mirror of
https://github.com/vanitasvitae/Smack.git
synced 2024-11-23 20:42:06 +01:00
Add non-working integration tests
This commit is contained in:
parent
d1c5c519fd
commit
dc79a09240
6 changed files with 162 additions and 17 deletions
|
@ -30,7 +30,7 @@ import org.igniterealtime.smack.inttest.SmackIntegrationTestEnvironment;
|
||||||
import org.igniterealtime.smack.inttest.TestNotPossibleException;
|
import org.igniterealtime.smack.inttest.TestNotPossibleException;
|
||||||
import org.jxmpp.jid.BareJid;
|
import org.jxmpp.jid.BareJid;
|
||||||
|
|
||||||
public class AbstractOpenPgpIntegrationTest extends AbstractSmackIntegrationTest {
|
public abstract class AbstractOpenPgpIntegrationTest extends AbstractSmackIntegrationTest {
|
||||||
|
|
||||||
protected final XMPPConnection aliceConnection;
|
protected final XMPPConnection aliceConnection;
|
||||||
protected final XMPPConnection bobConnection;
|
protected final XMPPConnection bobConnection;
|
||||||
|
|
|
@ -16,12 +16,17 @@
|
||||||
*/
|
*/
|
||||||
package org.jivesoftware.smackx.openpgp;
|
package org.jivesoftware.smackx.openpgp;
|
||||||
|
|
||||||
|
import static junit.framework.TestCase.assertTrue;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
|
||||||
import org.jivesoftware.smack.SmackException;
|
import org.jivesoftware.smack.SmackException;
|
||||||
import org.jivesoftware.smack.XMPPException;
|
import org.jivesoftware.smack.XMPPException;
|
||||||
import org.jivesoftware.smack.packet.Message;
|
import org.jivesoftware.smack.packet.Message;
|
||||||
|
import org.jivesoftware.smack.roster.Roster;
|
||||||
import org.jivesoftware.smack.util.FileUtils;
|
import org.jivesoftware.smack.util.FileUtils;
|
||||||
|
import org.jivesoftware.smack.util.StringUtils;
|
||||||
import org.jivesoftware.smackx.ox.OXInstantMessagingManager;
|
import org.jivesoftware.smackx.ox.OXInstantMessagingManager;
|
||||||
import org.jivesoftware.smackx.ox.OpenPgpManager;
|
import org.jivesoftware.smackx.ox.OpenPgpManager;
|
||||||
import org.jivesoftware.smackx.ox.OpenPgpV4Fingerprint;
|
import org.jivesoftware.smackx.ox.OpenPgpV4Fingerprint;
|
||||||
|
@ -43,8 +48,8 @@ import org.junit.BeforeClass;
|
||||||
|
|
||||||
public class BasicOpenPgpInstantMessagingIntegrationTest extends AbstractOpenPgpIntegrationTest {
|
public class BasicOpenPgpInstantMessagingIntegrationTest extends AbstractOpenPgpIntegrationTest {
|
||||||
|
|
||||||
private static final File aliceStorePath = FileUtils.getTempDir("basic_ox_messaging_test_alice");
|
private static final File aliceStorePath = FileUtils.getTempDir("basic_ox_messaging_test_alice_" + StringUtils.randomString(10));
|
||||||
private static final File bobStorePath = FileUtils.getTempDir("basic_ox_messaging_test_bob");
|
private static final File bobStorePath = FileUtils.getTempDir("basic_ox_messaging_test_bob_" + StringUtils.randomString(10));
|
||||||
|
|
||||||
private OpenPgpV4Fingerprint aliceFingerprint = null;
|
private OpenPgpV4Fingerprint aliceFingerprint = null;
|
||||||
private OpenPgpV4Fingerprint bobFingerprint = null;
|
private OpenPgpV4Fingerprint bobFingerprint = null;
|
||||||
|
@ -66,9 +71,20 @@ public class BasicOpenPgpInstantMessagingIntegrationTest extends AbstractOpenPgp
|
||||||
public void basicInstantMessagingTest()
|
public void basicInstantMessagingTest()
|
||||||
throws Exception {
|
throws Exception {
|
||||||
|
|
||||||
|
LOGGER.log(Level.INFO, aliceStorePath.getAbsolutePath() + " " + bobStorePath.getAbsolutePath());
|
||||||
|
|
||||||
final SimpleResultSyncPoint bobReceivedMessage = new SimpleResultSyncPoint();
|
final SimpleResultSyncPoint bobReceivedMessage = new SimpleResultSyncPoint();
|
||||||
final String body = "Writing integration tests is an annoying task, but it has to be done, so lets do it!!!";
|
final String body = "Writing integration tests is an annoying task, but it has to be done, so lets do it!!!";
|
||||||
|
|
||||||
|
Roster aliceRoster = Roster.getInstanceFor(aliceConnection);
|
||||||
|
Roster bobRoster = Roster.getInstanceFor(bobConnection);
|
||||||
|
|
||||||
|
aliceRoster.setSubscriptionMode(Roster.SubscriptionMode.accept_all);
|
||||||
|
bobRoster.setSubscriptionMode(Roster.SubscriptionMode.accept_all);
|
||||||
|
|
||||||
|
aliceRoster.createEntry(bob, "Bob", null);
|
||||||
|
bobRoster.createEntry(alice, "Alice", null);
|
||||||
|
|
||||||
FileBasedPainlessOpenPgpStore aliceStore = new FileBasedPainlessOpenPgpStore(aliceStorePath, new UnprotectedKeysProtector());
|
FileBasedPainlessOpenPgpStore aliceStore = new FileBasedPainlessOpenPgpStore(aliceStorePath, new UnprotectedKeysProtector());
|
||||||
FileBasedPainlessOpenPgpStore bobStore = new FileBasedPainlessOpenPgpStore(bobStorePath, new UnprotectedKeysProtector());
|
FileBasedPainlessOpenPgpStore bobStore = new FileBasedPainlessOpenPgpStore(bobStorePath, new UnprotectedKeysProtector());
|
||||||
|
|
||||||
|
@ -95,19 +111,25 @@ public class BasicOpenPgpInstantMessagingIntegrationTest extends AbstractOpenPgp
|
||||||
aliceOpenPgp.setOpenPgpProvider(aliceProvider);
|
aliceOpenPgp.setOpenPgpProvider(aliceProvider);
|
||||||
bobOpenPgp.setOpenPgpProvider(bobProvider);
|
bobOpenPgp.setOpenPgpProvider(bobProvider);
|
||||||
|
|
||||||
aliceOpenPgp.generateAndImportKeyPair(alice);
|
aliceFingerprint = aliceOpenPgp.generateAndImportKeyPair(alice);
|
||||||
bobOpenPgp.generateAndImportKeyPair(bob);
|
bobFingerprint = bobOpenPgp.generateAndImportKeyPair(bob);
|
||||||
|
|
||||||
aliceFingerprint = aliceOpenPgp.getOurFingerprint();
|
aliceStore.setPrimaryOpenPgpKeyPairFingerprint(aliceFingerprint);
|
||||||
bobFingerprint = bobOpenPgp.getOurFingerprint();
|
bobStore.setPrimaryOpenPgpKeyPairFingerprint(bobFingerprint);
|
||||||
|
|
||||||
aliceOpenPgp.announceSupportAndPublish();
|
aliceOpenPgp.announceSupportAndPublish();
|
||||||
bobOpenPgp.announceSupportAndPublish();
|
bobOpenPgp.announceSupportAndPublish();
|
||||||
|
|
||||||
|
LOGGER.log(Level.INFO, "Request metadata of bob");
|
||||||
aliceOpenPgp.requestMetadataUpdate(bob);
|
aliceOpenPgp.requestMetadataUpdate(bob);
|
||||||
|
LOGGER.log(Level.INFO, "Request metadata of alice");
|
||||||
bobOpenPgp.requestMetadataUpdate(alice);
|
bobOpenPgp.requestMetadataUpdate(alice);
|
||||||
|
|
||||||
OpenPgpContact bobForAlice = aliceOpenPgp.getOpenPgpContact(bob.asEntityBareJidIfPossible());
|
OpenPgpContact bobForAlice = aliceOpenPgp.getOpenPgpContact(bob.asEntityBareJidIfPossible());
|
||||||
|
OpenPgpContact aliceForBob = bobOpenPgp.getOpenPgpContact(alice.asEntityBareJidIfPossible());
|
||||||
|
|
||||||
|
assertTrue(bobForAlice.getFingerprints().getActiveKeys().contains(bobFingerprint));
|
||||||
|
assertTrue(aliceForBob.getFingerprints().getActiveKeys().contains(aliceFingerprint));
|
||||||
|
|
||||||
aliceInstantMessaging.sendOxMessage(bobForAlice, body);
|
aliceInstantMessaging.sendOxMessage(bobForAlice, body);
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,120 @@
|
||||||
|
package org.jivesoftware.smackx.openpgp;
|
||||||
|
|
||||||
|
import static junit.framework.TestCase.assertTrue;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.security.InvalidAlgorithmParameterException;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.NoSuchProviderException;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
import org.jivesoftware.smack.SmackException;
|
||||||
|
import org.jivesoftware.smack.XMPPException;
|
||||||
|
import org.jivesoftware.smack.util.FileUtils;
|
||||||
|
import org.jivesoftware.smack.util.StringUtils;
|
||||||
|
import org.jivesoftware.smackx.ox.OpenPgpManager;
|
||||||
|
import org.jivesoftware.smackx.ox.OpenPgpV4Fingerprint;
|
||||||
|
import org.jivesoftware.smackx.ox.bouncycastle.FileBasedPainlessOpenPgpStore;
|
||||||
|
import org.jivesoftware.smackx.ox.bouncycastle.PainlessOpenPgpProvider;
|
||||||
|
import org.jivesoftware.smackx.ox.callback.AskForBackupCodeCallback;
|
||||||
|
import org.jivesoftware.smackx.ox.callback.DisplayBackupCodeCallback;
|
||||||
|
import org.jivesoftware.smackx.ox.callback.SecretKeyBackupSelectionCallback;
|
||||||
|
import org.jivesoftware.smackx.ox.callback.SecretKeyRestoreSelectionCallback;
|
||||||
|
import org.jivesoftware.smackx.ox.exception.InvalidBackupCodeException;
|
||||||
|
import org.jivesoftware.smackx.ox.exception.MissingUserIdOnKeyException;
|
||||||
|
import org.jivesoftware.smackx.ox.exception.NoBackupFoundException;
|
||||||
|
import org.jivesoftware.smackx.ox.exception.SmackOpenPgpException;
|
||||||
|
import org.jivesoftware.smackx.ox.util.PubSubDelegate;
|
||||||
|
import org.jivesoftware.smackx.pubsub.PubSubException;
|
||||||
|
|
||||||
|
import de.vanitasvitae.crypto.pgpainless.key.UnprotectedKeysProtector;
|
||||||
|
import org.bouncycastle.openpgp.PGPException;
|
||||||
|
import org.igniterealtime.smack.inttest.SmackIntegrationTest;
|
||||||
|
import org.igniterealtime.smack.inttest.SmackIntegrationTestEnvironment;
|
||||||
|
import org.igniterealtime.smack.inttest.TestNotPossibleException;
|
||||||
|
import org.junit.After;
|
||||||
|
import org.junit.AfterClass;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.BeforeClass;
|
||||||
|
|
||||||
|
public class SecretKeyBackupRestoreIntegrationTest extends AbstractOpenPgpIntegrationTest {
|
||||||
|
|
||||||
|
private static final File beforePath = FileUtils.getTempDir("ox_backup_" + StringUtils.randomString(10));
|
||||||
|
private static final File afterPath = FileUtils.getTempDir("ox_restore_" + StringUtils.randomString(10));
|
||||||
|
|
||||||
|
private String backupCode = null;
|
||||||
|
|
||||||
|
public SecretKeyBackupRestoreIntegrationTest(SmackIntegrationTestEnvironment environment)
|
||||||
|
throws XMPPException.XMPPErrorException, TestNotPossibleException, SmackException.NotConnectedException,
|
||||||
|
InterruptedException, SmackException.NoResponseException, SmackException.NotLoggedInException {
|
||||||
|
super(environment);
|
||||||
|
if (!OpenPgpManager.serverSupportsSecretKeyBackups(aliceConnection, aliceConnection.getXMPPServiceDomain())) {
|
||||||
|
throw new TestNotPossibleException("Server does not support the whitelist access model.");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@BeforeClass
|
||||||
|
@AfterClass
|
||||||
|
public static void cleanUp() {
|
||||||
|
FileUtils.deleteDirectory(afterPath);
|
||||||
|
FileUtils.deleteDirectory(beforePath);
|
||||||
|
}
|
||||||
|
|
||||||
|
@After
|
||||||
|
@Before
|
||||||
|
public void deleteBackup()
|
||||||
|
throws XMPPException.XMPPErrorException, SmackException.NotConnectedException, InterruptedException,
|
||||||
|
SmackException.NoResponseException {
|
||||||
|
PubSubDelegate.deleteSecretKeyNode(aliceConnection);
|
||||||
|
}
|
||||||
|
|
||||||
|
@SmackIntegrationTest
|
||||||
|
public void test() throws SmackOpenPgpException, InvalidAlgorithmParameterException, NoSuchAlgorithmException,
|
||||||
|
NoSuchProviderException, IOException, InterruptedException, PubSubException.NotALeafNodeException,
|
||||||
|
SmackException.NoResponseException, SmackException.NotConnectedException, XMPPException.XMPPErrorException,
|
||||||
|
SmackException.NotLoggedInException, SmackException.FeatureNotSupportedException,
|
||||||
|
MissingUserIdOnKeyException, NoBackupFoundException, InvalidBackupCodeException, PGPException {
|
||||||
|
|
||||||
|
FileBasedPainlessOpenPgpStore beforeStore = new FileBasedPainlessOpenPgpStore(beforePath, new UnprotectedKeysProtector());
|
||||||
|
PainlessOpenPgpProvider beforeProvider = new PainlessOpenPgpProvider(alice, beforeStore);
|
||||||
|
OpenPgpManager openPgpManager = OpenPgpManager.getInstanceFor(aliceConnection);
|
||||||
|
openPgpManager.setOpenPgpProvider(beforeProvider);
|
||||||
|
|
||||||
|
beforeStore.setPrimaryOpenPgpKeyPairFingerprint(
|
||||||
|
openPgpManager.generateAndImportKeyPair(alice));
|
||||||
|
|
||||||
|
openPgpManager.backupSecretKeyToServer(new DisplayBackupCodeCallback() {
|
||||||
|
@Override
|
||||||
|
public void displayBackupCode(String backupCode) {
|
||||||
|
SecretKeyBackupRestoreIntegrationTest.this.backupCode = backupCode;
|
||||||
|
}
|
||||||
|
}, new SecretKeyBackupSelectionCallback() {
|
||||||
|
@Override
|
||||||
|
public Set<OpenPgpV4Fingerprint> selectKeysToBackup(Set<OpenPgpV4Fingerprint> availableSecretKeys) {
|
||||||
|
return availableSecretKeys;
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
FileBasedPainlessOpenPgpStore afterStore = new FileBasedPainlessOpenPgpStore(afterPath, new UnprotectedKeysProtector());
|
||||||
|
PainlessOpenPgpProvider afterProvider = new PainlessOpenPgpProvider(alice, afterStore);
|
||||||
|
openPgpManager.setOpenPgpProvider(afterProvider);
|
||||||
|
|
||||||
|
OpenPgpV4Fingerprint fingerprint = openPgpManager.restoreSecretKeyServerBackup(new AskForBackupCodeCallback() {
|
||||||
|
@Override
|
||||||
|
public String askForBackupCode() {
|
||||||
|
return backupCode;
|
||||||
|
}
|
||||||
|
}, new SecretKeyRestoreSelectionCallback() {
|
||||||
|
@Override
|
||||||
|
public OpenPgpV4Fingerprint selectSecretKeyToRestore(Set<OpenPgpV4Fingerprint> availableSecretKeys) {
|
||||||
|
return availableSecretKeys.iterator().next();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
afterStore.setPrimaryOpenPgpKeyPairFingerprint(fingerprint);
|
||||||
|
|
||||||
|
assertTrue(Arrays.equals(beforeStore.getSecretKeyRings(alice).getEncoded(), afterStore.getSecretKeyRings(alice).getEncoded()));
|
||||||
|
}
|
||||||
|
}
|
|
@ -360,6 +360,7 @@ public class PainlessOpenPgpProvider implements OpenPgpProvider {
|
||||||
public OpenPgpV4Fingerprint importPublicKey(BareJid owner, byte[] bytes)
|
public OpenPgpV4Fingerprint importPublicKey(BareJid owner, byte[] bytes)
|
||||||
throws MissingUserIdOnKeyException, IOException, SmackOpenPgpException {
|
throws MissingUserIdOnKeyException, IOException, SmackOpenPgpException {
|
||||||
PGPPublicKeyRing publicKeys = new PGPPublicKeyRing(bytes, new BcKeyFingerprintCalculator());
|
PGPPublicKeyRing publicKeys = new PGPPublicKeyRing(bytes, new BcKeyFingerprintCalculator());
|
||||||
|
// LOGGER.log(Level.INFO, "Importing key " + Long.toHexString(publicKeys.getPublicKey().getKeyID()));
|
||||||
return importPublicKey(owner, publicKeys);
|
return importPublicKey(owner, publicKeys);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -77,9 +77,11 @@ import org.jivesoftware.smackx.pubsub.ItemsExtension;
|
||||||
import org.jivesoftware.smackx.pubsub.LeafNode;
|
import org.jivesoftware.smackx.pubsub.LeafNode;
|
||||||
import org.jivesoftware.smackx.pubsub.PayloadItem;
|
import org.jivesoftware.smackx.pubsub.PayloadItem;
|
||||||
import org.jivesoftware.smackx.pubsub.PubSubException;
|
import org.jivesoftware.smackx.pubsub.PubSubException;
|
||||||
|
import org.jivesoftware.smackx.pubsub.PubSubFeature;
|
||||||
import org.jivesoftware.smackx.pubsub.PubSubManager;
|
import org.jivesoftware.smackx.pubsub.PubSubManager;
|
||||||
|
|
||||||
import org.jxmpp.jid.BareJid;
|
import org.jxmpp.jid.BareJid;
|
||||||
|
import org.jxmpp.jid.DomainBareJid;
|
||||||
import org.jxmpp.jid.EntityBareJid;
|
import org.jxmpp.jid.EntityBareJid;
|
||||||
import org.xmlpull.v1.XmlPullParserException;
|
import org.xmlpull.v1.XmlPullParserException;
|
||||||
|
|
||||||
|
@ -257,20 +259,19 @@ public final class OpenPgpManager extends Manager {
|
||||||
*
|
*
|
||||||
* @see <a href="https://xmpp.org/extensions/xep-0373.html#synchro-pep">XEP-0373 §5</a>
|
* @see <a href="https://xmpp.org/extensions/xep-0373.html#synchro-pep">XEP-0373 §5</a>
|
||||||
*
|
*
|
||||||
|
* @param connection
|
||||||
|
* @param server Servers {@link DomainBareJid}
|
||||||
* @return true, if the server supports secret key backups, otherwise false.
|
* @return true, if the server supports secret key backups, otherwise false.
|
||||||
* @throws XMPPException.XMPPErrorException
|
* @throws XMPPException.XMPPErrorException
|
||||||
* @throws SmackException.NotConnectedException
|
* @throws SmackException.NotConnectedException
|
||||||
* @throws InterruptedException
|
* @throws InterruptedException
|
||||||
* @throws SmackException.NoResponseException
|
* @throws SmackException.NoResponseException
|
||||||
*/
|
*/
|
||||||
public boolean serverSupportsSecretKeyBackups()
|
public static boolean serverSupportsSecretKeyBackups(XMPPConnection connection, DomainBareJid server)
|
||||||
throws XMPPException.XMPPErrorException, SmackException.NotConnectedException, InterruptedException,
|
throws XMPPException.XMPPErrorException, SmackException.NotConnectedException, InterruptedException,
|
||||||
SmackException.NoResponseException, SmackException.NotLoggedInException {
|
SmackException.NoResponseException, SmackException.NotLoggedInException {
|
||||||
throwIfNotAuthenticated();
|
return PubSubManager.getInstance(connection, server).getSupportedFeatures()
|
||||||
boolean pep = PEPManager.getInstanceFor(connection()).isSupported();
|
.containsFeature(PubSubFeature.access_whitelist.getFeatureName());
|
||||||
boolean whitelist = PubSubManager.getInstance(connection(), connection().getUser().asBareJid())
|
|
||||||
.getSupportedFeatures().containsFeature("http://jabber.org/protocol/pubsub#access-whitelist");
|
|
||||||
return pep && whitelist;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -290,7 +291,8 @@ public final class OpenPgpManager extends Manager {
|
||||||
SecretKeyBackupSelectionCallback selectKeyCallback)
|
SecretKeyBackupSelectionCallback selectKeyCallback)
|
||||||
throws InterruptedException, PubSubException.NotALeafNodeException,
|
throws InterruptedException, PubSubException.NotALeafNodeException,
|
||||||
XMPPException.XMPPErrorException, SmackException.NotConnectedException, SmackException.NoResponseException,
|
XMPPException.XMPPErrorException, SmackException.NotConnectedException, SmackException.NoResponseException,
|
||||||
SmackException.NotLoggedInException, SmackOpenPgpException, IOException {
|
SmackException.NotLoggedInException, SmackOpenPgpException, IOException,
|
||||||
|
SmackException.FeatureNotSupportedException {
|
||||||
throwIfNoProviderSet();
|
throwIfNoProviderSet();
|
||||||
throwIfNotAuthenticated();
|
throwIfNotAuthenticated();
|
||||||
|
|
||||||
|
@ -334,7 +336,7 @@ public final class OpenPgpManager extends Manager {
|
||||||
* @throws SmackOpenPgpException if something goes wrong while restoring the secret key.
|
* @throws SmackOpenPgpException if something goes wrong while restoring the secret key.
|
||||||
* @throws InvalidBackupCodeException if the user-provided backup code is invalid.
|
* @throws InvalidBackupCodeException if the user-provided backup code is invalid.
|
||||||
*/
|
*/
|
||||||
public void restoreSecretKeyServerBackup(AskForBackupCodeCallback codeCallback,
|
public OpenPgpV4Fingerprint restoreSecretKeyServerBackup(AskForBackupCodeCallback codeCallback,
|
||||||
SecretKeyRestoreSelectionCallback selectionCallback)
|
SecretKeyRestoreSelectionCallback selectionCallback)
|
||||||
throws InterruptedException, PubSubException.NotALeafNodeException, XMPPException.XMPPErrorException,
|
throws InterruptedException, PubSubException.NotALeafNodeException, XMPPException.XMPPErrorException,
|
||||||
SmackException.NotConnectedException, SmackException.NoResponseException, SmackOpenPgpException,
|
SmackException.NotConnectedException, SmackException.NoResponseException, SmackOpenPgpException,
|
||||||
|
@ -350,7 +352,7 @@ public final class OpenPgpManager extends Manager {
|
||||||
String backupCode = codeCallback.askForBackupCode();
|
String backupCode = codeCallback.askForBackupCode();
|
||||||
|
|
||||||
OpenPgpV4Fingerprint fingerprint = SecretKeyBackupHelper.restoreSecretKeyBackup(provider, backup, backupCode);
|
OpenPgpV4Fingerprint fingerprint = SecretKeyBackupHelper.restoreSecretKeyBackup(provider, backup, backupCode);
|
||||||
provider.getStore().setPrimaryOpenPgpKeyPairFingerprint(fingerprint);
|
return fingerprint;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -299,7 +299,7 @@ public class PubSubDelegate {
|
||||||
throws InterruptedException, PubSubException.NotALeafNodeException,
|
throws InterruptedException, PubSubException.NotALeafNodeException,
|
||||||
XMPPException.XMPPErrorException, SmackException.NotConnectedException, SmackException.NoResponseException,
|
XMPPException.XMPPErrorException, SmackException.NotConnectedException, SmackException.NoResponseException,
|
||||||
SmackException.NotLoggedInException, SmackException.FeatureNotSupportedException {
|
SmackException.NotLoggedInException, SmackException.FeatureNotSupportedException {
|
||||||
if (!OpenPgpManager.getInstanceFor(connection).serverSupportsSecretKeyBackups()) {
|
if (!OpenPgpManager.serverSupportsSecretKeyBackups(connection, connection.getXMPPServiceDomain())) {
|
||||||
throw new SmackException.FeatureNotSupportedException("http://jabber.org/protocol/pubsub#access-whitelist");
|
throw new SmackException.FeatureNotSupportedException("http://jabber.org/protocol/pubsub#access-whitelist");
|
||||||
}
|
}
|
||||||
PubSubManager pm = PubSubManager.getInstance(connection);
|
PubSubManager pm = PubSubManager.getInstance(connection);
|
||||||
|
|
Loading…
Reference in a new issue