|
4 | 4 |
|
5 | 5 | package ch.iterate.hub.core; |
6 | 6 |
|
7 | | -import ch.cyberduck.core.*; |
| 7 | +import ch.cyberduck.core.AbstractPath; |
| 8 | +import ch.cyberduck.core.AttributedList; |
| 9 | +import ch.cyberduck.core.DisabledCancelCallback; |
| 10 | +import ch.cyberduck.core.DisabledHostKeyCallback; |
| 11 | +import ch.cyberduck.core.DisabledListProgressListener; |
| 12 | +import ch.cyberduck.core.DisabledLoginCallback; |
| 13 | +import ch.cyberduck.core.DisabledPasswordCallback; |
| 14 | +import ch.cyberduck.core.Host; |
| 15 | +import ch.cyberduck.core.ListService; |
| 16 | +import ch.cyberduck.core.Path; |
| 17 | +import ch.cyberduck.core.Protocol; |
| 18 | +import ch.cyberduck.core.ProtocolFactory; |
| 19 | +import ch.cyberduck.core.Session; |
| 20 | +import ch.cyberduck.core.SimplePathPredicate; |
8 | 21 | import ch.cyberduck.core.features.Home; |
9 | 22 | import ch.cyberduck.core.features.Vault; |
10 | 23 | import ch.cyberduck.core.preferences.PreferencesFactory; |
|
13 | 26 | import ch.cyberduck.core.ssl.DisabledX509TrustManager; |
14 | 27 | import ch.cyberduck.core.vault.DefaultVaultRegistry; |
15 | 28 |
|
16 | | -import ch.iterate.hub.client.api.DeviceResourceApi; |
17 | | -import ch.iterate.hub.client.api.UsersResourceApi; |
18 | | -import ch.iterate.hub.client.api.VaultResourceApi; |
19 | | - |
20 | | -import ch.iterate.hub.crypto.UserKeys; |
21 | | -import ch.iterate.hub.crypto.uvf.UvfMetadataPayload; |
22 | | -import ch.iterate.hub.workflows.UserKeysService; |
23 | | -import ch.iterate.hub.workflows.UserKeysServiceImpl; |
24 | | -import ch.iterate.hub.workflows.VaultServiceImpl; |
25 | | - |
26 | 29 | import org.apache.commons.lang3.StringUtils; |
27 | 30 | import org.apache.logging.log4j.LogManager; |
28 | 31 | import org.apache.logging.log4j.Logger; |
@@ -240,7 +243,6 @@ public void test03AddVault(final HubTestConfig config) throws Exception { |
240 | 243 | assertFalse(vaultRegistry.isEmpty()); |
241 | 244 | assertEquals(1, vaultRegistry.size()); |
242 | 245 |
|
243 | | - // TODO WiP trying to guide AbstractVault.encrypt() -> CryptoDirectoryV7Provider.toEncrypted(final Session<?> session, final String directoryId, final Path directory) -> do we need to write own CryptoDirectory? |
244 | 246 | final Path bucket = new Path(vaultBookmark.getDefaultPath(), EnumSet.of(Path.Type.directory, Path.Type.volume, Path.Type.vault)); |
245 | 247 | assertNotSame(Vault.DISABLED, vaultRegistry.find(session, bucket)); |
246 | 248 | { |
|
0 commit comments