240 lines
8 KiB
Swift
240 lines
8 KiB
Swift
//
|
|
// Copyright 2023 Signal Messenger, LLC
|
|
// SPDX-License-Identifier: AGPL-3.0-only
|
|
//
|
|
|
|
import LibSignalClient
|
|
import XCTest
|
|
|
|
@testable import SignalServiceKit
|
|
|
|
final class LinkedDevicePniKeyManagerTest: XCTestCase {
|
|
private struct TestKVStore {
|
|
private static let hasSuspectedIssueKey = "hasSuspectedIssue"
|
|
|
|
private let db: any DB
|
|
private let kvStore: KeyValueStore
|
|
|
|
init(db: any DB) {
|
|
self.db = db
|
|
self.kvStore = KeyValueStore(collection: "LinkedDevicePniKeyManagerImpl")
|
|
}
|
|
|
|
func hasDecryptionError() -> Bool {
|
|
return db.read { kvStore.getBool(Self.hasSuspectedIssueKey, defaultValue: false, transaction: $0) }
|
|
}
|
|
}
|
|
|
|
private var db: InMemoryDB!
|
|
private var kvStore: TestKVStore!
|
|
private var messageProcessorMock: MessageProcessorMock!
|
|
private var pniIdentityKeyCheckerMock: PniIdentityKeyCheckerMock!
|
|
private var registrationStateChangeManagerMock: MockRegistrationStateChangeManager!
|
|
private var testScheduler: TestScheduler!
|
|
private var tsAccountManagerMock: MockTSAccountManager!
|
|
|
|
private var linkedDevicePniKeyManager: LinkedDevicePniKeyManagerImpl!
|
|
|
|
private var isMarkedDeregistered: Bool = false
|
|
|
|
override func setUp() {
|
|
testScheduler = TestScheduler()
|
|
let testSchedulers = TestSchedulers(scheduler: testScheduler)
|
|
|
|
db = InMemoryDB()
|
|
kvStore = TestKVStore(db: db)
|
|
messageProcessorMock = MessageProcessorMock(schedulers: testSchedulers)
|
|
pniIdentityKeyCheckerMock = PniIdentityKeyCheckerMock()
|
|
registrationStateChangeManagerMock = .init()
|
|
tsAccountManagerMock = .init()
|
|
|
|
registrationStateChangeManagerMock.setIsDeregisteredOrDelinkedMock = { [weak self] isDeregistered in
|
|
self?.isMarkedDeregistered = isDeregistered
|
|
}
|
|
|
|
tsAccountManagerMock.registrationStateMock = { .provisioned }
|
|
|
|
linkedDevicePniKeyManager = LinkedDevicePniKeyManagerImpl(
|
|
db: db,
|
|
messageProcessor: messageProcessorMock,
|
|
pniIdentityKeyChecker: pniIdentityKeyCheckerMock,
|
|
registrationStateChangeManager: registrationStateChangeManagerMock,
|
|
schedulers: testSchedulers,
|
|
tsAccountManager: tsAccountManagerMock
|
|
)
|
|
}
|
|
|
|
override func tearDown() {
|
|
messageProcessorMock.fetchProcessResult.ensureUnset()
|
|
pniIdentityKeyCheckerMock.matchResult.ensureUnset()
|
|
}
|
|
|
|
private func runRunRun(recordIssue: Bool) {
|
|
db.write { tx in
|
|
if recordIssue {
|
|
linkedDevicePniKeyManager.recordSuspectedIssueWithPniIdentityKey(tx: tx)
|
|
} else {
|
|
linkedDevicePniKeyManager.validateLocalPniIdentityKeyIfNecessary(tx: tx)
|
|
}
|
|
}
|
|
|
|
testScheduler.runUntilIdle()
|
|
}
|
|
|
|
func testDoesntRecordIfPrimaryDevice() {
|
|
tsAccountManagerMock.registrationStateMock = { .registered }
|
|
|
|
db.write { tx in
|
|
linkedDevicePniKeyManager.recordSuspectedIssueWithPniIdentityKey(tx: tx)
|
|
}
|
|
|
|
testScheduler.runUntilIdle()
|
|
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
}
|
|
|
|
func testUnlinkedIfDecryptionErrorAndMissingPni() {
|
|
messageProcessorMock.fetchProcessResult = .value({})
|
|
tsAccountManagerMock.localIdentifiersMock = { .missingPni }
|
|
|
|
runRunRun(recordIssue: true)
|
|
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
XCTAssertTrue(self.isMarkedDeregistered)
|
|
}
|
|
|
|
func testUnlinkedIfDecryptionErrorAndMismatchedIdentityKey() {
|
|
messageProcessorMock.fetchProcessResult = .value({})
|
|
tsAccountManagerMock.localIdentifiersMock = { .mock }
|
|
pniIdentityKeyCheckerMock.matchResult = .value(false)
|
|
|
|
runRunRun(recordIssue: true)
|
|
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
XCTAssertTrue(self.isMarkedDeregistered)
|
|
}
|
|
|
|
func testNotUnlinkedIfIdentityKeyCheckingFails() {
|
|
messageProcessorMock.fetchProcessResult = .value({})
|
|
tsAccountManagerMock.localIdentifiersMock = { .mock }
|
|
pniIdentityKeyCheckerMock.matchResult = .error()
|
|
|
|
runRunRun(recordIssue: true)
|
|
|
|
XCTAssertTrue(kvStore.hasDecryptionError())
|
|
XCTAssertFalse(self.isMarkedDeregistered)
|
|
}
|
|
|
|
func testNotUnlinkedIfIdentityKeyMatches() {
|
|
messageProcessorMock.fetchProcessResult = .value({})
|
|
tsAccountManagerMock.localIdentifiersMock = { .mock }
|
|
pniIdentityKeyCheckerMock.matchResult = .value(true)
|
|
|
|
runRunRun(recordIssue: true)
|
|
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
XCTAssertFalse(self.isMarkedDeregistered)
|
|
}
|
|
|
|
func testEarlyExitIfPrimary() {
|
|
tsAccountManagerMock.registrationStateMock = { .registered }
|
|
|
|
// This will fail if it doesn't early-exit, due to missing mocks.
|
|
runRunRun(recordIssue: false)
|
|
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
XCTAssertFalse(self.isMarkedDeregistered)
|
|
}
|
|
|
|
func testEarlyExitIfNoError() {
|
|
messageProcessorMock.fetchProcessResult = .value({})
|
|
|
|
// This will fail if it doesn't early-exit, due to missing mocks.
|
|
runRunRun(recordIssue: false)
|
|
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
XCTAssertFalse(self.isMarkedDeregistered)
|
|
}
|
|
|
|
/// It's important that we don't check for the decryption error until
|
|
/// *after* the message queue is cleared, because that's where we'll
|
|
/// register the error.
|
|
func testChecksForDecryptionErrorAfterClearingQueue() {
|
|
messageProcessorMock.fetchProcessResult = .value({ self.runRunRun(recordIssue: true) })
|
|
tsAccountManagerMock.localIdentifiersMock = { .mock }
|
|
pniIdentityKeyCheckerMock.matchResult = .value(false)
|
|
|
|
runRunRun(recordIssue: false)
|
|
|
|
// Expect an unlink
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
XCTAssertTrue(self.isMarkedDeregistered)
|
|
}
|
|
|
|
/// Checks that multiple overlapping validation attempts are collapsed into
|
|
/// one. Also checks that a subsequent validation runs.
|
|
func testMultipleCallsResultInOneRun() {
|
|
messageProcessorMock.fetchProcessResult = .value({})
|
|
tsAccountManagerMock.localIdentifiersMock = { .mock }
|
|
pniIdentityKeyCheckerMock.matchResult = .value(true)
|
|
|
|
db.write { tx in
|
|
linkedDevicePniKeyManager.recordSuspectedIssueWithPniIdentityKey(tx: tx)
|
|
linkedDevicePniKeyManager.recordSuspectedIssueWithPniIdentityKey(tx: tx)
|
|
}
|
|
testScheduler.runUntilIdle()
|
|
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
XCTAssertFalse(self.isMarkedDeregistered)
|
|
|
|
messageProcessorMock.fetchProcessResult = .value({})
|
|
tsAccountManagerMock.localIdentifiersMock = { .mock }
|
|
pniIdentityKeyCheckerMock.matchResult = .value(false)
|
|
|
|
db.write { tx in
|
|
linkedDevicePniKeyManager.recordSuspectedIssueWithPniIdentityKey(tx: tx)
|
|
}
|
|
testScheduler.runUntilIdle()
|
|
|
|
XCTAssertFalse(kvStore.hasDecryptionError())
|
|
XCTAssertTrue(self.isMarkedDeregistered)
|
|
}
|
|
}
|
|
|
|
// MARK: - Mocks
|
|
|
|
private extension LocalIdentifiers {
|
|
static let mock = LocalIdentifiers(
|
|
aci: Aci.randomForTesting(),
|
|
pni: Pni.randomForTesting(),
|
|
e164: E164("+17735550155")!
|
|
)
|
|
|
|
static let missingPni = LocalIdentifiers(
|
|
aci: Aci.randomForTesting(),
|
|
pni: nil,
|
|
e164: E164("+17735550155")!
|
|
)
|
|
}
|
|
|
|
private class MessageProcessorMock: LinkedDevicePniKeyManagerImpl.Shims.MessageProcessor {
|
|
var fetchProcessResult: ConsumableMockGuarantee<() -> Void> = .unset
|
|
|
|
private let schedulers: Schedulers
|
|
|
|
init(schedulers: Schedulers) {
|
|
self.schedulers = schedulers
|
|
}
|
|
|
|
func waitForFetchingAndProcessing() -> Guarantee<Void> {
|
|
return fetchProcessResult.consumeIntoGuarantee().map(on: schedulers.sync) { $0() }
|
|
}
|
|
}
|
|
|
|
private class PniIdentityKeyCheckerMock: PniIdentityKeyChecker {
|
|
var matchResult: ConsumableMockPromise<Bool> = .unset
|
|
|
|
func serverHasSameKeyAsLocal(localPni: Pni, tx: DBReadTransaction) -> Promise<Bool> {
|
|
return matchResult.consumeIntoPromise()
|
|
}
|
|
}
|