpdir , "alice2" )
2023-07-12 09:46:56 +00:00
alice2Backend := s . prepareBackendWithoutAccount ( alice2TmpDir )
2024-03-26 13:47:12 +00:00
alice3TmpDir := filepath . Join ( s . tmpdir , "alice3" )
2023-09-21 00:32:16 +00:00
alice3Backend := s . prepareBackendWithoutAccount ( alice3TmpDir )
2023-07-12 09:46:56 +00:00
defer func ( ) {
require . NoError ( s . T ( ) , bobBackend . Logout ( ) )
require . NoError ( s . T ( ) , alice1Backend . Logout ( ) )
require . NoError ( s . T ( ) , alice2Backend . Logout ( ) )
require . NoError ( s . T ( ) , alice3Backend . Logout ( ) )
} ( )
// Make Alice and Bob mutual contacts
2024-03-26 13:47:12 +00:00
bobPublicKey := bobMessenger . GetSelfContact ( ) . ID
2023-07-12 09:46:56 +00:00
request := & requests . SendContactRequest {
ID : bobPublicKey ,
2024-03-26 13:47:12 +00:00
Message : protocol . RandomLettersString ( 5 ) ,
2023-07-12 09:46:56 +00:00
}
s . sendContactRequest ( request , alice1Messenger )
2024-03-26 13:47:12 +00:00
contactRequest := s . receiveContactRequest ( request . Message , bobMessenger )
2023-07-12 09:46:56 +00:00
s . acceptContactRequest ( contactRequest , alice1Messenger , bobMessenger )
s . checkMutualContact ( alice1Backend , bobPublicKey )
// We shouldn't sync ourselves as a contact, so we check there's only Bob
// https://github.com/status-im/status-go/issues/3667
s . Require ( ) . Equal ( 1 , len ( alice1Backend . Messenger ( ) . Contacts ( ) ) )
// Pair alice-1 <-> alice-2
s . logger . Info ( "pairing Alice-1 and Alice-2" )
s . pairAccounts ( alice1Backend , alice1TmpDir , alice2Backend , alice2TmpDir )
s . checkMutualContact ( alice2Backend , bobPublicKey )
s . Require ( ) . Equal ( 1 , len ( alice2Backend . Messenger ( ) . Contacts ( ) ) )
// Pair Alice-2 <-> ALice-3
s . logger . Info ( "pairing Alice-2 and Alice-3" )
s . pairAccounts ( alice2Backend , alice2TmpDir , alice3Backend , alice3TmpDir )
s . checkMutualContact ( alice3Backend , bobPublicKey )
s . Require ( ) . Equal ( 1 , len ( alice3Backend . Messenger ( ) . Contacts ( ) ) )
}
2024-03-26 13:47:12 +00:00
func ( s * SyncDeviceSuite ) createUser ( name string ) ( * api . GethStatusBackend , string ) {
tmpDir := filepath . Join ( s . tmpdir , name )
backend := s . prepareBackendWithAccount ( "" , tmpDir )
_ , err := backend . Messenger ( ) . Start ( )
s . Require ( ) . NoError ( err )
return backend , tmpDir
}
func ( s * SyncDeviceSuite ) TestPairPendingContactRequest ( ) {
bobBackend , _ := s . createUser ( "bob" )
defer func ( ) {
s . Require ( ) . NoError ( bobBackend . Logout ( ) )
} ( )
alice1Backend , alice1TmpDir := s . createUser ( "alice1" )
defer func ( ) {
s . Require ( ) . NoError ( alice1Backend . Logout ( ) )
} ( )
// Create a pending CR from alice to bob
bobPublicKey := bobBackend . Messenger ( ) . IdentityPublicKeyString ( )
alicePublicKey := alice1Backend . Messenger ( ) . IdentityPublicKeyString ( )
request := & requests . SendContactRequest {
ID : alicePublicKey ,
Message : protocol . RandomLettersString ( 5 ) ,
}
s . sendContactRequest ( request , bobBackend . Messenger ( ) )
contactRequest := s . receiveContactRequest ( request . Message , alice1Backend . Messenger ( ) )
s . Require ( ) . Equal ( request . Message , contactRequest . Text )
alice2TmpDir := filepath . Join ( s . tmpdir , "alice2" )
alice2Backend := s . prepareBackendWithoutAccount ( alice2TmpDir )
defer func ( ) {
s . Require ( ) . NoError ( alice2Backend . Logout ( ) )
} ( )
// Pair alice-1 <-> alice-2
s . logger . Info ( "pairing Alice-1 and Alice-2" )
s . pairAccounts ( alice1Backend , alice1TmpDir , alice2Backend , alice2TmpDir )
s . logger . Debug ( "public keys" ,
zap . String ( "alice" , alice1Backend . Messenger ( ) . IdentityPublicKeyString ( ) ) ,
zap . String ( "bob" , bobBackend . Messenger ( ) . IdentityPublicKeyString ( ) ) ,
)
ensurePendingContact := func ( m * protocol . Messenger ) {
contacts := m . Contacts ( )
s . Require ( ) . Len ( contacts , 1 )
c := contacts [ 0 ]
s . Require ( ) . Equal ( bobPublicKey , c . ID )
s . Require ( ) . Equal ( protocol . ContactRequestStateReceived , c . ContactRequestRemoteState )
s . Require ( ) . Equal ( protocol . ContactRequestStateNone , c . ContactRequestLocalState )
acRequest := protocol . ActivityCenterNotificationsRequest {
ActivityTypes : [ ] protocol . ActivityCenterType {
protocol . ActivityCenterNotificationTypeContactRequest ,
} ,
ReadType : protocol . ActivityCenterQueryParamsReadAll ,
Limit : 10 ,
}
r , err := m . ActivityCenterNotifications ( acRequest )
s . Require ( ) . NoError ( err )
s . Require ( ) . Len ( r . Notifications , 1 )
}
// Ensure both devices have the pending Bob contact
ensurePendingContact ( alice1Backend . Messenger ( ) )
ensurePendingContact ( alice2Backend . Messenger ( ) )
}
2024-05-15 00:01:47 +00:00
type contactRequestAction func ( messenger * protocol . Messenger , contactRequestID string ) ( * protocol . MessengerResponse , error )
type notificationValidateFunc func ( r * protocol . ActivityCenterPaginationResponse )
func ( s * SyncDeviceSuite ) testPairContactRequest ( requestAction contactRequestAction , validateFunc notificationValidateFunc ) {
bobBackend , _ := s . createUser ( "bob" )
defer func ( ) {
s . Require ( ) . NoError ( bobBackend . Logout ( ) )
} ( )
alice1Backend , alice1TmpDir := s . createUser ( "alice1" )
defer func ( ) {
s . Require ( ) . NoError ( alice1Backend . Logout ( ) )
} ( )
alicePublicKey := alice1Backend . Messenger ( ) . IdentityPublicKeyString ( )
request := & requests . SendContactRequest {
ID : alicePublicKey ,
Message : protocol . RandomLettersString ( 5 ) ,
}
s . sendContactRequest ( request , bobBackend . Messenger ( ) )
contactRequest := s . receiveContactRequest ( request . Message , alice1Backend . Messenger ( ) )
s . Require ( ) . Equal ( request . Message , contactRequest . Text )
_ , err := requestAction ( alice1Backend . Messenger ( ) , contactRequest . ID )
s . Require ( ) . NoError ( err )
alice2TmpDir := filepath . Join ( s . tmpdir , "alice2" )
alice2Backend := s . prepareBackendWithoutAccount ( alice2TmpDir )
defer func ( ) {
s . Require ( ) . NoError ( alice2Backend . Logout ( ) )
} ( )
s . pairAccounts ( alice1Backend , alice1TmpDir , alice2Backend , alice2TmpDir )
internalNotificationValidateFunc := func ( m * protocol . Messenger ) {
acRequest := protocol . ActivityCenterNotificationsRequest {
ActivityTypes : [ ] protocol . ActivityCenterType {
protocol . ActivityCenterNotificationTypeContactRequest ,
} ,
ReadType : protocol . ActivityCenterQueryParamsReadAll ,
Limit : 10 ,
}
r , err := m . ActivityCenterNotifications ( acRequest )
s . Require ( ) . NoError ( err )
validateFunc ( r )
}
internalNotificationValidateFunc ( alice1Backend . Messenger ( ) )
internalNotificationValidateFunc ( alice2Backend . Messenger ( ) )
}
func ( s * SyncDeviceSuite ) TestPairDeclineContactRequest ( ) {
declineContactRequest := func ( messenger * protocol . Messenger , contactRequestID string ) ( * protocol . MessengerResponse , error ) {
return messenger . DeclineContactRequest ( context . Background ( ) , & requests . DeclineContactRequest { ID : types . Hex2Bytes ( contactRequestID ) } )
}
s . testPairContactRequest ( declineContactRequest , func ( r * protocol . ActivityCenterPaginationResponse ) {
s . Require ( ) . Len ( r . Notifications , 1 )
s . Require ( ) . False ( r . Notifications [ 0 ] . Accepted )
s . Require ( ) . True ( r . Notifications [ 0 ] . Dismissed )
s . Require ( ) . True ( r . Notifications [ 0 ] . Read )
} )
}
func ( s * SyncDeviceSuite ) TestPairAcceptContactRequest ( ) {
acceptContactRequest := func ( messenger * protocol . Messenger , contactRequestID string ) ( * protocol . MessengerResponse , error ) {
return messenger . AcceptContactRequest ( context . Background ( ) , & requests . AcceptContactRequest { ID : types . Hex2Bytes ( contactRequestID ) } )
}
s . testPairContactRequest ( acceptContactRequest , func ( r * protocol . ActivityCenterPaginationResponse ) {
s . Require ( ) . Len ( r . Notifications , 1 )
s . Require ( ) . True ( r . Notifications [ 0 ] . Accepted )
s . Require ( ) . False ( r . Notifications [ 0 ] . Dismissed )
s . Require ( ) . True ( r . Notifications [ 0 ] . Read )
} )
}
2024-03-26 13:47:12 +00:00
2023-01-06 12:21:14 +00:00
func defaultSettings ( generatedAccountInfo generator . GeneratedAccountInfo , derivedAddresses map [ string ] generator . AccountInfo , mnemonic * string ) ( * settings . Settings , error ) {
chatKeyString := derivedAddresses [ pathDefaultChat ] . PublicKey
2023-04-02 23:08:29 +00:00
syncSettings := & settings . Settings { }
syncSettings . KeyUID = generatedAccountInfo . KeyUID
syncSettings . Address = types . HexToAddress ( generatedAccountInfo . Address )
syncSettings . WalletRootAddress = types . HexToAddress ( derivedAddresses [ pathWalletRoot ] . Address )
2023-01-06 12:21:14 +00:00
// Set chat key & name
name , err := alias . GenerateFromPublicKeyString ( chatKeyString )
if err != nil {
return nil , err
}
2023-04-02 23:08:29 +00:00
syncSettings . Name = name
syncSettings . PublicKey = chatKeyString
2023-01-06 12:21:14 +00:00
2023-04-02 23:08:29 +00:00
syncSettings . DappsAddress = types . HexToAddress ( derivedAddresses [ pathDefaultWallet ] . Address )
syncSettings . EIP1581Address = types . HexToAddress ( derivedAddresses [ pathEIP1581 ] . Address )
syncSettings . Mnemonic = mnemonic
2023-01-06 12:21:14 +00:00
2023-04-02 23:08:29 +00:00
syncSettings . SigningPhrase = "balabala"
2023-01-06 12:21:14 +00:00
2023-04-02 23:08:29 +00:00
syncSettings . SendPushNotifications = true
syncSettings . InstallationID = uuid . New ( ) . String ( )
syncSettings . UseMailservers = true
2023-01-06 12:21:14 +00:00
2023-04-02 23:08:29 +00:00
syncSettings . PreviewPrivacy = true
syncSettings . Currency = "usd"
syncSettings . ProfilePicturesVisibility = 1
syncSettings . LinkPreviewRequestEnabled = true
2023-01-06 12:21:14 +00:00
visibleTokens := make ( map [ string ] [ ] string )
visibleTokens [ "mainnet" ] = [ ] string { "SNT" }
visibleTokensJSON , err := json . Marshal ( visibleTokens )
if err != nil {
return nil , err
}
visibleTokenJSONRaw := json . RawMessage ( visibleTokensJSON )
2023-04-02 23:08:29 +00:00
syncSettings . WalletVisibleTokens = & visibleTokenJSONRaw
2023-01-06 12:21:14 +00:00
2024-01-11 15:48:40 +00:00
networks := ` [ { "id":"goerli_rpc","chain-explorer-link":"https://goerli.etherscan.io/address/","name":"Goerli with upstream RPC","config": { "NetworkId":5,"DataDir":"/ethereum/goerli_rpc","UpstreamConfig": { "Enabled":true,"URL":"https://goerli-archival.rpc.grove.city/v1/3ef2018191814b7e1009b8d9"}}}, { "id":"mainnet_rpc","chain-explorer-link":"https://etherscan.io/address/","name":"Mainnet with upstream RPC","config": { "NetworkId":1,"DataDir":"/ethereum/mainnet_rpc","UpstreamConfig": { "Enabled":true,"URL":"https://eth-archival.rpc.grove.city/v1/3ef2018191814b7e1009b8d9"}}}] `
2023-03-29 15:51:01 +00:00
var networksRawMessage json . RawMessage = [ ] byte ( networks )
2023-04-02 23:08:29 +00:00
syncSettings . Networks = & networksRawMessage
syncSettings . CurrentNetwork = currentNetwork
2023-01-06 12:21:14 +00:00
2023-04-02 23:08:29 +00:00
return syncSettings , nil
2023-01-06 12:21:14 +00:00
}
2024-04-22 12:33:23 +00:00
func nodeConfigForLocalPairSync ( installationID , keyUID , tmpDir string ) ( * params . NodeConfig , error ) {
2023-01-06 12:21:14 +00:00
// Set mainnet
nodeConfig := & params . NodeConfig { }
2024-04-26 14:11:49 +00:00
nodeConfig . LogEnabled = true
2024-02-27 19:38:40 +00:00
nodeConfig . LogLevel = "DEBUG"
2024-04-26 14:11:49 +00:00
nodeConfig . LogDir = tmpDir
2023-02-17 13:02:42 +00:00
nodeConfig . KeyStoreDir = filepath . Join ( keystoreDir , keyUID )
2023-09-12 12:45:32 +00:00
nodeConfig . KeycardPairingDataFile = filepath . Join ( "keycard" , "pairings.json" )
2024-04-26 14:11:49 +00:00
nodeConfig . ShhextConfig = params . ShhextConfig {
InstallationID : installationID ,
}
// need specify cluster config here, otherwise TestPairingThreeDevices will fail due to no messages(CR) received
// TODO(frank) need to figure out why above happen
clusterConfig , err := params . LoadClusterConfigFromFleet ( params . FleetProd )
2023-01-06 12:21:14 +00:00
if err != nil {
return nil , err
}
nodeConfig . ClusterConfig = * clusterConfig
return nodeConfig , nil
}
2023-05-12 08:31:34 +00:00
type testTimeSource struct { }
func ( t * testTimeSource ) GetCurrentTime ( ) uint64 {
return uint64 ( time . Now ( ) . Unix ( ) )
}
func buildTestMessage ( chat * protocol . Chat ) * common . Message {
clock , timestamp := chat . NextClockAndTimestamp ( & testTimeSource { } )
2023-08-18 11:39:59 +00:00
message := common . NewMessage ( )
2023-05-12 08:31:34 +00:00
message . Text = "text-input-message"
message . ChatId = chat . ID
message . Clock = clock
message . Timestamp = timestamp
message . WhisperTimestamp = clock
message . LocalChatID = chat . ID
message . ContentType = protobuf . ChatMessage_TEXT_PLAIN
switch chat . ChatType {
case protocol . ChatTypePublic , protocol . ChatTypeProfile :
message . MessageType = protobuf . MessageType_PUBLIC_GROUP
case protocol . ChatTypeOneToOne :
message . MessageType = protobuf . MessageType_ONE_TO_ONE
case protocol . ChatTypePrivateGroupChat :
message . MessageType = protobuf . MessageType_PRIVATE_GROUP
}
return message
}
2023-08-18 08:51:16 +00:00
2023-08-30 11:33:14 +00:00
func ( s * SyncDeviceSuite ) getSeedPhraseKeypairForTest ( backend * api . GethStatusBackend , mnemonic string , server bool ) * accounts . Keypair {
generatedAccount , err := backend . AccountManager ( ) . AccountsGenerator ( ) . ImportMnemonic ( mnemonic , "" )
2023-08-18 08:51:16 +00:00
require . NoError ( s . T ( ) , err )
generatedDerivedAccs , err := backend . AccountManager ( ) . AccountsGenerator ( ) . DeriveAddresses ( generatedAccount . ID , [ ] string { path0 , path1 } )
require . NoError ( s . T ( ) , err )
seedPhraseKp := & accounts . Keypair {
KeyUID : generatedAccount . KeyUID ,
Name : "SeedPhraseImported" ,
Type : accounts . KeypairTypeSeed ,
DerivedFrom : generatedAccount . Address ,
}
i := 0
for path , ga := range generatedDerivedAccs {
acc := & accounts . Account {
Address : types . HexToAddress ( ga . Address ) ,
KeyUID : generatedAccount . KeyUID ,
Wallet : false ,
Chat : false ,
Type : accounts . AccountTypeSeed ,
Path : path ,
PublicKey : types . HexBytes ( ga . PublicKey ) ,
Name : fmt . Sprintf ( "Acc_%d" , i ) ,
Operable : accounts . AccountFullyOperable ,
Emoji : fmt . Sprintf ( "Emoji_%d" , i ) ,
ColorID : "blue" ,
}
if ! server {
acc . Operable = accounts . AccountNonOperable
}
seedPhraseKp . Accounts = append ( seedPhraseKp . Accounts , acc )
i ++
}
return seedPhraseKp
}
2023-08-30 11:33:14 +00:00
func containsKeystoreFile ( directory , key string ) bool {
files , err := os . ReadDir ( directory )
if err != nil {
return false
}
for _ , file := range files {
if strings . Contains ( file . Name ( ) , strings . ToLower ( key ) ) {
return true
}
}
return false
}
2023-08-18 08:51:16 +00:00
func ( s * SyncDeviceSuite ) TestTransferringKeystoreFiles ( ) {
ctx := context . TODO ( )
2024-03-26 13:47:12 +00:00
serverTmpDir := filepath . Join ( s . tmpdir , "server" )
2023-08-30 11:33:14 +00:00
serverBackend := s . prepareBackendWithAccount ( profileKeypairMnemonic , serverTmpDir )
2023-08-18 08:51:16 +00:00
2024-03-26 13:47:12 +00:00
clientTmpDir := filepath . Join ( s . tmpdir , "client" )
2023-08-30 11:33:14 +00:00
clientBackend := s . prepareBackendWithAccount ( profileKeypairMnemonic , clientTmpDir )
2023-08-18 08:51:16 +00:00
defer func ( ) {
require . NoError ( s . T ( ) , clientBackend . Logout ( ) )
require . NoError ( s . T ( ) , serverBackend . Logout ( ) )
} ( )
serverBackend . Messenger ( ) . SetLocalPairing ( true )
clientBackend . Messenger ( ) . SetLocalPairing ( true )
serverActiveAccount , err := serverBackend . GetActiveAccount ( )
require . NoError ( s . T ( ) , err )
clientActiveAccount , err := clientBackend . GetActiveAccount ( )
require . NoError ( s . T ( ) , err )
require . True ( s . T ( ) , serverActiveAccount . KeyUID == clientActiveAccount . KeyUID )
2023-08-30 11:33:14 +00:00
serverSeedPhraseKp := s . getSeedPhraseKeypairForTest ( serverBackend , seedKeypairMnemonic , true )
2023-08-18 08:51:16 +00:00
serverAccountsAPI := serverBackend . StatusNode ( ) . AccountService ( ) . APIs ( ) [ 1 ] . Service . ( * accservice . API )
2023-08-30 11:33:14 +00:00
err = serverAccountsAPI . ImportMnemonic ( ctx , seedKeypairMnemonic , s . password )
2023-08-18 08:51:16 +00:00
require . NoError ( s . T ( ) , err , "importing mnemonic for new keypair on server" )
err = serverAccountsAPI . AddKeypair ( ctx , s . password , serverSeedPhraseKp )
require . NoError ( s . T ( ) , err , "saving seed phrase keypair on server with keystore files created" )
2023-08-30 11:33:14 +00:00
clientSeedPhraseKp := s . getSeedPhraseKeypairForTest ( serverBackend , seedKeypairMnemonic , true )
2023-08-18 08:51:16 +00:00
clientAccountsAPI := clientBackend . StatusNode ( ) . AccountService ( ) . APIs ( ) [ 1 ] . Service . ( * accservice . API )
err = clientAccountsAPI . SaveKeypair ( ctx , clientSeedPhraseKp )
require . NoError ( s . T ( ) , err , "saving seed phrase keypair on client without keystore files" )
// check server - server should contain keystore files for imported seed phrase
serverKeystorePath := filepath . Join ( serverTmpDir , keystoreDir , serverActiveAccount . KeyUID )
require . True ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , serverSeedPhraseKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range serverSeedPhraseKp . Accounts {
require . True ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
// check client - client should not contain keystore files for imported seed phrase
clientKeystorePath := filepath . Join ( clientTmpDir , keystoreDir , clientActiveAccount . KeyUID )
require . False ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , clientSeedPhraseKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range clientSeedPhraseKp . Accounts {
require . False ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
// prepare sender
var config = KeystoreFilesSenderServerConfig {
SenderConfig : & KeystoreFilesSenderConfig {
KeystoreFilesConfig : KeystoreFilesConfig {
KeystorePath : serverKeystorePath ,
LoggedInKeyUID : serverActiveAccount . KeyUID ,
Password : s . password ,
} ,
KeypairsToExport : [ ] string { serverSeedPhraseKp . KeyUID } ,
} ,
ServerConfig : new ( ServerConfig ) ,
}
configBytes , err := json . Marshal ( config )
require . NoError ( s . T ( ) , err )
cs , err := StartUpKeystoreFilesSenderServer ( serverBackend , string ( configBytes ) )
require . NoError ( s . T ( ) , err )
// prepare receiver
clientPayloadSourceConfig := KeystoreFilesReceiverClientConfig {
ReceiverConfig : & KeystoreFilesReceiverConfig {
KeystoreFilesConfig : KeystoreFilesConfig {
KeystorePath : clientKeystorePath ,
LoggedInKeyUID : clientActiveAccount . KeyUID ,
Password : s . password ,
} ,
KeypairsToImport : [ ] string { serverSeedPhraseKp . KeyUID } ,
} ,
ClientConfig : new ( ClientConfig ) ,
}
clientConfigBytes , err := json . Marshal ( clientPayloadSourceConfig )
require . NoError ( s . T ( ) , err )
err = StartUpKeystoreFilesReceivingClient ( clientBackend , cs , string ( clientConfigBytes ) )
require . NoError ( s . T ( ) , err )
// check client - client should contain keystore files for imported seed phrase
accountManager := clientBackend . AccountManager ( )
accGenerator := accountManager . AccountsGenerator ( )
require . True ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , clientSeedPhraseKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range clientSeedPhraseKp . Accounts {
require . True ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
// reinit keystore on client
require . NoError ( s . T ( ) , accountManager . InitKeystore ( clientKeystorePath ) )
// check keystore on client
genAccInfo , err := accGenerator . LoadAccount ( clientSeedPhraseKp . DerivedFrom , s . password )
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , clientSeedPhraseKp . KeyUID , genAccInfo . KeyUID )
for _ , acc := range clientSeedPhraseKp . Accounts {
genAccInfo , err := accGenerator . LoadAccount ( acc . Address . String ( ) , s . password )
require . NoError ( s . T ( ) , err )
require . Equal ( s . T ( ) , acc . Address . String ( ) , genAccInfo . Address )
}
}
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
func ( s * SyncDeviceSuite ) TestTransferringKeystoreFilesAfterStopUisngKeycard ( ) {
2024-02-26 09:12:37 +00:00
s . T ( ) . Skip ( "flaky test" )
2024-02-19 18:00:44 +00:00
ctx := context . TODO ( )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
// Prepare server
2024-03-26 13:47:12 +00:00
serverTmpDir := filepath . Join ( s . tmpdir , "server" )
2024-02-19 18:00:44 +00:00
serverBackend := s . prepareBackendWithAccount ( profileKeypairMnemonic1 , serverTmpDir )
serverMessenger := serverBackend . Messenger ( )
serverAccountsAPI := serverBackend . StatusNode ( ) . AccountService ( ) . APIs ( ) [ 1 ] . Service . ( * accservice . API )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
// Prepare client
2024-03-26 13:47:12 +00:00
clientTmpDir := filepath . Join ( s . tmpdir , "client" )
2024-02-19 18:00:44 +00:00
clientBackend := s . prepareBackendWithAccount ( profileKeypairMnemonic1 , clientTmpDir )
clientMessenger := clientBackend . Messenger ( )
clientAccountsAPI := clientBackend . StatusNode ( ) . AccountService ( ) . APIs ( ) [ 1 ] . Service . ( * accservice . API )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
defer func ( ) {
require . NoError ( s . T ( ) , clientBackend . Logout ( ) )
require . NoError ( s . T ( ) , serverBackend . Logout ( ) )
} ( )
// Pair server and client
im1 := & multidevice . InstallationMetadata {
Name : "client-device" ,
DeviceType : "client-device-type" ,
}
settings , err := clientBackend . GetSettings ( )
s . Require ( ) . NoError ( err )
err = clientMessenger . SetInstallationMetadata ( settings . InstallationID , im1 )
s . Require ( ) . NoError ( err )
response , err := clientMessenger . SendPairInstallation ( context . Background ( ) , nil )
s . Require ( ) . NoError ( err )
s . Require ( ) . NotNil ( response )
s . Require ( ) . Len ( response . Chats ( ) , 1 )
s . Require ( ) . False ( response . Chats ( ) [ 0 ] . Active )
response , err = protocol . WaitOnMessengerResponse (
serverMessenger ,
func ( r * protocol . MessengerResponse ) bool {
for _ , i := range r . Installations {
if i . ID == settings . InstallationID {
return true
2024-02-19 09:10:37 +00:00
}
}
2024-02-19 18:00:44 +00:00
return false
} ,
"installation not received" ,
)
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
s . Require ( ) . NoError ( err )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
found := false
for _ , i := range response . Installations {
found = i . ID == settings . InstallationID &&
i . InstallationMetadata != nil &&
i . InstallationMetadata . Name == im1 . Name &&
i . InstallationMetadata . DeviceType == im1 . DeviceType
if found {
break
2023-08-30 11:33:14 +00:00
}
2024-02-19 18:00:44 +00:00
}
s . Require ( ) . True ( found )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
err = serverMessenger . EnableInstallation ( settings . InstallationID )
s . Require ( ) . NoError ( err )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
// Check if the logged in account is the same on server and client
serverActiveAccount , err := serverBackend . GetActiveAccount ( )
require . NoError ( s . T ( ) , err )
clientActiveAccount , err := clientBackend . GetActiveAccount ( )
require . NoError ( s . T ( ) , err )
require . True ( s . T ( ) , serverActiveAccount . KeyUID == clientActiveAccount . KeyUID )
//////////////////////////////////////////////////////////////////////////////
// From this point this test is trying to simulate the following scenario:
// - add a new seed phrase keypair on server
// - sync it to client
// - convert it to a keycard keypair on server
// - sync it to client
// - stop using keycard on server
// - sync it to client
// - try to transfer keystore files from server to client
//////////////////////////////////////////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////
// Add new seed phrase keypair to server and sync it to client
//////////////////////////////////////////////////////////////////////////////
serverSeedPhraseKp := s . getSeedPhraseKeypairForTest ( serverBackend , seedKeypairMnemonic1 , true )
err = serverAccountsAPI . ImportMnemonic ( ctx , seedKeypairMnemonic1 , s . password )
require . NoError ( s . T ( ) , err , "importing mnemonic for new keypair on server" )
err = serverAccountsAPI . AddKeypair ( ctx , s . password , serverSeedPhraseKp )
require . NoError ( s . T ( ) , err , "saving seed phrase keypair on server with keystore files created" )
// Wait for sync messages to be received on client
err = tt . RetryWithBackOff ( func ( ) error {
response , err := clientMessenger . RetrieveAll ( )
if err != nil {
return err
}
for _ , kp := range response . Keypairs {
if kp . KeyUID == serverSeedPhraseKp . KeyUID {
return nil
2023-08-30 11:33:14 +00:00
}
}
2024-02-19 18:00:44 +00:00
return errors . New ( "no sync keypair received" )
} )
s . Require ( ) . NoError ( err )
// Check if the keypair saved on client is the same as the one on server
serverKp , err := serverAccountsAPI . GetKeypairByKeyUID ( ctx , serverSeedPhraseKp . KeyUID )
s . Require ( ) . NoError ( err )
clientKp , err := clientAccountsAPI . GetKeypairByKeyUID ( ctx , serverSeedPhraseKp . KeyUID )
s . Require ( ) . NoError ( err )
s . Require ( ) . True ( serverKp . KeyUID == clientKp . KeyUID &&
serverKp . Name == clientKp . Name &&
serverKp . Type == clientKp . Type &&
serverKp . DerivedFrom == clientKp . DerivedFrom &&
serverKp . LastUsedDerivationIndex == clientKp . LastUsedDerivationIndex &&
serverKp . Clock == clientKp . Clock &&
len ( serverKp . Accounts ) == len ( clientKp . Accounts ) &&
len ( serverKp . Keycards ) == len ( clientKp . Keycards ) )
// Check server - server should contain keystore files for imported seed phrase
serverKeystorePath := filepath . Join ( serverTmpDir , keystoreDir , serverActiveAccount . KeyUID )
require . True ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , serverKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range serverKp . Accounts {
require . True ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
// Check client - client should not contain keystore files for imported seed phrase
clientKeystorePath := filepath . Join ( clientTmpDir , keystoreDir , clientActiveAccount . KeyUID )
require . False ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , clientKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range clientKp . Accounts {
require . False ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
//////////////////////////////////////////////////////////////////////////////
// Convert it to a keycard keypair on server and sync it to client
//////////////////////////////////////////////////////////////////////////////
err = serverAccountsAPI . SaveOrUpdateKeycard ( ctx , & accounts . Keycard {
KeycardUID : "1234" ,
KeycardName : "new-keycard" ,
KeyUID : serverKp . KeyUID ,
AccountsAddresses : [ ] types . Address { serverKp . Accounts [ 0 ] . Address , serverKp . Accounts [ 1 ] . Address } ,
} , false )
s . Require ( ) . NoError ( err )
// Wait for sync messages to be received on client
err = tt . RetryWithBackOff ( func ( ) error {
response , err := clientMessenger . RetrieveAll ( )
if err != nil {
return err
2023-08-30 11:33:14 +00:00
}
2024-02-19 18:00:44 +00:00
for _ , kp := range response . Keypairs {
if kp . KeyUID == serverKp . KeyUID {
return nil
2023-08-30 11:33:14 +00:00
}
2024-02-19 18:00:44 +00:00
}
return errors . New ( "no sync keypair received" )
} )
s . Require ( ) . NoError ( err )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
// Check if the keypair saved on client is the same as the one on server
serverKp , err = serverAccountsAPI . GetKeypairByKeyUID ( ctx , serverSeedPhraseKp . KeyUID )
s . Require ( ) . NoError ( err )
clientKp , err = clientAccountsAPI . GetKeypairByKeyUID ( ctx , serverSeedPhraseKp . KeyUID )
s . Require ( ) . NoError ( err )
s . Require ( ) . True ( serverKp . KeyUID == clientKp . KeyUID &&
serverKp . Name == clientKp . Name &&
serverKp . Type == clientKp . Type &&
serverKp . DerivedFrom == clientKp . DerivedFrom &&
serverKp . LastUsedDerivationIndex == clientKp . LastUsedDerivationIndex &&
serverKp . Clock == clientKp . Clock &&
len ( serverKp . Accounts ) == len ( clientKp . Accounts ) &&
len ( serverKp . Keycards ) == len ( clientKp . Keycards ) &&
len ( serverKp . Keycards ) == 1 )
// Check server - server should not contain keystore files for imported seed phrase
require . False ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , serverKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range serverKp . Accounts {
require . False ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
// Check client - client should not contain keystore files for imported seed phrase
require . False ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , clientKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range clientKp . Accounts {
require . False ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
//////////////////////////////////////////////////////////////////////////////
// Stop using keycard on server and sync it to client
//////////////////////////////////////////////////////////////////////////////
err = serverAccountsAPI . MigrateNonProfileKeycardKeypairToApp ( ctx , seedKeypairMnemonic1 , s . password )
s . Require ( ) . NoError ( err )
// Wait for sync messages to be received on client
err = tt . RetryWithBackOff ( func ( ) error {
response , err := clientMessenger . RetrieveAll ( )
if err != nil {
return err
2024-02-19 09:10:37 +00:00
}
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
for _ , kp := range response . Keypairs {
if kp . KeyUID == serverKp . KeyUID {
return nil
}
2024-02-19 09:10:37 +00:00
}
2024-02-19 18:00:44 +00:00
return errors . New ( "no sync keypair received" )
} )
s . Require ( ) . NoError ( err )
// Check if the keypair saved on client is the same as the one on server
serverKp , err = serverAccountsAPI . GetKeypairByKeyUID ( ctx , serverSeedPhraseKp . KeyUID )
s . Require ( ) . NoError ( err )
clientKp , err = clientAccountsAPI . GetKeypairByKeyUID ( ctx , serverSeedPhraseKp . KeyUID )
s . Require ( ) . NoError ( err )
s . Require ( ) . True ( serverKp . KeyUID == clientKp . KeyUID &&
serverKp . Name == clientKp . Name &&
serverKp . Type == clientKp . Type &&
serverKp . DerivedFrom == clientKp . DerivedFrom &&
serverKp . LastUsedDerivationIndex == clientKp . LastUsedDerivationIndex &&
serverKp . Clock == clientKp . Clock &&
len ( serverKp . Accounts ) == len ( clientKp . Accounts ) &&
len ( serverKp . Keycards ) == len ( clientKp . Keycards ) &&
len ( serverKp . Keycards ) == 0 )
// Check server - server should contain keystore files for imported seed phrase
require . True ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , serverKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range serverKp . Accounts {
require . True ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
// Check client - client should not contain keystore files for imported seed phrase
require . False ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , clientKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range clientKp . Accounts {
require . False ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
//////////////////////////////////////////////////////////////////////////////
// Try to transfer keystore files from server to client
//////////////////////////////////////////////////////////////////////////////
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
serverMessenger . SetLocalPairing ( true )
clientMessenger . SetLocalPairing ( true )
// prepare sender
var config = KeystoreFilesSenderServerConfig {
SenderConfig : & KeystoreFilesSenderConfig {
KeystoreFilesConfig : KeystoreFilesConfig {
KeystorePath : serverKeystorePath ,
LoggedInKeyUID : serverActiveAccount . KeyUID ,
Password : s . password ,
2023-08-30 11:33:14 +00:00
} ,
2024-02-19 18:00:44 +00:00
KeypairsToExport : [ ] string { serverKp . KeyUID } ,
} ,
ServerConfig : new ( ServerConfig ) ,
}
configBytes , err := json . Marshal ( config )
require . NoError ( s . T ( ) , err )
cs , err := StartUpKeystoreFilesSenderServer ( serverBackend , string ( configBytes ) )
require . NoError ( s . T ( ) , err )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
// prepare receiver
clientPayloadSourceConfig := KeystoreFilesReceiverClientConfig {
ReceiverConfig : & KeystoreFilesReceiverConfig {
KeystoreFilesConfig : KeystoreFilesConfig {
KeystorePath : clientKeystorePath ,
LoggedInKeyUID : clientActiveAccount . KeyUID ,
Password : s . password ,
2023-08-30 11:33:14 +00:00
} ,
2024-02-19 18:00:44 +00:00
KeypairsToImport : [ ] string { clientKp . KeyUID } ,
} ,
ClientConfig : new ( ClientConfig ) ,
}
clientConfigBytes , err := json . Marshal ( clientPayloadSourceConfig )
require . NoError ( s . T ( ) , err )
err = StartUpKeystoreFilesReceivingClient ( clientBackend , cs , string ( clientConfigBytes ) )
require . NoError ( s . T ( ) , err )
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
// Check server - server should contain keystore files for imported seed phrase
require . True ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , serverKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range serverKp . Accounts {
require . True ( s . T ( ) , containsKeystoreFile ( serverKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
}
2023-08-30 11:33:14 +00:00
2024-02-19 18:00:44 +00:00
// Check client - client should contain keystore files for imported seed phrase
require . True ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , clientKp . DerivedFrom [ 2 : ] ) )
for _ , acc := range clientKp . Accounts {
require . True ( s . T ( ) , containsKeystoreFile ( clientKeystorePath , acc . Address . String ( ) [ 2 : ] ) )
2023-08-30 11:33:14 +00:00
}
2024-02-19 18:00:44 +00:00
}
2023-09-21 00:32:16 +00:00
func ( s * SyncDeviceSuite ) TestPreventLoggedInAccountLocalPairingClientAsReceiver ( ) {
2024-03-26 13:47:12 +00:00
clientTmpDir := filepath . Join ( s . tmpdir , "client" )
2023-09-21 00:32:16 +00:00
clientBackend := s . prepareBackendWithAccount ( "" , clientTmpDir )
2024-03-26 13:47:12 +00:00
serverTmpDir := filepath . Join ( s . tmpdir , "server" )
2023-09-21 00:32:16 +00:00
serverBackend := s . prepareBackendWithAccount ( "" , serverTmpDir )
defer func ( ) {
s . NoError ( serverBackend . Logout ( ) )
s . NoError ( clientBackend . Logout ( ) )
} ( )
serverActiveAccount , err := serverBackend . GetActiveAccount ( )
s . NoError ( err )
serverKeystorePath := filepath . Join ( serverTmpDir , keystoreDir , serverActiveAccount . KeyUID )
var config = & SenderServerConfig {
SenderConfig : & SenderConfig {
KeystorePath : serverKeystorePath ,
DeviceType : "desktop" ,
KeyUID : serverActiveAccount . KeyUID ,
Password : s . password ,
} ,
ServerConfig : new ( ServerConfig ) ,
}
configBytes , err := json . Marshal ( config )
s . NoError ( err )
cs , err := StartUpSenderServer ( serverBackend , string ( configBytes ) )
s . NoError ( err )
clientKeystoreDir := filepath . Join ( clientTmpDir , keystoreDir )
2024-04-22 12:33:23 +00:00
clientNodeConfig , err := nodeConfigForLocalPairSync ( uuid . New ( ) . String ( ) , "" , clientTmpDir )
2023-09-21 00:32:16 +00:00
s . NoError ( err )
clientPayloadSourceConfig := ReceiverClientConfig {
ReceiverConfig : & ReceiverConfig {
KeystorePath : clientKeystoreDir ,
DeviceType : "iphone" ,
KDFIterations : expectedKDFIterations ,
NodeConfig : clientNodeConfig ,
SettingCurrentNetwork : currentNetwork ,
} ,
ClientConfig : new ( ClientConfig ) ,
}
clientNodeConfig . RootDataDir = clientTmpDir
clientConfigBytes , err := json . Marshal ( clientPayloadSourceConfig )
s . NoError ( err )
err = StartUpReceivingClient ( clientBackend , cs , string ( clientConfigBytes ) )
s . ErrorIs ( err , ErrLoggedInKeyUIDConflict )
}
func ( s * SyncDeviceSuite ) TestPreventLoggedInAccountLocalPairingClientAsSender ( ) {
2024-03-26 13:47:12 +00:00
clientTmpDir := filepath . Join ( s . tmpdir , "client" )
2023-09-21 00:32:16 +00:00
clientBackend := s . prepareBackendWithAccount ( "" , clientTmpDir )
2024-03-26 13:47:12 +00:00
serverTmpDir := filepath . Join ( s . tmpdir , "server" )
2023-09-21 00:32:16 +00:00
serverBackend := s . prepareBackendWithAccount ( "" , serverTmpDir )
defer func ( ) {
s . NoError ( serverBackend . Logout ( ) )
s . NoError ( clientBackend . Logout ( ) )
} ( )
2024-04-22 12:33:23 +00:00
serverNodeConfig , err := nodeConfigForLocalPairSync ( uuid . New ( ) . String ( ) , "" , serverTmpDir )
2023-09-21 00:32:16 +00:00
s . NoError ( err )
serverKeystoreDir := filepath . Join ( serverTmpDir , keystoreDir )
serverPayloadSourceConfig := & ReceiverServerConfig {
ReceiverConfig : & ReceiverConfig {
NodeConfig : serverNodeConfig ,
KeystorePath : serverKeystoreDir ,
DeviceType : "desktop" ,
KDFIterations : expectedKDFIterations ,
SettingCurrentNetwork : currentNetwork ,
} ,
ServerConfig : new ( ServerConfig ) ,
}
serverNodeConfig . RootDataDir = serverTmpDir
serverConfigBytes , err := json . Marshal ( serverPayloadSourceConfig )
s . NoError ( err )
cs , err := StartUpReceiverServer ( serverBackend , string ( serverConfigBytes ) )
s . NoError ( err )
clientActiveAccount , err := clientBackend . GetActiveAccount ( )
s . NoError ( err )
clientKeystorePath := filepath . Join ( clientTmpDir , keystoreDir , clientActiveAccount . KeyUID )
clientPayloadSourceConfig := SenderClientConfig {
SenderConfig : & SenderConfig {
KeystorePath : clientKeystorePath ,
DeviceType : "android" ,
KeyUID : clientActiveAccount . KeyUID ,
Password : s . password ,
} ,
ClientConfig : new ( ClientConfig ) ,
}
clientConfigBytes , err := json . Marshal ( clientPayloadSourceConfig )
s . NoError ( err )
err = StartUpSendingClient ( clientBackend , cs , string ( clientConfigBytes ) )
s . ErrorContains ( err , "[client] status not ok when sending account data, received '500 Internal Server Error'" )
}