mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
57109455df
Refactor Service._checkSetup() to Status.checkSetup(). Also move the test fixture for WeaveCryptoID to the individual tests that need it.
414 lines
12 KiB
JavaScript
414 lines
12 KiB
JavaScript
// initialize nss
|
|
let ch = Cc["@mozilla.org/security/hash;1"].
|
|
createInstance(Ci.nsICryptoHash);
|
|
|
|
let ds = Cc["@mozilla.org/file/directory_service;1"]
|
|
.getService(Ci.nsIProperties);
|
|
|
|
let provider = {
|
|
getFile: function(prop, persistent) {
|
|
persistent.value = true;
|
|
switch (prop) {
|
|
case "ExtPrefDL":
|
|
return [ds.get("CurProcD", Ci.nsIFile)];
|
|
case "ProfD":
|
|
return ds.get("CurProcD", Ci.nsIFile);
|
|
case "UHist":
|
|
let histFile = ds.get("CurProcD", Ci.nsIFile);
|
|
histFile.append("history.dat");
|
|
return histFile;
|
|
default:
|
|
throw Cr.NS_ERROR_FAILURE;
|
|
}
|
|
},
|
|
QueryInterface: function(iid) {
|
|
if (iid.equals(Ci.nsIDirectoryServiceProvider) ||
|
|
iid.equals(Ci.nsISupports)) {
|
|
return this;
|
|
}
|
|
throw Cr.NS_ERROR_NO_INTERFACE;
|
|
}
|
|
};
|
|
ds.QueryInterface(Ci.nsIDirectoryService).registerProvider(provider);
|
|
|
|
function loadInSandbox(aUri) {
|
|
var sandbox = Components.utils.Sandbox(this);
|
|
var request = Components.
|
|
classes["@mozilla.org/xmlextras/xmlhttprequest;1"].
|
|
createInstance();
|
|
|
|
request.open("GET", aUri, false);
|
|
request.overrideMimeType("application/javascript");
|
|
request.send(null);
|
|
Components.utils.evalInSandbox(request.responseText, sandbox, "1.8");
|
|
|
|
return sandbox;
|
|
}
|
|
|
|
function FakeTimerService() {
|
|
Cu.import("resource://services-sync/util.js");
|
|
|
|
this.callbackQueue = [];
|
|
|
|
var self = this;
|
|
|
|
this.__proto__ = {
|
|
makeTimerForCall: function FTS_makeTimerForCall(cb) {
|
|
// Just add the callback to our queue and we'll call it later, so
|
|
// as to simulate a real nsITimer.
|
|
self.callbackQueue.push(cb);
|
|
return "fake nsITimer";
|
|
},
|
|
processCallback: function FTS_processCallbacks() {
|
|
var cb = self.callbackQueue.pop();
|
|
if (cb) {
|
|
cb();
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
};
|
|
|
|
Utils.makeTimerForCall = self.makeTimerForCall;
|
|
};
|
|
|
|
Cu.import("resource://services-sync/log4moz.js");
|
|
function getTestLogger(component) {
|
|
return Log4Moz.repository.getLogger("Testing");
|
|
}
|
|
|
|
function initTestLogging(level) {
|
|
function LogStats() {
|
|
this.errorsLogged = 0;
|
|
}
|
|
LogStats.prototype = {
|
|
format: function BF_format(message) {
|
|
if (message.level == Log4Moz.Level.Error)
|
|
this.errorsLogged += 1;
|
|
return message.loggerName + "\t" + message.levelDesc + "\t" +
|
|
message.message + "\n";
|
|
}
|
|
};
|
|
LogStats.prototype.__proto__ = new Log4Moz.Formatter();
|
|
|
|
var log = Log4Moz.repository.rootLogger;
|
|
var logStats = new LogStats();
|
|
var appender = new Log4Moz.DumpAppender(logStats);
|
|
|
|
if (typeof(level) == "undefined")
|
|
level = "Debug";
|
|
getTestLogger().level = Log4Moz.Level[level];
|
|
|
|
log.level = Log4Moz.Level.Trace;
|
|
appender.level = Log4Moz.Level.Trace;
|
|
// Overwrite any other appenders (e.g. from previous incarnations)
|
|
log._appenders = [appender];
|
|
|
|
return logStats;
|
|
}
|
|
|
|
function FakePrefService(contents) {
|
|
Cu.import("resource://services-sync/util.js");
|
|
this.fakeContents = contents;
|
|
Utils.__prefs = this;
|
|
}
|
|
|
|
FakePrefService.prototype = {
|
|
_getPref: function fake__getPref(pref) {
|
|
getTestLogger().trace("Getting pref: " + pref);
|
|
return this.fakeContents[pref];
|
|
},
|
|
getCharPref: function fake_getCharPref(pref) {
|
|
return this._getPref(pref);
|
|
},
|
|
getBoolPref: function fake_getBoolPref(pref) {
|
|
return this._getPref(pref);
|
|
},
|
|
getIntPref: function fake_getIntPref(pref) {
|
|
return this._getPref(pref);
|
|
},
|
|
addObserver: function fake_addObserver() {}
|
|
};
|
|
|
|
function FakePasswordService(contents) {
|
|
Cu.import("resource://services-sync/util.js");
|
|
|
|
this.fakeContents = contents;
|
|
let self = this;
|
|
|
|
Utils.findPassword = function fake_findPassword(realm, username) {
|
|
getTestLogger().trace("Password requested for " +
|
|
realm + ":" + username);
|
|
if (realm in self.fakeContents && username in self.fakeContents[realm])
|
|
return self.fakeContents[realm][username];
|
|
else
|
|
return null;
|
|
};
|
|
};
|
|
|
|
function FakeFilesystemService(contents) {
|
|
this.fakeContents = contents;
|
|
|
|
let self = this;
|
|
|
|
Utils.getProfileFile = function fake_getProfileFile(arg) {
|
|
let fakeNsILocalFile = {
|
|
exists: function() {
|
|
return this._fakeFilename in self.fakeContents;
|
|
},
|
|
_fakeFilename: (typeof(arg) == "object") ? arg.path : arg
|
|
};
|
|
return fakeNsILocalFile;
|
|
};
|
|
|
|
Utils.readStream = function fake_readStream(stream) {
|
|
getTestLogger().info("Reading from stream.");
|
|
return stream._fakeData;
|
|
};
|
|
|
|
Utils.open = function fake_open(file, mode) {
|
|
switch (mode) {
|
|
case "<":
|
|
mode = "reading";
|
|
break;
|
|
case ">":
|
|
mode = "writing";
|
|
break;
|
|
default:
|
|
throw new Error("Unexpected mode: " + mode);
|
|
}
|
|
|
|
getTestLogger().info("Opening '" + file._fakeFilename + "' for " +
|
|
mode + ".");
|
|
var contents = "";
|
|
if (file._fakeFilename in self.fakeContents && mode == "reading")
|
|
contents = self.fakeContents[file._fakeFilename];
|
|
let fakeStream = {
|
|
writeString: function(data) {
|
|
contents += data;
|
|
getTestLogger().info("Writing data to local file '" +
|
|
file._fakeFilename +"': " + data);
|
|
},
|
|
close: function() {
|
|
self.fakeContents[file._fakeFilename] = contents;
|
|
},
|
|
get _fakeData() { return contents; }
|
|
};
|
|
return [fakeStream];
|
|
};
|
|
};
|
|
|
|
function FakeGUIDService() {
|
|
let latestGUID = 0;
|
|
|
|
Utils.makeGUID = function fake_makeGUID() {
|
|
return "fake-guid-" + latestGUID++;
|
|
};
|
|
}
|
|
|
|
|
|
/*
|
|
* Mock implementation of IWeaveCrypto. It does not encrypt or
|
|
* decrypt, just returns the input verbatimly.
|
|
*/
|
|
function FakeCryptoService() {
|
|
this.counter = 0;
|
|
|
|
delete Svc.Crypto; // get rid of the getter first
|
|
Svc.Crypto = this;
|
|
Utils.sha256HMAC = this.sha256HMAC;
|
|
}
|
|
FakeCryptoService.prototype = {
|
|
|
|
sha256HMAC: function(message, key) {
|
|
message = message.substr(0, 64);
|
|
while (message.length < 64) {
|
|
message += " ";
|
|
}
|
|
return message;
|
|
},
|
|
|
|
encrypt: function(aClearText, aSymmetricKey, aIV) {
|
|
return aClearText;
|
|
},
|
|
|
|
decrypt: function(aCipherText, aSymmetricKey, aIV) {
|
|
return aCipherText;
|
|
},
|
|
|
|
generateKeypair: function(aPassphrase, aSalt, aIV,
|
|
aEncodedPublicKey, aWrappedPrivateKey) {
|
|
aEncodedPublicKey.value = aPassphrase;
|
|
aWrappedPrivateKey.value = aPassphrase;
|
|
},
|
|
|
|
generateRandomKey: function() {
|
|
return "fake-symmetric-key-" + this.counter++;
|
|
},
|
|
|
|
generateRandomIV: function() {
|
|
// A base64-encoded IV is 24 characters long
|
|
return "fake-fake-fake-random-iv";
|
|
},
|
|
|
|
generateRandomBytes: function(aByteCount) {
|
|
return "not-so-random-now-are-we-HA-HA-HA! >:)".slice(aByteCount);
|
|
},
|
|
|
|
wrapSymmetricKey: function(aSymmetricKey, aEncodedPublicKey) {
|
|
return aSymmetricKey;
|
|
},
|
|
|
|
unwrapSymmetricKey: function(aWrappedSymmetricKey, aWrappedPrivateKey,
|
|
aPassphrase, aSalt, aIV) {
|
|
if (!this.verifyPassphrase(aWrappedPrivateKey, aPassphrase)) {
|
|
throw Components.Exception("Unwrapping the private key failed",
|
|
Cr.NS_ERROR_FAILURE);
|
|
}
|
|
return aWrappedSymmetricKey;
|
|
},
|
|
|
|
rewrapPrivateKey: function(aWrappedPrivateKey, aPassphrase, aSalt, aIV,
|
|
aNewPassphrase) {
|
|
return aNewPassphrase;
|
|
},
|
|
|
|
verifyPassphrase: function(aWrappedPrivateKey, aPassphrase, aSalt, aIV) {
|
|
return aWrappedPrivateKey == aPassphrase;
|
|
}
|
|
|
|
};
|
|
|
|
|
|
function SyncTestingInfrastructure(engineFactory) {
|
|
let __fakePasswords = {
|
|
'Mozilla Services Password': {foo: "bar"},
|
|
'Mozilla Services Encryption Passphrase': {foo: "passphrase"}
|
|
};
|
|
|
|
let __fakePrefs = {
|
|
"encryption" : "none",
|
|
"log.logger.service.crypto" : "Debug",
|
|
"log.logger.service.engine" : "Debug",
|
|
"log.logger.async" : "Debug",
|
|
"xmpp.enabled" : false
|
|
};
|
|
|
|
Cu.import("resource://services-sync/identity.js");
|
|
Cu.import("resource://services-sync/util.js");
|
|
|
|
ID.set('WeaveID',
|
|
new Identity('Mozilla Services Encryption Passphrase', 'foo'));
|
|
ID.set('WeaveCryptoID',
|
|
new Identity('Mozilla Services Encryption Passphrase', 'foo'));
|
|
|
|
this.fakePasswordService = new FakePasswordService(__fakePasswords);
|
|
this.fakePrefService = new FakePrefService(__fakePrefs);
|
|
this.fakeTimerService = new FakeTimerService();
|
|
this.logStats = initTestLogging();
|
|
this.fakeFilesystem = new FakeFilesystemService({});
|
|
this.fakeGUIDService = new FakeGUIDService();
|
|
this.fakeCryptoService = new FakeCryptoService();
|
|
|
|
this._logger = getTestLogger();
|
|
this._engineFactory = engineFactory;
|
|
this._clientStates = [];
|
|
|
|
this.saveClientState = function pushClientState(label) {
|
|
let state = Utils.deepCopy(this.fakeFilesystem.fakeContents);
|
|
let currContents = this.fakeFilesystem.fakeContents;
|
|
this.fakeFilesystem.fakeContents = [];
|
|
let engine = this._engineFactory();
|
|
let snapshot = Utils.deepCopy(engine._store.wrap());
|
|
this._clientStates[label] = {state: state, snapshot: snapshot};
|
|
this.fakeFilesystem.fakeContents = currContents;
|
|
};
|
|
|
|
this.restoreClientState = function restoreClientState(label) {
|
|
let state = this._clientStates[label].state;
|
|
let snapshot = this._clientStates[label].snapshot;
|
|
|
|
function _restoreState() {
|
|
let self = yield;
|
|
|
|
this.fakeFilesystem.fakeContents = [];
|
|
let engine = this._engineFactory();
|
|
engine._store.wipe();
|
|
let originalSnapshot = Utils.deepCopy(engine._store.wrap());
|
|
|
|
engine._core.detectUpdates(self.cb, originalSnapshot, snapshot);
|
|
let commands = yield;
|
|
|
|
engine._store.applyCommands.async(engine._store, self.cb, commands);
|
|
yield;
|
|
|
|
this.fakeFilesystem.fakeContents = Utils.deepCopy(state);
|
|
}
|
|
|
|
let self = this;
|
|
|
|
function restoreState(cb) {
|
|
_restoreState.async(self, cb);
|
|
}
|
|
|
|
this.runAsyncFunc("restore client state of " + label,
|
|
restoreState);
|
|
};
|
|
|
|
this.__makeCallback = function __makeCallback() {
|
|
this.__callbackCalled = false;
|
|
let self = this;
|
|
return function callback() {
|
|
self.__callbackCalled = true;
|
|
};
|
|
};
|
|
|
|
this.doSync = function doSync(name) {
|
|
let self = this;
|
|
|
|
function freshEngineSync(cb) {
|
|
let engine = self._engineFactory();
|
|
engine.sync(cb);
|
|
}
|
|
|
|
this.runAsyncFunc(name, freshEngineSync);
|
|
};
|
|
|
|
this.runAsyncFunc = function runAsyncFunc(name, func) {
|
|
let logger = this._logger;
|
|
|
|
logger.info("-----------------------------------------");
|
|
logger.info("Step '" + name + "' starting.");
|
|
logger.info("-----------------------------------------");
|
|
func(this.__makeCallback());
|
|
while (this.fakeTimerService.processCallback()) {}
|
|
do_check_true(this.__callbackCalled);
|
|
for (name in Async.outstandingGenerators)
|
|
logger.warn("Outstanding generator exists: " + name);
|
|
do_check_eq(this.logStats.errorsLogged, 0);
|
|
do_check_eq(Async.outstandingGenerators.length, 0);
|
|
logger.info("Step '" + name + "' succeeded.");
|
|
};
|
|
|
|
this.resetClientState = function resetClientState() {
|
|
this.fakeFilesystem.fakeContents = {};
|
|
let engine = this._engineFactory();
|
|
engine._store.wipe();
|
|
};
|
|
}
|
|
|
|
/**
|
|
* Print some debug message to the console. All arguments will be printed,
|
|
* separated by spaces.
|
|
*
|
|
* @param [arg0, arg1, arg2, ...]
|
|
* Any number of arguments to print out
|
|
* @usage _("Hello World") -> prints "Hello World"
|
|
* @usage _(1, 2, 3) -> prints "1 2 3"
|
|
*/
|
|
let _ = function(some, debug, text, to) print(Array.slice(arguments).join(" "));
|
|
|
|
_("Setting the identity for passphrase");
|
|
Cu.import("resource://services-sync/identity.js");
|
|
|