mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-05 08:35:26 +00:00
6e7ff251cd
--HG-- rename : services/sync/modules/async.js => services/common/async.js rename : services/sync/modules/log4moz.js => services/common/log4moz.js rename : services/sync/modules/ext/Observers.js => services/common/observers.js rename : services/sync/modules/ext/Preferences.js => services/common/preferences.js rename : services/sync/modules/ext/StringBundle.js => services/common/stringbundle.js rename : services/sync/tests/unit/test_async_chain.js => services/common/tests/unit/test_async_chain.js rename : services/sync/tests/unit/test_async_querySpinningly.js => services/common/tests/unit/test_async_querySpinningly.js rename : services/sync/tests/unit/test_log4moz.js => services/common/tests/unit/test_log4moz.js rename : services/sync/tests/unit/test_Observers.js => services/common/tests/unit/test_observers.js rename : services/sync/tests/unit/test_Preferences.js => services/common/tests/unit/test_preferences.js rename : services/sync/tests/unit/test_restrequest.js => services/common/tests/unit/test_restrequest.js rename : services/sync/tests/unit/test_utils_makeURI.js => services/common/tests/unit/test_utils_makeURI.js rename : services/sync/tests/unit/test_utils_namedTimer.js => services/common/tests/unit/test_utils_namedTimer.js rename : services/sync/tests/unit/test_utils_stackTrace.js => services/common/tests/unit/test_utils_stackTrace.js
302 lines
10 KiB
JavaScript
302 lines
10 KiB
JavaScript
/* Any copyright is dedicated to the Public Domain.
|
|
* http://creativecommons.org/publicdomain/zero/1.0/ */
|
|
|
|
Cu.import("resource://services-sync/main.js");
|
|
Cu.import("resource://services-sync/service.js");
|
|
Cu.import("resource://services-sync/engines.js");
|
|
Cu.import("resource://services-sync/util.js");
|
|
Cu.import("resource://services-sync/status.js");
|
|
Cu.import("resource://services-sync/constants.js");
|
|
Cu.import("resource://services-sync/record.js");
|
|
Cu.import("resource://services-sync/keys.js");
|
|
Cu.import("resource://services-sync/engines/tabs.js");
|
|
Cu.import("resource://services-common/log4moz.js");
|
|
|
|
Engines.register(TabEngine);
|
|
|
|
add_test(function v4_upgrade() {
|
|
let passphrase = "abcdeabcdeabcdeabcdeabcdea";
|
|
|
|
let clients = new ServerCollection();
|
|
let meta_global = new ServerWBO('global');
|
|
|
|
// Tracking info/collections.
|
|
let collectionsHelper = track_collections_helper();
|
|
let upd = collectionsHelper.with_updated_collection;
|
|
let collections = collectionsHelper.collections;
|
|
|
|
let keysWBO = new ServerWBO("keys");
|
|
let server = httpd_setup({
|
|
// Special.
|
|
"/1.1/johndoe/info/collections": collectionsHelper.handler,
|
|
"/1.1/johndoe/storage/crypto/keys": upd("crypto", keysWBO.handler()),
|
|
"/1.1/johndoe/storage/meta/global": upd("meta", meta_global.handler()),
|
|
|
|
// Track modified times.
|
|
"/1.1/johndoe/storage/clients": upd("clients", clients.handler()),
|
|
"/1.1/johndoe/storage/tabs": upd("tabs", new ServerCollection().handler()),
|
|
|
|
// Just so we don't get 404s in the logs.
|
|
"/1.1/johndoe/storage/bookmarks": new ServerCollection().handler(),
|
|
"/1.1/johndoe/storage/forms": new ServerCollection().handler(),
|
|
"/1.1/johndoe/storage/history": new ServerCollection().handler(),
|
|
"/1.1/johndoe/storage/passwords": new ServerCollection().handler(),
|
|
"/1.1/johndoe/storage/prefs": new ServerCollection().handler()
|
|
});
|
|
|
|
try {
|
|
|
|
_("Set up some tabs.");
|
|
let myTabs =
|
|
{windows: [{tabs: [{index: 1,
|
|
entries: [{
|
|
url: "http://foo.com/",
|
|
title: "Title"
|
|
}],
|
|
attributes: {
|
|
image: "image"
|
|
},
|
|
extData: {
|
|
weaveLastUsed: 1
|
|
}}]}]};
|
|
delete Svc.Session;
|
|
Svc.Session = {
|
|
getBrowserState: function () JSON.stringify(myTabs)
|
|
};
|
|
|
|
Status.resetSync();
|
|
|
|
_("Logging in.");
|
|
Weave.Service.serverURL = TEST_SERVER_URL;
|
|
Weave.Service.clusterURL = TEST_CLUSTER_URL;
|
|
|
|
Weave.Service.login("johndoe", "ilovejane", passphrase);
|
|
do_check_true(Weave.Service.isLoggedIn);
|
|
Weave.Service.verifyAndFetchSymmetricKeys();
|
|
do_check_true(Weave.Service._remoteSetup());
|
|
|
|
function test_out_of_date() {
|
|
_("Old meta/global: " + JSON.stringify(meta_global));
|
|
meta_global.payload = JSON.stringify({"syncID": "foooooooooooooooooooooooooo",
|
|
"storageVersion": STORAGE_VERSION + 1});
|
|
collections.meta = Date.now() / 1000;
|
|
_("New meta/global: " + JSON.stringify(meta_global));
|
|
Records.set(Weave.Service.metaURL, meta_global);
|
|
try {
|
|
Weave.Service.sync();
|
|
}
|
|
catch (ex) {
|
|
}
|
|
do_check_eq(Status.sync, VERSION_OUT_OF_DATE);
|
|
}
|
|
|
|
// See what happens when we bump the storage version.
|
|
_("Syncing after server has been upgraded.");
|
|
test_out_of_date();
|
|
|
|
// Same should happen after a wipe.
|
|
_("Syncing after server has been upgraded and wiped.");
|
|
Weave.Service.wipeServer();
|
|
test_out_of_date();
|
|
|
|
// Now's a great time to test what happens when keys get replaced.
|
|
_("Syncing afresh...");
|
|
Weave.Service.logout();
|
|
CollectionKeys.clear();
|
|
Weave.Service.serverURL = TEST_SERVER_URL;
|
|
Weave.Service.clusterURL = TEST_CLUSTER_URL;
|
|
meta_global.payload = JSON.stringify({"syncID": "foooooooooooooobbbbbbbbbbbb",
|
|
"storageVersion": STORAGE_VERSION});
|
|
collections.meta = Date.now() / 1000;
|
|
Records.set(Weave.Service.metaURL, meta_global);
|
|
Weave.Service.login("johndoe", "ilovejane", passphrase);
|
|
do_check_true(Weave.Service.isLoggedIn);
|
|
Weave.Service.sync();
|
|
do_check_true(Weave.Service.isLoggedIn);
|
|
|
|
let serverDecrypted;
|
|
let serverKeys;
|
|
let serverResp;
|
|
|
|
|
|
function retrieve_server_default() {
|
|
serverKeys = serverResp = serverDecrypted = null;
|
|
|
|
serverKeys = new CryptoWrapper("crypto", "keys");
|
|
serverResp = serverKeys.fetch(Weave.Service.cryptoKeysURL).response;
|
|
do_check_true(serverResp.success);
|
|
|
|
serverDecrypted = serverKeys.decrypt(Weave.Identity.syncKeyBundle);
|
|
_("Retrieved WBO: " + JSON.stringify(serverDecrypted));
|
|
_("serverKeys: " + JSON.stringify(serverKeys));
|
|
|
|
return serverDecrypted.default;
|
|
}
|
|
|
|
function retrieve_and_compare_default(should_succeed) {
|
|
let serverDefault = retrieve_server_default();
|
|
let localDefault = CollectionKeys.keyForCollection().keyPairB64;
|
|
|
|
_("Retrieved keyBundle: " + JSON.stringify(serverDefault));
|
|
_("Local keyBundle: " + JSON.stringify(localDefault));
|
|
|
|
if (should_succeed)
|
|
do_check_eq(JSON.stringify(serverDefault), JSON.stringify(localDefault));
|
|
else
|
|
do_check_neq(JSON.stringify(serverDefault), JSON.stringify(localDefault));
|
|
}
|
|
|
|
// Uses the objects set above.
|
|
function set_server_keys(pair) {
|
|
serverDecrypted.default = pair;
|
|
serverKeys.cleartext = serverDecrypted;
|
|
serverKeys.encrypt(Weave.Identity.syncKeyBundle);
|
|
serverKeys.upload(Weave.Service.cryptoKeysURL);
|
|
}
|
|
|
|
_("Checking we have the latest keys.");
|
|
retrieve_and_compare_default(true);
|
|
|
|
_("Update keys on server.");
|
|
set_server_keys(["KaaaaaaaaaaaHAtfmuRY0XEJ7LXfFuqvF7opFdBD/MY=",
|
|
"aaaaaaaaaaaapxMO6TEWtLIOv9dj6kBAJdzhWDkkkis="]);
|
|
|
|
_("Checking that we no longer have the latest keys.");
|
|
retrieve_and_compare_default(false);
|
|
|
|
_("Indeed, they're what we set them to...");
|
|
do_check_eq("KaaaaaaaaaaaHAtfmuRY0XEJ7LXfFuqvF7opFdBD/MY=",
|
|
retrieve_server_default()[0]);
|
|
|
|
_("Sync. Should download changed keys automatically.");
|
|
let oldClientsModified = collections.clients;
|
|
let oldTabsModified = collections.tabs;
|
|
|
|
Weave.Service.login("johndoe", "ilovejane", passphrase);
|
|
Weave.Service.sync();
|
|
_("New key should have forced upload of data.");
|
|
_("Tabs: " + oldTabsModified + " < " + collections.tabs);
|
|
_("Clients: " + oldClientsModified + " < " + collections.clients);
|
|
do_check_true(collections.clients > oldClientsModified);
|
|
do_check_true(collections.tabs > oldTabsModified);
|
|
|
|
_("... and keys will now match.");
|
|
retrieve_and_compare_default(true);
|
|
|
|
// Clean up.
|
|
Weave.Service.startOver();
|
|
|
|
} finally {
|
|
Weave.Svc.Prefs.resetBranch("");
|
|
server.stop(run_next_test);
|
|
}
|
|
});
|
|
|
|
add_test(function v5_upgrade() {
|
|
let passphrase = "abcdeabcdeabcdeabcdeabcdea";
|
|
|
|
// Tracking info/collections.
|
|
let collectionsHelper = track_collections_helper();
|
|
let upd = collectionsHelper.with_updated_collection;
|
|
let collections = collectionsHelper.collections;
|
|
|
|
let keysWBO = new ServerWBO("keys");
|
|
let bulkWBO = new ServerWBO("bulk");
|
|
let clients = new ServerCollection();
|
|
let meta_global = new ServerWBO('global');
|
|
|
|
let server = httpd_setup({
|
|
// Special.
|
|
"/1.1/johndoe/storage/meta/global": upd("meta", meta_global.handler()),
|
|
"/1.1/johndoe/info/collections": collectionsHelper.handler,
|
|
"/1.1/johndoe/storage/crypto/keys": upd("crypto", keysWBO.handler()),
|
|
"/1.1/johndoe/storage/crypto/bulk": upd("crypto", bulkWBO.handler()),
|
|
|
|
// Track modified times.
|
|
"/1.1/johndoe/storage/clients": upd("clients", clients.handler()),
|
|
"/1.1/johndoe/storage/tabs": upd("tabs", new ServerCollection().handler()),
|
|
});
|
|
|
|
try {
|
|
|
|
_("Set up some tabs.");
|
|
let myTabs =
|
|
{windows: [{tabs: [{index: 1,
|
|
entries: [{
|
|
url: "http://foo.com/",
|
|
title: "Title"
|
|
}],
|
|
attributes: {
|
|
image: "image"
|
|
},
|
|
extData: {
|
|
weaveLastUsed: 1
|
|
}}]}]};
|
|
delete Svc.Session;
|
|
Svc.Session = {
|
|
getBrowserState: function () JSON.stringify(myTabs)
|
|
};
|
|
|
|
Status.resetSync();
|
|
|
|
setBasicCredentials("johndoe", "ilovejane", passphrase);
|
|
Weave.Service.serverURL = TEST_SERVER_URL;
|
|
Weave.Service.clusterURL = TEST_CLUSTER_URL;
|
|
|
|
// Test an upgrade where the contents of the server would cause us to error
|
|
// -- keys decrypted with a different sync key, for example.
|
|
_("Testing v4 -> v5 (or similar) upgrade.");
|
|
function update_server_keys(syncKeyBundle, wboName, collWBO) {
|
|
generateNewKeys();
|
|
serverKeys = CollectionKeys.asWBO("crypto", wboName);
|
|
serverKeys.encrypt(syncKeyBundle);
|
|
do_check_true(serverKeys.upload(Weave.Service.storageURL + collWBO).success);
|
|
}
|
|
|
|
_("Bumping version.");
|
|
// Bump version on the server.
|
|
let m = new WBORecord("meta", "global");
|
|
m.payload = {"syncID": "foooooooooooooooooooooooooo",
|
|
"storageVersion": STORAGE_VERSION + 1};
|
|
m.upload(Weave.Service.metaURL);
|
|
|
|
_("New meta/global: " + JSON.stringify(meta_global));
|
|
|
|
// Fill the keys with bad data.
|
|
let badKeys = new SyncKeyBundle("foobar", "aaaaaaaaaaaaaaaaaaaaaaaaaa");
|
|
update_server_keys(badKeys, "keys", "crypto/keys"); // v4
|
|
update_server_keys(badKeys, "bulk", "crypto/bulk"); // v5
|
|
|
|
_("Generating new keys.");
|
|
generateNewKeys();
|
|
|
|
// Now sync and see what happens. It should be a version fail, not a crypto
|
|
// fail.
|
|
|
|
_("Logging in.");
|
|
try {
|
|
Weave.Service.login("johndoe", "ilovejane", passphrase);
|
|
}
|
|
catch (e) {
|
|
_("Exception: " + e);
|
|
}
|
|
_("Status: " + Status);
|
|
do_check_false(Weave.Service.isLoggedIn);
|
|
do_check_eq(VERSION_OUT_OF_DATE, Status.sync);
|
|
|
|
// Clean up.
|
|
Weave.Service.startOver();
|
|
|
|
} finally {
|
|
Weave.Svc.Prefs.resetBranch("");
|
|
server.stop(run_next_test);
|
|
}
|
|
});
|
|
|
|
function run_test() {
|
|
let logger = Log4Moz.repository.rootLogger;
|
|
Log4Moz.repository.rootLogger.addAppender(new Log4Moz.DumpAppender());
|
|
|
|
run_next_test();
|
|
}
|