mirror of
https://github.com/bitwarden/android.git
synced 2024-11-01 07:35:52 +03:00
2e8824ce05
* Account Switching (#1720) * Account switching * WIP * wip * wip * updates to send test logic * fixed Send tests * fixes for theme handling on account switching and re-adding existing account * switch fixes * fixes * fixes * cleanup * vault timeout fixes * account list status enhancements * logout fixes and token handling improvements * merge latest (#1727) * remove duplicate dependency * fix for initial login token storage paradox (#1730) * Fix avatar color update toolbar item issue on iOS for account switching (#1735) * Updated account switching menu UI (#1733) * updated account switching menu UI * additional changes * add key suffix to constant * GetFirstLetters method tweaks * Fix crash on account switching when logging out when having more than user at a time (#1740) * single account migration to multi-account on app update (#1741) * Account Switching Tap to dismiss (#1743) * Added tap to dismiss on the Account switching overlay and improved a bit the code * Fix account switching overlay background transparent on the proper place * Fixed transparent background and the shadow on the account switching overlay * Fix iOS top space on Account switching list overlay after modal (#1746) * Fix top space added to Account switching list overlay after closing modal * Fix top space added to Account switching list overlay after closing modal on lock, login and home views just in case we add modals in the future there as well * Usability: dismiss account list on certain events (#1748) * dismiss account list on certain events * use new FireAndForget method for back button logic * Create and use Account Switching overlay control (#1753) * Added Account switching overlay control and its own ViewModel and refactored accordingly * Fix account switching Accounts list binding update * Implemented dismiss account switching overlay when changing tabs and when selecting the same tab. Also updated the deprecated listener on CustomTabbedRenderer on Android (#1755) * Overriden Equals on AvatarImageSource so it doesn't get set multiple times when it's the same image thus producing blinking on tab chaged (#1756) * Usability improvements for logout on vault timeout (#1781) * accountswitching fixes (#1784) * Fix for invalid PIN lock state when switching accounts (#1792) * fix for pin lock flow * named tuple values and updated async * clear send service cache on account switch (#1796) * Global theme and account removal (#1793) * Global theme and account removal * remove redundant call to hide account list overlay * cleanup and additional tweaks * add try/catch to remove account dialog flow Co-authored-by: Federico Maccaroni <fedemkr@gmail.com>
383 lines
20 KiB
C#
383 lines
20 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Linq;
|
|
using System.Threading.Tasks;
|
|
using Bit.Core.Abstractions;
|
|
using Bit.Core.Models.Data;
|
|
using Bit.Core.Models.Domain;
|
|
using Bit.Core.Models.Response;
|
|
using Bit.Core.Services;
|
|
using Bit.Core.Utilities;
|
|
using Bit.Core.Enums;
|
|
using Bit.Test.Common;
|
|
using Bit.Test.Common.AutoFixture;
|
|
using Bit.Test.Common.AutoFixture.Attributes;
|
|
using Newtonsoft.Json;
|
|
using NSubstitute;
|
|
using Xunit;
|
|
using System.Text;
|
|
using System.Net.Http;
|
|
using Bit.Core.Models.Request;
|
|
using Bit.Core.Test.AutoFixture;
|
|
using System.Linq.Expressions;
|
|
using Bit.Core.Models.View;
|
|
using Bit.Core.Exceptions;
|
|
using NSubstitute.ExceptionExtensions;
|
|
|
|
namespace Bit.Core.Test.Services
|
|
{
|
|
public class SendServiceTests
|
|
{
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task ReplaceAsync_Success(SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> sendDatas)
|
|
{
|
|
var actualSendDataDict = sendDatas.ToDictionary(d => d.Id, d => d);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
|
|
await sutProvider.Sut.ReplaceAsync(actualSendDataDict);
|
|
|
|
await sutProvider.GetDependency<IStateService>().SetEncryptedSendsAsync(actualSendDataDict);
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) }, 0)]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) }, 1)]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) }, 2)]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) }, 3)]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) }, 4)]
|
|
public async Task DeleteAsync_Success(int numberToDelete, SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> sendDatas)
|
|
{
|
|
var actualSendDataDict = sendDatas.ToDictionary(d => d.Id, d => d);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IStateService>().GetEncryptedSendsAsync().Returns(actualSendDataDict);
|
|
|
|
var idsToDelete = actualSendDataDict.Take(numberToDelete).Select(kvp => kvp.Key).ToArray();
|
|
var expectedSends = actualSendDataDict.Skip(numberToDelete).ToDictionary(kvp => kvp.Key, kvp => kvp.Value);
|
|
|
|
await sutProvider.Sut.DeleteAsync(idsToDelete);
|
|
|
|
|
|
await sutProvider.GetDependency<IStateService>().SetEncryptedSendsAsync(
|
|
Arg.Is<Dictionary<string, SendData>>(s => TestHelper.AssertEqualExpectedPredicate(expectedSends)(s)));
|
|
}
|
|
|
|
[Theory, SutAutoData]
|
|
public async Task ClearAsync_Success(SutProvider<SendService> sutProvider, string userId)
|
|
{
|
|
await sutProvider.Sut.ClearAsync(userId);
|
|
|
|
await sutProvider.GetDependency<IStateService>().SetEncryptedSendsAsync(null, userId);
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task DeleteWithServerAsync_Success(SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> sendDatas)
|
|
{
|
|
var initialSendDatas = sendDatas.ToDictionary(d => d.Id, d => d);
|
|
var idToDelete = initialSendDatas.First().Key;
|
|
var expectedSends = initialSendDatas.Skip(1).ToDictionary(kvp => kvp.Key, kvp => kvp.Value);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IStateService>()
|
|
.GetEncryptedSendsAsync(Arg.Any<string>()).Returns(initialSendDatas);
|
|
|
|
await sutProvider.Sut.DeleteWithServerAsync(idToDelete);
|
|
|
|
await sutProvider.GetDependency<IApiService>().Received(1).DeleteSendAsync(idToDelete);
|
|
await sutProvider.GetDependency<IStateService>().SetEncryptedSendsAsync(
|
|
Arg.Is<Dictionary<string, SendData>>(s => TestHelper.AssertEqualExpectedPredicate(expectedSends)(s)));
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task GetAsync_Success(SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> sendDatas)
|
|
{
|
|
var sendDataDict = sendDatas.ToDictionary(d => d.Id, d => d);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IStateService>().GetEncryptedSendsAsync().Returns(sendDataDict);
|
|
|
|
foreach (var dataKvp in sendDataDict)
|
|
{
|
|
var expected = new Send(dataKvp.Value);
|
|
var actual = await sutProvider.Sut.GetAsync(dataKvp.Key);
|
|
TestHelper.AssertPropertyEqual(expected, actual);
|
|
}
|
|
}
|
|
|
|
[Theory, SutAutoData]
|
|
public async Task GetAsync_NonExistingId_ReturnsNull(SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> sendDatas)
|
|
{
|
|
var sendDataDict = sendDatas.ToDictionary(d => d.Id, d => d);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IStateService>().GetEncryptedSendsAsync().Returns(sendDataDict);
|
|
|
|
var actual = await sutProvider.Sut.GetAsync(Guid.NewGuid().ToString());
|
|
|
|
Assert.Null(actual);
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task GetAllAsync_Success(SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> sendDatas)
|
|
{
|
|
var sendDataDict = sendDatas.ToDictionary(d => d.Id, d => d);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IStateService>().GetEncryptedSendsAsync().Returns(sendDataDict);
|
|
|
|
var allExpected = sendDataDict.Select(kvp => new Send(kvp.Value));
|
|
var allActual = await sutProvider.Sut.GetAllAsync();
|
|
foreach (var (actual, expected) in allActual.Zip(allExpected))
|
|
{
|
|
TestHelper.AssertPropertyEqual(expected, actual);
|
|
}
|
|
}
|
|
|
|
[Theory, SutAutoData]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task GetAllDecryptedAsync_Success(SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> sendDatas)
|
|
{
|
|
// TODO restore this once race condition is fixed or GHA can re-run jobs on individual platforms
|
|
return;
|
|
|
|
var sendDataDict = sendDatas.ToDictionary(d => d.Id, d => d);
|
|
sutProvider.GetDependency<ICryptoService>().HasKeyAsync().Returns(true);
|
|
ServiceContainer.Register("cryptoService", sutProvider.GetDependency<ICryptoService>());
|
|
sutProvider.GetDependency<II18nService>().StringComparer.Returns(StringComparer.CurrentCulture);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IStateService>().GetEncryptedSendsAsync().Returns(sendDataDict);
|
|
|
|
var actual = await sutProvider.Sut.GetAllDecryptedAsync();
|
|
|
|
Assert.Equal(sendDataDict.Count, actual.Count);
|
|
foreach (var (actualView, expectedId) in actual.Zip(sendDataDict.Select(s => s.Key)))
|
|
{
|
|
// Note Send -> SendView is tested in SendTests
|
|
Assert.Equal(expectedId, actualView.Id);
|
|
}
|
|
|
|
ServiceContainer.Reset();
|
|
}
|
|
|
|
// SaveWithServer()
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
public async Task SaveWithServerAsync_NewTextSend_Success(SutProvider<SendService> sutProvider, string userId, SendResponse response, Send send)
|
|
{
|
|
send.Id = null;
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IApiService>().PostSendAsync(Arg.Any<SendRequest>()).Returns(response);
|
|
|
|
var fileContentBytes = new EncByteArray(Encoding.UTF8.GetBytes("This is the file content"));
|
|
|
|
await sutProvider.Sut.SaveWithServerAsync(send, fileContentBytes);
|
|
|
|
Predicate<SendRequest> sendRequestPredicate = r =>
|
|
{
|
|
// Note Send -> SendRequest tested in SendRequestTests
|
|
TestHelper.AssertPropertyEqual(new SendRequest(send, fileContentBytes.Buffer?.LongLength), r);
|
|
return true;
|
|
};
|
|
|
|
switch (send.Type)
|
|
{
|
|
case SendType.Text:
|
|
await sutProvider.GetDependency<IApiService>().Received(1)
|
|
.PostSendAsync(Arg.Is<SendRequest>(r => sendRequestPredicate(r)));
|
|
break;
|
|
case SendType.File:
|
|
default:
|
|
throw new Exception("Untested send type");
|
|
}
|
|
}
|
|
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task SaveWithServerAsync_NewFileSend_AzureUpload_Success(SutProvider<SendService> sutProvider, string userId, SendFileUploadDataResponse response, Send send)
|
|
{
|
|
send.Id = null;
|
|
response.FileUploadType = FileUploadType.Azure;
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IApiService>().PostFileTypeSendAsync(Arg.Any<SendRequest>()).Returns(response);
|
|
|
|
var fileContentBytes = new EncByteArray(Encoding.UTF8.GetBytes("This is the file content"));
|
|
|
|
await sutProvider.Sut.SaveWithServerAsync(send, fileContentBytes);
|
|
|
|
switch (send.Type)
|
|
{
|
|
case SendType.File:
|
|
await sutProvider.GetDependency<IFileUploadService>().Received(1).UploadSendFileAsync(response, send.File.FileName, fileContentBytes);
|
|
break;
|
|
case SendType.Text:
|
|
default:
|
|
throw new Exception("Untested send type");
|
|
}
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task SaveWithServerAsync_NewFileSend_LegacyFallback_Success(SutProvider<SendService> sutProvider, string userId, Send send, SendResponse response)
|
|
{
|
|
send.Id = null;
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
var error = new ErrorResponse(null, System.Net.HttpStatusCode.NotFound);
|
|
sutProvider.GetDependency<IApiService>().PostFileTypeSendAsync(Arg.Any<SendRequest>()).Throws(new ApiException(error));
|
|
sutProvider.GetDependency<IApiService>().PostSendFileAsync(Arg.Any<MultipartFormDataContent>()).Returns(response);
|
|
|
|
var fileContentBytes = new EncByteArray(Encoding.UTF8.GetBytes("This is the file content"));
|
|
|
|
await sutProvider.Sut.SaveWithServerAsync(send, fileContentBytes);
|
|
|
|
await sutProvider.GetDependency<IApiService>().Received(1).PostSendFileAsync(Arg.Any<MultipartFormDataContent>());
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task SaveWithServerAsync_PutSend_Success(SutProvider<SendService> sutProvider, string userId, SendResponse response, Send send)
|
|
{
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IApiService>().PutSendAsync(send.Id, Arg.Any<SendRequest>()).Returns(response);
|
|
|
|
await sutProvider.Sut.SaveWithServerAsync(send, null);
|
|
|
|
Predicate<SendRequest> sendRequestPredicate = r =>
|
|
{
|
|
// Note Send -> SendRequest tested in SendRequestTests
|
|
TestHelper.AssertPropertyEqual(new SendRequest(send, null), r);
|
|
return true;
|
|
};
|
|
|
|
await sutProvider.GetDependency<IApiService>().Received(1)
|
|
.PutSendAsync(send.Id, Arg.Is<SendRequest>(r => sendRequestPredicate(r)));
|
|
}
|
|
|
|
[Theory, SutAutoData]
|
|
public async Task RemovePasswordWithServerAsync_Success(SutProvider<SendService> sutProvider, SendResponse response, string sendId)
|
|
{
|
|
sutProvider.GetDependency<IApiService>().PutSendRemovePasswordAsync(sendId).Returns(response);
|
|
|
|
await sutProvider.Sut.RemovePasswordWithServerAsync(sendId);
|
|
|
|
await sutProvider.GetDependency<IApiService>().Received(1).PutSendRemovePasswordAsync(sendId);
|
|
await sutProvider.GetDependency<IStateService>().SetEncryptedSendsAsync(default, default);
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task UpsertAsync_Update_Success(SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> initialSends)
|
|
{
|
|
var initialSendDict = initialSends.ToDictionary(s => s.Id, s => s);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IStateService>().GetEncryptedSendsAsync().Returns(initialSendDict);
|
|
|
|
var updatedSends = CoreHelpers.Clone(initialSendDict);
|
|
foreach (var kvp in updatedSends)
|
|
{
|
|
kvp.Value.Disabled = !kvp.Value.Disabled;
|
|
}
|
|
|
|
await sutProvider.Sut.UpsertAsync(updatedSends.Values.ToArray());
|
|
|
|
Predicate<Dictionary<string, SendData>> matchSendsPredicate = actual =>
|
|
{
|
|
Assert.Equal(updatedSends.Count, actual.Count);
|
|
foreach (var (expectedKvp, actualKvp) in updatedSends.Zip(actual))
|
|
{
|
|
Assert.Equal(expectedKvp.Key, actualKvp.Key);
|
|
TestHelper.AssertPropertyEqual(expectedKvp.Value, actualKvp.Value);
|
|
}
|
|
return true;
|
|
};
|
|
await sutProvider.GetDependency<IStateService>().SetEncryptedSendsAsync(
|
|
Arg.Is<Dictionary<string, SendData>>(d => matchSendsPredicate(d)));
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(FileSendCustomization) })]
|
|
public async Task UpsertAsync_NewSends_Success(SutProvider<SendService> sutProvider, string userId, IEnumerable<SendData> initialSends, IEnumerable<SendData> newSends)
|
|
{
|
|
var initialSendDict = initialSends.ToDictionary(s => s.Id, s => s);
|
|
sutProvider.GetDependency<IStateService>().GetActiveUserIdAsync().Returns(userId);
|
|
sutProvider.GetDependency<IStateService>().GetEncryptedSendsAsync().Returns(initialSendDict);
|
|
|
|
var expectedDict = CoreHelpers.Clone(initialSendDict).Concat(newSends.Select(s => new KeyValuePair<string, SendData>(s.Id, s)));
|
|
|
|
await sutProvider.Sut.UpsertAsync(newSends.ToArray());
|
|
|
|
Predicate<Dictionary<string, SendData>> matchSendsPredicate = actual =>
|
|
{
|
|
Assert.Equal(expectedDict.Count(), actual.Count);
|
|
foreach (var (expectedKvp, actualKvp) in expectedDict.Zip(actual))
|
|
{
|
|
Assert.Equal(expectedKvp.Key, actualKvp.Key);
|
|
TestHelper.AssertPropertyEqual(expectedKvp.Value, actualKvp.Value);
|
|
}
|
|
return true;
|
|
};
|
|
await sutProvider.GetDependency<IStateService>().SetEncryptedSendsAsync(
|
|
Arg.Is<Dictionary<string, SendData>>(d => matchSendsPredicate(d)));
|
|
}
|
|
|
|
[Theory]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(SymmetricCryptoKeyCustomization), typeof(TextSendCustomization) })]
|
|
[InlineCustomAutoData(new[] { typeof(SutProviderCustomization), typeof(SymmetricCryptoKeyCustomization), typeof(FileSendCustomization) })]
|
|
public async Task EncryptAsync_Success(SutProvider<SendService> sutProvider, SendView view, byte[] fileData, SymmetricCryptoKey privateKey)
|
|
{
|
|
var prefix = "encrypted_";
|
|
var prefixBytes = Encoding.UTF8.GetBytes(prefix);
|
|
|
|
|
|
byte[] getPbkdf(string password, byte[] key) =>
|
|
prefixBytes.Concat(Encoding.UTF8.GetBytes(password)).Concat(key).ToArray();
|
|
EncString encryptBytes(byte[] secret, SymmetricCryptoKey key) =>
|
|
new EncString($"{prefix}{Convert.ToBase64String(secret)}{Convert.ToBase64String(key.Key)}");
|
|
EncString encrypt(string secret, SymmetricCryptoKey key) =>
|
|
new EncString($"{prefix}{secret}{Convert.ToBase64String(key.Key)}");
|
|
EncByteArray encryptFileBytes(byte[] secret, SymmetricCryptoKey key) =>
|
|
new EncByteArray(secret.Concat(key.Key).ToArray());
|
|
|
|
sutProvider.GetDependency<ICryptoFunctionService>().Pbkdf2Async(Arg.Any<string>(), Arg.Any<byte[]>(), Arg.Any<CryptoHashAlgorithm>(), Arg.Any<int>())
|
|
.Returns(info => getPbkdf((string)info[0], (byte[])info[1]));
|
|
sutProvider.GetDependency<ICryptoService>().EncryptAsync(Arg.Any<byte[]>(), Arg.Any<SymmetricCryptoKey>())
|
|
.Returns(info => encryptBytes((byte[])info[0], (SymmetricCryptoKey)info[1]));
|
|
sutProvider.GetDependency<ICryptoService>().EncryptAsync(Arg.Any<string>(), Arg.Any<SymmetricCryptoKey>())
|
|
.Returns(info => encrypt((string)info[0], (SymmetricCryptoKey)info[1]));
|
|
sutProvider.GetDependency<ICryptoService>().EncryptToBytesAsync(Arg.Any<byte[]>(), Arg.Any<SymmetricCryptoKey>())
|
|
.Returns(info => encryptFileBytes((byte[])info[0], (SymmetricCryptoKey)info[1]));
|
|
|
|
var (send, encryptedFileData) = await sutProvider.Sut.EncryptAsync(view, fileData, view.Password, privateKey);
|
|
|
|
TestHelper.AssertPropertyEqual(view, send, "Password", "Key", "Name", "Notes", "Text", "File",
|
|
"AccessCount", "AccessId", "CryptoKey", "RevisionDate", "DeletionDate", "ExpirationDate", "UrlB64Key",
|
|
"MaxAccessCountReached", "Expired", "PendingDelete", "HasPassword", "DisplayDate");
|
|
Assert.Equal(Convert.ToBase64String(getPbkdf(view.Password, view.Key)), send.Password);
|
|
TestHelper.AssertPropertyEqual(encryptBytes(view.Key, privateKey), send.Key);
|
|
TestHelper.AssertPropertyEqual(encrypt(view.Name, view.CryptoKey), send.Name);
|
|
TestHelper.AssertPropertyEqual(encrypt(view.Notes, view.CryptoKey), send.Notes);
|
|
|
|
switch (view.Type)
|
|
{
|
|
case SendType.Text:
|
|
TestHelper.AssertPropertyEqual(view.Text, send.Text, "Text", "MaskedText");
|
|
TestHelper.AssertPropertyEqual(encrypt(view.Text.Text, view.CryptoKey), send.Text.Text);
|
|
break;
|
|
case SendType.File:
|
|
// Only set filename
|
|
TestHelper.AssertPropertyEqual(encrypt(view.File.FileName, view.CryptoKey), send.File.FileName);
|
|
Assert.Equal(encryptFileBytes(fileData, view.CryptoKey).Buffer, encryptedFileData.Buffer);
|
|
break;
|
|
default:
|
|
throw new Exception("Untested send type");
|
|
}
|
|
}
|
|
}
|
|
}
|