2022-11-08 19:44:41 +00:00
|
|
|
import 'dart:async';
|
|
|
|
import 'package:moxxmpp/moxxmpp.dart';
|
|
|
|
import 'package:test/test.dart';
|
|
|
|
import 'helpers/logging.dart';
|
|
|
|
import 'helpers/xmpp.dart';
|
|
|
|
|
|
|
|
/// Returns true if the roster manager triggeres an event for a given stanza
|
2023-03-18 15:13:45 +00:00
|
|
|
Future<bool> testRosterManager(
|
|
|
|
String bareJid,
|
|
|
|
String resource,
|
|
|
|
String stanzaString,
|
|
|
|
) async {
|
2022-11-08 19:44:41 +00:00
|
|
|
var eventTriggered = false;
|
2023-03-18 15:13:45 +00:00
|
|
|
final roster = RosterManager(TestingRosterStateManager('', []))
|
|
|
|
..register(
|
|
|
|
XmppManagerAttributes(
|
|
|
|
sendStanza: (
|
|
|
|
_, {
|
|
|
|
StanzaFromType addFrom = StanzaFromType.full,
|
|
|
|
bool addId = true,
|
|
|
|
bool retransmitted = false,
|
|
|
|
bool awaitable = true,
|
|
|
|
bool encrypted = false,
|
|
|
|
bool forceEncryption = false,
|
|
|
|
}) async =>
|
|
|
|
XMLNode(tag: 'hallo'),
|
|
|
|
sendEvent: (event) {
|
|
|
|
eventTriggered = true;
|
|
|
|
},
|
|
|
|
sendNonza: (_) {},
|
|
|
|
getConnectionSettings: () => ConnectionSettings(
|
|
|
|
jid: JID.fromString(bareJid),
|
|
|
|
password: 'password',
|
|
|
|
useDirectTLS: true,
|
|
|
|
),
|
|
|
|
getManagerById: getManagerNullStub,
|
|
|
|
getNegotiatorById: getNegotiatorNullStub,
|
|
|
|
getFullJID: () => JID.fromString('$bareJid/$resource'),
|
|
|
|
getSocket: () => StubTCPSocket([]),
|
|
|
|
getConnection: () => XmppConnection(
|
|
|
|
TestingReconnectionPolicy(),
|
|
|
|
AlwaysConnectedConnectivityManager(),
|
|
|
|
StubTCPSocket([]),
|
|
|
|
),
|
2022-11-08 19:44:41 +00:00
|
|
|
),
|
2023-03-18 15:13:45 +00:00
|
|
|
);
|
2022-11-08 19:44:41 +00:00
|
|
|
|
|
|
|
final stanza = Stanza.fromXMLNode(XMLNode.fromString(stanzaString));
|
|
|
|
for (final handler in roster.getIncomingStanzaHandlers()) {
|
2023-03-18 15:13:45 +00:00
|
|
|
if (handler.matches(stanza)) {
|
|
|
|
await handler.callback(
|
|
|
|
stanza,
|
|
|
|
StanzaHandlerData(
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
null,
|
|
|
|
stanza,
|
|
|
|
),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
2022-11-08 19:44:41 +00:00
|
|
|
|
|
|
|
return eventTriggered;
|
|
|
|
}
|
|
|
|
|
|
|
|
void main() {
|
|
|
|
initLogger();
|
|
|
|
|
|
|
|
test('Test a successful login attempt with no SM', () async {
|
2023-03-18 15:13:45 +00:00
|
|
|
final fakeSocket = StubTCPSocket(
|
|
|
|
[
|
|
|
|
StringExpectation(
|
|
|
|
"<stream:stream xmlns='jabber:client' version='1.0' xmlns:stream='http://etherx.jabber.org/streams' to='test.server' xml:lang='en'>",
|
|
|
|
'''
|
2022-11-08 19:44:41 +00:00
|
|
|
<stream:stream
|
|
|
|
xmlns="jabber:client"
|
|
|
|
version="1.0"
|
|
|
|
xmlns:stream="http://etherx.jabber.org/streams"
|
|
|
|
from="test.server"
|
|
|
|
xml:lang="en">
|
|
|
|
<stream:features xmlns="http://etherx.jabber.org/streams">
|
|
|
|
<mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">
|
|
|
|
<mechanism>PLAIN</mechanism>
|
|
|
|
</mechanisms>
|
|
|
|
</stream:features>''',
|
2023-03-18 15:13:45 +00:00
|
|
|
),
|
|
|
|
StringExpectation(
|
|
|
|
"<auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='PLAIN'>AHBvbHlub21kaXZpc2lvbgBhYWFh</auth>",
|
|
|
|
'<success xmlns="urn:ietf:params:xml:ns:xmpp-sasl" />',
|
|
|
|
),
|
|
|
|
StringExpectation(
|
|
|
|
"<stream:stream xmlns='jabber:client' version='1.0' xmlns:stream='http://etherx.jabber.org/streams' to='test.server' xml:lang='en'>",
|
|
|
|
'''
|
2022-11-08 19:44:41 +00:00
|
|
|
<stream:stream
|
|
|
|
xmlns="jabber:client"
|
|
|
|
version="1.0"
|
|
|
|
xmlns:stream="http://etherx.jabber.org/streams"
|
|
|
|
from="test.server"
|
|
|
|
xml:lang="en">
|
|
|
|
<stream:features xmlns="http://etherx.jabber.org/streams">
|
|
|
|
<bind xmlns="urn:ietf:params:xml:ns:xmpp-bind">
|
|
|
|
<required/>
|
|
|
|
</bind>
|
|
|
|
<session xmlns="urn:ietf:params:xml:ns:xmpp-session">
|
|
|
|
<optional/>
|
|
|
|
</session>
|
|
|
|
<csi xmlns="urn:xmpp:csi:0"/>
|
|
|
|
<sm xmlns="urn:xmpp:sm:3"/>
|
|
|
|
</stream:features>
|
|
|
|
''',
|
2023-03-18 15:13:45 +00:00
|
|
|
),
|
|
|
|
StanzaExpectation(
|
|
|
|
'<iq xmlns="jabber:client" type="set" id="a"><bind xmlns="urn:ietf:params:xml:ns:xmpp-bind"/></iq>',
|
|
|
|
'<iq xmlns="jabber:client" type="result" id="a"><bind xmlns="urn:ietf:params:xml:ns:xmpp-bind"><jid>polynomdivision@test.server/MU29eEZn</jid></bind></iq>',
|
|
|
|
ignoreId: true,
|
|
|
|
),
|
|
|
|
StanzaExpectation(
|
|
|
|
"<enable xmlns='urn:xmpp:sm:3' resume='true' />",
|
|
|
|
"<enabled xmlns='urn:xmpp:sm:3' id='some-long-sm-id' resume='true'/>",
|
|
|
|
),
|
|
|
|
],
|
|
|
|
);
|
|
|
|
// TODO(Unknown): This test is broken since we query the server and enable carbons
|
|
|
|
final conn = XmppConnection(
|
|
|
|
TestingReconnectionPolicy(),
|
|
|
|
AlwaysConnectedConnectivityManager(),
|
|
|
|
fakeSocket,
|
|
|
|
)..setConnectionSettings(
|
|
|
|
ConnectionSettings(
|
2022-11-08 19:44:41 +00:00
|
|
|
jid: JID.fromString('polynomdivision@test.server'),
|
|
|
|
password: 'aaaa',
|
|
|
|
useDirectTLS: true,
|
2023-03-18 15:13:45 +00:00
|
|
|
),
|
2022-11-08 19:44:41 +00:00
|
|
|
);
|
2023-03-18 15:13:45 +00:00
|
|
|
await conn.registerManagers([
|
|
|
|
PresenceManager(),
|
|
|
|
RosterManager(TestingRosterStateManager('', [])),
|
|
|
|
DiscoManager([]),
|
|
|
|
StreamManagementManager(),
|
|
|
|
EntityCapabilitiesManager('http://moxxmpp.example'),
|
|
|
|
]);
|
2023-03-31 17:02:57 +00:00
|
|
|
await conn.registerFeatureNegotiators([
|
2023-03-18 15:13:45 +00:00
|
|
|
SaslPlainNegotiator(),
|
|
|
|
SaslScramNegotiator(10, '', '', ScramHashType.sha512),
|
|
|
|
ResourceBindingNegotiator(),
|
|
|
|
StreamManagementNegotiator(),
|
|
|
|
]);
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
await conn.connect(
|
|
|
|
waitUntilLogin: true,
|
|
|
|
);
|
|
|
|
expect(fakeSocket.getState(), /*6*/ 5);
|
2023-04-01 10:28:11 +00:00
|
|
|
expect(conn.resource, 'MU29eEZn');
|
2022-11-08 19:44:41 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
test('Test a failed SASL auth', () async {
|
2023-03-18 15:13:45 +00:00
|
|
|
final fakeSocket = StubTCPSocket(
|
|
|
|
[
|
|
|
|
StringExpectation(
|
|
|
|
"<stream:stream xmlns='jabber:client' version='1.0' xmlns:stream='http://etherx.jabber.org/streams' to='test.server' xml:lang='en'>",
|
|
|
|
'''
|
2022-11-08 19:44:41 +00:00
|
|
|
<stream:stream
|
|
|
|
xmlns="jabber:client"
|
|
|
|
version="1.0"
|
|
|
|
xmlns:stream="http://etherx.jabber.org/streams"
|
|
|
|
from="test.server"
|
|
|
|
xml:lang="en">
|
|
|
|
<stream:features xmlns="http://etherx.jabber.org/streams">
|
|
|
|
<mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">
|
|
|
|
<mechanism>PLAIN</mechanism>
|
|
|
|
</mechanisms>
|
|
|
|
</stream:features>''',
|
2023-03-18 15:13:45 +00:00
|
|
|
),
|
|
|
|
StringExpectation(
|
|
|
|
"<auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='PLAIN'>AHBvbHlub21kaXZpc2lvbgBhYWFh</auth>",
|
|
|
|
'<failure xmlns="urn:ietf:params:xml:ns:xmpp-sasl"><not-authorized /></failure>',
|
|
|
|
),
|
|
|
|
],
|
|
|
|
);
|
|
|
|
var receivedEvent = false;
|
|
|
|
final conn = XmppConnection(
|
|
|
|
TestingReconnectionPolicy(),
|
|
|
|
AlwaysConnectedConnectivityManager(),
|
|
|
|
fakeSocket,
|
|
|
|
)..setConnectionSettings(
|
|
|
|
ConnectionSettings(
|
|
|
|
jid: JID.fromString('polynomdivision@test.server'),
|
|
|
|
password: 'aaaa',
|
|
|
|
useDirectTLS: true,
|
|
|
|
),
|
2023-01-26 23:14:44 +00:00
|
|
|
);
|
2023-03-18 15:13:45 +00:00
|
|
|
await conn.registerManagers([
|
|
|
|
PresenceManager(),
|
|
|
|
RosterManager(TestingRosterStateManager('', [])),
|
|
|
|
DiscoManager([]),
|
|
|
|
EntityCapabilitiesManager('http://moxxmpp.example'),
|
|
|
|
]);
|
2023-03-31 17:02:57 +00:00
|
|
|
await conn.registerFeatureNegotiators([
|
2023-03-18 15:13:45 +00:00
|
|
|
SaslPlainNegotiator(),
|
|
|
|
]);
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
conn.asBroadcastStream().listen((event) {
|
|
|
|
if (event is AuthenticationFailedEvent &&
|
|
|
|
event.saslError == 'not-authorized') {
|
|
|
|
receivedEvent = true;
|
|
|
|
}
|
|
|
|
});
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
await conn.connect(
|
|
|
|
waitUntilLogin: true,
|
|
|
|
);
|
|
|
|
expect(receivedEvent, true);
|
2022-11-08 19:44:41 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
test('Test another failed SASL auth', () async {
|
2023-03-18 15:13:45 +00:00
|
|
|
final fakeSocket = StubTCPSocket(
|
|
|
|
[
|
|
|
|
StringExpectation(
|
|
|
|
"<stream:stream xmlns='jabber:client' version='1.0' xmlns:stream='http://etherx.jabber.org/streams' to='test.server' xml:lang='en'>",
|
|
|
|
'''
|
2022-11-08 19:44:41 +00:00
|
|
|
<stream:stream
|
|
|
|
xmlns="jabber:client"
|
|
|
|
version="1.0"
|
|
|
|
xmlns:stream="http://etherx.jabber.org/streams"
|
|
|
|
from="test.server"
|
|
|
|
xml:lang="en">
|
|
|
|
<stream:features xmlns="http://etherx.jabber.org/streams">
|
|
|
|
<mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">
|
|
|
|
<mechanism>PLAIN</mechanism>
|
|
|
|
</mechanisms>
|
|
|
|
</stream:features>''',
|
2023-03-18 15:13:45 +00:00
|
|
|
),
|
|
|
|
StringExpectation(
|
|
|
|
"<auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='PLAIN'>AHBvbHlub21kaXZpc2lvbgBhYWFh</auth>",
|
|
|
|
'<failure xmlns="urn:ietf:params:xml:ns:xmpp-sasl"><mechanism-too-weak /></failure>',
|
|
|
|
),
|
|
|
|
],
|
|
|
|
);
|
|
|
|
var receivedEvent = false;
|
|
|
|
final conn = XmppConnection(
|
|
|
|
TestingReconnectionPolicy(),
|
|
|
|
AlwaysConnectedConnectivityManager(),
|
|
|
|
fakeSocket,
|
|
|
|
)..setConnectionSettings(
|
|
|
|
ConnectionSettings(
|
2022-11-08 19:44:41 +00:00
|
|
|
jid: JID.fromString('polynomdivision@test.server'),
|
|
|
|
password: 'aaaa',
|
|
|
|
useDirectTLS: true,
|
2023-03-18 15:13:45 +00:00
|
|
|
),
|
|
|
|
);
|
|
|
|
await conn.registerManagers([
|
|
|
|
PresenceManager(),
|
|
|
|
RosterManager(TestingRosterStateManager('', [])),
|
|
|
|
DiscoManager([]),
|
|
|
|
EntityCapabilitiesManager('http://moxxmpp.example'),
|
|
|
|
]);
|
2023-03-31 17:02:57 +00:00
|
|
|
await conn.registerFeatureNegotiators([SaslPlainNegotiator()]);
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
conn.asBroadcastStream().listen((event) {
|
|
|
|
if (event is AuthenticationFailedEvent &&
|
|
|
|
event.saslError == 'mechanism-too-weak') {
|
|
|
|
receivedEvent = true;
|
|
|
|
}
|
|
|
|
});
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
await conn.connect(
|
|
|
|
waitUntilLogin: true,
|
|
|
|
);
|
|
|
|
expect(receivedEvent, true);
|
2022-11-08 19:44:41 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
group('Test roster pushes', () {
|
2023-03-18 15:13:45 +00:00
|
|
|
test('Test for a CVE-2015-8688 style vulnerability', () async {
|
|
|
|
var eventTriggered = false;
|
|
|
|
final roster = RosterManager(TestingRosterStateManager('', []))
|
|
|
|
..register(
|
|
|
|
XmppManagerAttributes(
|
|
|
|
sendStanza: (
|
|
|
|
_, {
|
|
|
|
StanzaFromType addFrom = StanzaFromType.full,
|
|
|
|
bool addId = true,
|
|
|
|
bool retransmitted = false,
|
|
|
|
bool awaitable = true,
|
|
|
|
bool encrypted = false,
|
|
|
|
bool forceEncryption = false,
|
|
|
|
}) async =>
|
|
|
|
XMLNode(tag: 'hallo'),
|
|
|
|
sendEvent: (event) {
|
|
|
|
eventTriggered = true;
|
|
|
|
},
|
|
|
|
sendNonza: (_) {},
|
|
|
|
getConnectionSettings: () => ConnectionSettings(
|
|
|
|
jid: JID.fromString('some.user@example.server'),
|
|
|
|
password: 'password',
|
|
|
|
useDirectTLS: true,
|
|
|
|
),
|
|
|
|
getManagerById: getManagerNullStub,
|
|
|
|
getNegotiatorById: getNegotiatorNullStub,
|
|
|
|
getFullJID: () => JID.fromString('some.user@example.server/aaaaa'),
|
|
|
|
getSocket: () => StubTCPSocket([]),
|
|
|
|
getConnection: () => XmppConnection(
|
|
|
|
TestingReconnectionPolicy(),
|
|
|
|
AlwaysConnectedConnectivityManager(),
|
|
|
|
StubTCPSocket([]),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
);
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
// NOTE: Based on https://gultsch.de/gajim_roster_push_and_message_interception.html
|
|
|
|
// NOTE: Added a from attribute as a server would add it itself.
|
|
|
|
final maliciousStanza = Stanza.fromXMLNode(
|
|
|
|
XMLNode.fromString(
|
|
|
|
"<iq type=\"set\" from=\"eve@siacs.eu/bbbbb\" to=\"some.user@example.server/aaaaa\"><query xmlns='jabber:iq:roster'><item subscription=\"both\" jid=\"eve@siacs.eu\" name=\"Bob\" /></query></iq>",
|
|
|
|
),
|
|
|
|
);
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
for (final handler in roster.getIncomingStanzaHandlers()) {
|
|
|
|
if (handler.matches(maliciousStanza)) {
|
|
|
|
await handler.callback(
|
|
|
|
maliciousStanza,
|
|
|
|
StanzaHandlerData(
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
null,
|
|
|
|
maliciousStanza,
|
|
|
|
),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
expect(
|
|
|
|
eventTriggered,
|
|
|
|
false,
|
|
|
|
reason: 'Was able to inject a malicious roster push',
|
|
|
|
);
|
|
|
|
});
|
|
|
|
test('The manager should accept pushes from our bare jid', () async {
|
|
|
|
final result = await testRosterManager(
|
|
|
|
'test.user@server.example',
|
|
|
|
'aaaaa',
|
|
|
|
"<iq from='test.user@server.example' type='result' id='82c2aa1e-cac3-4f62-9e1f-bbe6b057daf3' to='test.user@server.example/aaaaa' xmlns='jabber:client'><query ver='64' xmlns='jabber:iq:roster'><item jid='some.other.user@server.example' subscription='to' /></query></iq>",
|
|
|
|
);
|
|
|
|
expect(
|
|
|
|
result,
|
|
|
|
true,
|
|
|
|
reason: 'Roster pushes from our bare JID should be accepted',
|
|
|
|
);
|
|
|
|
});
|
|
|
|
test(
|
|
|
|
'The manager should accept pushes from a jid that, if the resource is stripped, is our bare jid',
|
|
|
|
() async {
|
|
|
|
final result1 = await testRosterManager(
|
|
|
|
'test.user@server.example',
|
|
|
|
'aaaaa',
|
|
|
|
"<iq from='test.user@server.example/aaaaa' type='result' id='82c2aa1e-cac3-4f62-9e1f-bbe6b057daf3' to='test.user@server.example/aaaaa' xmlns='jabber:client'><query ver='64' xmlns='jabber:iq:roster'><item jid='some.other.user@server.example' subscription='to' /></query></iq>",
|
|
|
|
);
|
|
|
|
expect(
|
|
|
|
result1,
|
|
|
|
true,
|
|
|
|
reason:
|
|
|
|
'Roster pushes should be accepted if the bare JIDs are the same',
|
|
|
|
);
|
2022-11-08 19:44:41 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
final result2 = await testRosterManager(
|
|
|
|
'test.user@server.example',
|
|
|
|
'aaaaa',
|
|
|
|
"<iq from='test.user@server.example/bbbbb' type='result' id='82c2aa1e-cac3-4f62-9e1f-bbe6b057daf3' to='test.user@server.example/aaaaa' xmlns='jabber:client'><query ver='64' xmlns='jabber:iq:roster'><item jid='some.other.user@server.example' subscription='to' /></query></iq>",
|
|
|
|
);
|
|
|
|
expect(
|
|
|
|
result2,
|
|
|
|
true,
|
|
|
|
reason:
|
|
|
|
'Roster pushes should be accepted if the bare JIDs are the same',
|
|
|
|
);
|
|
|
|
});
|
2022-11-08 19:44:41 +00:00
|
|
|
});
|
2023-03-18 13:54:39 +00:00
|
|
|
|
|
|
|
test('Test failing due to the server only allowing SASL PLAIN', () async {
|
2023-03-18 15:13:45 +00:00
|
|
|
final fakeSocket = StubTCPSocket(
|
|
|
|
[
|
|
|
|
StringExpectation(
|
|
|
|
"<stream:stream xmlns='jabber:client' version='1.0' xmlns:stream='http://etherx.jabber.org/streams' to='example.org' xml:lang='en'>",
|
|
|
|
'''
|
2023-03-18 13:54:39 +00:00
|
|
|
<stream:stream
|
|
|
|
xmlns="jabber:client"
|
|
|
|
version="1.0"
|
|
|
|
xmlns:stream="http://etherx.jabber.org/streams"
|
|
|
|
from="test.server"
|
|
|
|
xml:lang="en">
|
|
|
|
<stream:features xmlns="http://etherx.jabber.org/streams">
|
|
|
|
<mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">
|
|
|
|
<mechanism>PLAIN</mechanism>
|
|
|
|
</mechanisms>
|
|
|
|
</stream:features>''',
|
2023-03-18 15:13:45 +00:00
|
|
|
),
|
|
|
|
],
|
|
|
|
);
|
2023-03-18 13:54:39 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
final conn = XmppConnection(
|
|
|
|
TestingReconnectionPolicy(),
|
|
|
|
AlwaysConnectedConnectivityManager(),
|
|
|
|
fakeSocket,
|
|
|
|
);
|
|
|
|
await conn.registerManagers([
|
|
|
|
PresenceManager(),
|
|
|
|
RosterManager(TestingRosterStateManager('', [])),
|
|
|
|
DiscoManager([]),
|
|
|
|
]);
|
2023-03-31 17:02:57 +00:00
|
|
|
await conn.registerFeatureNegotiators([
|
|
|
|
// SaslPlainNegotiator(),
|
|
|
|
ResourceBindingNegotiator(),
|
|
|
|
]);
|
|
|
|
conn.setConnectionSettings(
|
|
|
|
ConnectionSettings(
|
|
|
|
jid: JID.fromString('testuser@example.org'),
|
|
|
|
password: 'abc123',
|
|
|
|
useDirectTLS: false,
|
|
|
|
),
|
|
|
|
);
|
2023-03-18 13:54:39 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
final result = await conn.connect(
|
|
|
|
waitUntilLogin: true,
|
|
|
|
);
|
2023-03-18 13:54:39 +00:00
|
|
|
|
2023-03-18 15:13:45 +00:00
|
|
|
expect(
|
|
|
|
result.isType<NoMatchingAuthenticationMechanismAvailableError>(),
|
|
|
|
true,
|
|
|
|
);
|
2023-03-18 13:54:39 +00:00
|
|
|
});
|
2022-11-08 19:44:41 +00:00
|
|
|
}
|