michael@0: /* Any copyright is dedicated to the Public Domain. michael@0: * http://creativecommons.org/publicdomain/zero/1.0/ */ michael@0: michael@0: Cu.import("resource://gre/modules/Log.jsm"); michael@0: Cu.import("resource://services-sync/constants.js"); michael@0: Cu.import("resource://services-sync/keys.js"); michael@0: Cu.import("resource://services-sync/service.js"); michael@0: Cu.import("resource://services-sync/util.js"); michael@0: Cu.import("resource://testing-common/services/sync/fakeservices.js"); michael@0: Cu.import("resource://testing-common/services/sync/utils.js"); michael@0: michael@0: function run_test() { michael@0: let logger = Log.repository.rootLogger; michael@0: Log.repository.rootLogger.addAppender(new Log.DumpAppender()); michael@0: michael@0: let guidSvc = new FakeGUIDService(); michael@0: let clients = new ServerCollection(); michael@0: let meta_global = new ServerWBO('global'); michael@0: michael@0: let collectionsHelper = track_collections_helper(); michael@0: let upd = collectionsHelper.with_updated_collection; michael@0: let collections = collectionsHelper.collections; michael@0: michael@0: function wasCalledHandler(wbo) { michael@0: let handler = wbo.handler(); michael@0: return function() { michael@0: wbo.wasCalled = true; michael@0: handler.apply(this, arguments); michael@0: }; michael@0: } michael@0: michael@0: let keysWBO = new ServerWBO("keys"); michael@0: let cryptoColl = new ServerCollection({keys: keysWBO}); michael@0: let metaColl = new ServerCollection({global: meta_global}); michael@0: do_test_pending(); michael@0: michael@0: /** michael@0: * Handle the bulk DELETE request sent by wipeServer. michael@0: */ michael@0: function storageHandler(request, response) { michael@0: do_check_eq("DELETE", request.method); michael@0: do_check_true(request.hasHeader("X-Confirm-Delete")); michael@0: michael@0: _("Wiping out all collections."); michael@0: cryptoColl.delete({}); michael@0: clients.delete({}); michael@0: metaColl.delete({}); michael@0: michael@0: let ts = new_timestamp(); michael@0: collectionsHelper.update_collection("crypto", ts); michael@0: collectionsHelper.update_collection("clients", ts); michael@0: collectionsHelper.update_collection("meta", ts); michael@0: return_timestamp(request, response, ts); michael@0: } michael@0: michael@0: let server = httpd_setup({ michael@0: "/1.1/johndoe/storage": storageHandler, michael@0: "/1.1/johndoe/storage/crypto/keys": upd("crypto", keysWBO.handler()), michael@0: "/1.1/johndoe/storage/crypto": upd("crypto", cryptoColl.handler()), michael@0: "/1.1/johndoe/storage/clients": upd("clients", clients.handler()), michael@0: "/1.1/johndoe/storage/meta/global": upd("meta", wasCalledHandler(meta_global)), michael@0: "/1.1/johndoe/storage/meta": upd("meta", wasCalledHandler(metaColl)), michael@0: "/1.1/johndoe/info/collections": collectionsHelper.handler michael@0: }); michael@0: michael@0: try { michael@0: _("Log in."); michael@0: ensureLegacyIdentityManager(); michael@0: Service.serverURL = server.baseURI; michael@0: michael@0: _("Checking Status.sync with no credentials."); michael@0: Service.verifyAndFetchSymmetricKeys(); michael@0: do_check_eq(Service.status.sync, CREDENTIALS_CHANGED); michael@0: do_check_eq(Service.status.login, LOGIN_FAILED_NO_PASSPHRASE); michael@0: michael@0: _("Log in with an old secret phrase, is upgraded to Sync Key."); michael@0: Service.login("johndoe", "ilovejane", "my old secret phrase!!1!"); michael@0: _("End of login"); michael@0: do_check_true(Service.isLoggedIn); michael@0: do_check_true(Utils.isPassphrase(Service.identity.syncKey)); michael@0: let syncKey = Service.identity.syncKey; michael@0: Service.startOver(); michael@0: michael@0: Service.serverURL = server.baseURI; michael@0: Service.login("johndoe", "ilovejane", syncKey); michael@0: do_check_true(Service.isLoggedIn); michael@0: michael@0: _("Checking that remoteSetup returns true when credentials have changed."); michael@0: Service.recordManager.get(Service.metaURL).payload.syncID = "foobar"; michael@0: do_check_true(Service._remoteSetup()); michael@0: michael@0: _("Do an initial sync."); michael@0: let beforeSync = Date.now()/1000; michael@0: Service.sync(); michael@0: michael@0: _("Checking that remoteSetup returns true."); michael@0: do_check_true(Service._remoteSetup()); michael@0: michael@0: _("Verify that the meta record was uploaded."); michael@0: do_check_eq(meta_global.data.syncID, Service.syncID); michael@0: do_check_eq(meta_global.data.storageVersion, STORAGE_VERSION); michael@0: do_check_eq(meta_global.data.engines.clients.version, Service.clientsEngine.version); michael@0: do_check_eq(meta_global.data.engines.clients.syncID, Service.clientsEngine.syncID); michael@0: michael@0: _("Set the collection info hash so that sync() will remember the modified times for future runs."); michael@0: collections.meta = Service.clientsEngine.lastSync; michael@0: collections.clients = Service.clientsEngine.lastSync; michael@0: Service.sync(); michael@0: michael@0: _("Sync again and verify that meta/global wasn't downloaded again"); michael@0: meta_global.wasCalled = false; michael@0: Service.sync(); michael@0: do_check_false(meta_global.wasCalled); michael@0: michael@0: _("Fake modified records. This will cause a redownload, but not reupload since it hasn't changed."); michael@0: collections.meta += 42; michael@0: meta_global.wasCalled = false; michael@0: michael@0: let metaModified = meta_global.modified; michael@0: michael@0: Service.sync(); michael@0: do_check_true(meta_global.wasCalled); michael@0: do_check_eq(metaModified, meta_global.modified); michael@0: michael@0: _("Checking bad passphrases."); michael@0: let pp = Service.identity.syncKey; michael@0: Service.identity.syncKey = "notvalid"; michael@0: do_check_false(Service.verifyAndFetchSymmetricKeys()); michael@0: do_check_eq(Service.status.sync, CREDENTIALS_CHANGED); michael@0: do_check_eq(Service.status.login, LOGIN_FAILED_INVALID_PASSPHRASE); michael@0: Service.identity.syncKey = pp; michael@0: do_check_true(Service.verifyAndFetchSymmetricKeys()); michael@0: michael@0: // changePassphrase wipes our keys, and they're regenerated on next sync. michael@0: _("Checking changed passphrase."); michael@0: let existingDefault = Service.collectionKeys.keyForCollection(); michael@0: let existingKeysPayload = keysWBO.payload; michael@0: let newPassphrase = "bbbbbabcdeabcdeabcdeabcdea"; michael@0: Service.changePassphrase(newPassphrase); michael@0: michael@0: _("Local key cache is full, but different."); michael@0: do_check_true(!!Service.collectionKeys._default); michael@0: do_check_false(Service.collectionKeys._default.equals(existingDefault)); michael@0: michael@0: _("Server has new keys."); michael@0: do_check_true(!!keysWBO.payload); michael@0: do_check_true(!!keysWBO.modified); michael@0: do_check_neq(keysWBO.payload, existingKeysPayload); michael@0: michael@0: // Try to screw up HMAC calculation. michael@0: // Re-encrypt keys with a new random keybundle, and upload them to the michael@0: // server, just as might happen with a second client. michael@0: _("Attempting to screw up HMAC by re-encrypting keys."); michael@0: let keys = Service.collectionKeys.asWBO(); michael@0: let b = new BulkKeyBundle("hmacerror"); michael@0: b.generateRandom(); michael@0: collections.crypto = keys.modified = 100 + (Date.now()/1000); // Future modification time. michael@0: keys.encrypt(b); michael@0: keys.upload(Service.resource(Service.cryptoKeysURL)); michael@0: michael@0: do_check_false(Service.verifyAndFetchSymmetricKeys()); michael@0: do_check_eq(Service.status.login, LOGIN_FAILED_INVALID_PASSPHRASE); michael@0: michael@0: } finally { michael@0: Svc.Prefs.resetBranch(""); michael@0: server.stop(do_test_finished); michael@0: } michael@0: }