From c3f0ce28e83a64e5175bc13a2dc2abc00805edb1 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 5 Mar 2024 11:44:49 +0100 Subject: [PATCH 01/20] chore: upgrade kotlin to 1.9.22 Also update surrounding dependencies to match --- .../com/wire/kalium/plugins/Multiplatform.kt | 2 +- cli/build.gradle.kts | 25 ++++---------- gradle/libs.versions.toml | 34 +++++++++---------- monkeys/build.gradle.kts | 5 --- 4 files changed, 24 insertions(+), 42 deletions(-) diff --git a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt index 1b101c5718b..1c1753d6dc6 100644 --- a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt +++ b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt @@ -44,7 +44,7 @@ fun Project.configureDefaultMultiplatform( "No multiplatform extension found. Is the Kotlin Multiplatform plugin applied to this module?" } kotlinExtension.apply { - targetHierarchy.default() + applyDefaultHierarchyTemplate() jvm { commonJvmConfig(includeNativeInterop, enableIntegrationTests) } androidTarget { commmonKotlinAndroidTargetConfig() } diff --git a/cli/build.gradle.kts b/cli/build.gradle.kts index 18407ccfed8..3d25e9a6e3b 100644 --- a/cli/build.gradle.kts +++ b/cli/build.gradle.kts @@ -18,6 +18,7 @@ import com.wire.kalium.plugins.commonDokkaConfig import com.wire.kalium.plugins.commonJvmConfig +import org.jetbrains.kotlin.gradle.ExperimentalKotlinGradlePluginApi @Suppress("DSL_SCOPE_VIOLATION") @@ -42,7 +43,8 @@ tasks.jar { } kotlin { - val jvmTarget = jvm() { + applyDefaultHierarchyTemplate() + val jvmTarget = jvm { commonJvmConfig(includeNativeInterop = false) tasks.named("run", JavaExec::class) { isIgnoreExitValue = true @@ -50,12 +52,12 @@ kotlin { standardOutput = System.out } } - macosX64() { + macosX64 { binaries { executable() } } - macosArm64() { + macosArm64 { binaries { executable() } @@ -77,26 +79,16 @@ kotlin { } } val jvmMain by getting { - dependsOn(commonMain) - dependencies { implementation(libs.ktor.okHttp) implementation(libs.okhttp.loggingInterceptor) } } - val appleMain by creating { - dependsOn(commonMain) - + val macosMain by getting { dependencies { implementation(libs.ktor.iosHttp) } } - val macosX64Main by getting { - dependsOn(appleMain) - } - val macosArm64Main by getting { - dependsOn(appleMain) - } tasks.withType { // code to make run task in kotlin multiplatform work @@ -113,8 +105,3 @@ kotlin { } commonDokkaConfig() - -tasks.withType { - gradleVersion = "7.3.1" - distributionType = Wrapper.DistributionType.BIN -} diff --git a/gradle/libs.versions.toml b/gradle/libs.versions.toml index bc35e25abc0..1dc825f62fd 100644 --- a/gradle/libs.versions.toml +++ b/gradle/libs.versions.toml @@ -1,37 +1,37 @@ [versions] -kotlin = "1.9.0" +kotlin = "1.9.22" activity-compose = "1.3.1" app-compat = "1.1.0" android-paging3 = "3.2.1" cli-kt = "3.5.0" -coroutines = "1.7.3" -compose-compiler = "1.5.0" +coroutines = "1.8.0" +compose-compiler = "1.5.10" compose-ui = "1.3.2" compose-material = "1.3.1" cryptobox4j = "1.4.0" cryptobox-android = "1.1.5" android-security = "1.1.0-alpha06" ktor = "2.3.8" -okio = "3.6.0" +okio = "3.7.0" ok-http = "4.11.0" mockative = "1.4.1" -android-work = "2.8.1" -android-test-runner = "1.5.0" +android-work = "2.9.0" +android-test-runner = "1.5.2" +android-test-core-ktx = "1.5.0" android-test-rules = "1.5.0" -android-test-core = "1.4.0" +android-test-core = "1.5.0" androidx-arch = "2.2.0" androidx-test-orchestrator = "1.4.2" androidx-sqlite = "2.4.0" benasher-uuid = "0.8.0" -ktx-datetime = { strictly = "0.4.1" } +ktx-datetime = { strictly = "0.5.0" } ktx-serialization = "1.5.1" -ktx-atomicfu = "0.20.0" -ktx-reactive = "1.7.3" +ktx-atomicfu = "0.23.2" kover = "0.7.1" multiplatform-settings = "1.1.1" moduleGraph = "0.5.0" # if you update sqlDelight check if https://github.com/cashapp/sqldelight/issues/4154 is fixed -# and delete the work around in the dev.mk file +# and delete the workaround in the dev.mk file sqldelight = "2.0.1" sqlcipher-android = "4.5.5" pbandk = "0.14.2" @@ -44,7 +44,7 @@ completeKotlin = "1.1.0" desugar-jdk = "2.0.4" kermit = "2.0.1" detekt = "1.19.0" -agp = "8.1.2" +agp = "8.2.0" dokka = "1.8.20" carthage = "0.0.1" libsodiumBindings = "0.8.6" @@ -52,9 +52,9 @@ protobufCodegen = "0.9.4" annotation = "1.7.0" mordant = "2.0.0-beta13" apache-tika = "2.8.0" -mockk = "1.13.9" +mockk = "1.13.10" faker = "1.15.0" -robolectric = "4.9" +robolectric = "4.11.1" stately = "2.0.6" micrometer = "1.11.3" konsist = "0.13.0" @@ -73,7 +73,7 @@ kotlin-multiplatform = { id = "org.jetbrains.kotlin.multiplatform", version.ref kotlin-android = { id = "org.jetbrains.kotlin.android", version.ref = "kotlin" } kotlin-serialization = { id = "org.jetbrains.kotlin.plugin.serialization", version.ref = "kotlin" } kover = { id = "org.jetbrains.kotlinx.kover", version.ref = "kover" } -ksp = { id = "com.google.devtools.ksp", version = "1.9.0-1.0.12" } +ksp = { id = "com.google.devtools.ksp", version = "1.9.22-1.0.17" } carthage = { id = "com.wire.carthage-gradle-plugin", version.ref = "carthage" } sqldelight = { id = "app.cash.sqldelight", version.ref = "sqldelight" } protobuf = { id = "com.google.protobuf", version.ref = "protobufCodegen" } @@ -91,7 +91,7 @@ kotlin-nativeUtils = { module = "org.jetbrains.kotlin:kotlin-native-utils", vers ktxSerialization = { module = "org.jetbrains.kotlinx:kotlinx-serialization-json", version.ref = "ktx-serialization" } ktxDateTime = { module = "org.jetbrains.kotlinx:kotlinx-datetime", version.ref = "ktx-datetime" } ktx-atomicfu = { module = "org.jetbrains.kotlinx:atomicfu", version.ref = "ktx-atomicfu" } -ktxReactive = { module = "org.jetbrains.kotlinx:kotlinx-coroutines-reactive", version.ref = "ktx-reactive" } +ktxReactive = { module = "org.jetbrains.kotlinx:kotlinx-coroutines-reactive", version.ref = "coroutines" } # android dependencies appCompat = { module = "androidx.appcompat:appcompat", version.ref = "app-compat" } @@ -115,7 +115,7 @@ androidtest-rules = { module = "androidx.test:rules", version.ref = "android-tes androidtest-core = { module = "androidx.test:core", version.ref = "android-test-core" } androidtest-arch = { module = "androidx.arch.core:core-testing", version.ref = "androidx-arch" } androidtest-orchestrator = { module = "androidx.test:orchestrator", version.ref = "androidx-test-orchestrator" } -core-ktx = { module = "androidx.test:core-ktx", version.ref = "android-test-runner" } +core-ktx = { module = "androidx.test:core-ktx", version.ref = "android-test-core-ktx" } robolectric = { module = "org.robolectric:robolectric", version.ref = "robolectric" } # coroutines diff --git a/monkeys/build.gradle.kts b/monkeys/build.gradle.kts index a4ec0dd5e43..1fbef0c9c60 100644 --- a/monkeys/build.gradle.kts +++ b/monkeys/build.gradle.kts @@ -142,8 +142,3 @@ sqldelight { } commonDokkaConfig() - -tasks.withType { - gradleVersion = "7.3.1" - distributionType = Wrapper.DistributionType.BIN -} From ad1a4920590b47a313d1b55afbf9d297c1b22115 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 6 Mar 2024 15:06:17 +0100 Subject: [PATCH 02/20] style: remove unused import --- cli/build.gradle.kts | 1 - 1 file changed, 1 deletion(-) diff --git a/cli/build.gradle.kts b/cli/build.gradle.kts index 3d25e9a6e3b..2aebe850ecb 100644 --- a/cli/build.gradle.kts +++ b/cli/build.gradle.kts @@ -18,7 +18,6 @@ import com.wire.kalium.plugins.commonDokkaConfig import com.wire.kalium.plugins.commonJvmConfig -import org.jetbrains.kotlin.gradle.ExperimentalKotlinGradlePluginApi @Suppress("DSL_SCOPE_VIOLATION") From c2f602551e23ece4e47fd0c62d19d331bb6586b5 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 6 Mar 2024 17:21:52 +0100 Subject: [PATCH 03/20] chore: enable desugaring for :android --- android/build.gradle.kts | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/android/build.gradle.kts b/android/build.gradle.kts index 25ddc59423b..2e72ed84e5c 100644 --- a/android/build.gradle.kts +++ b/android/build.gradle.kts @@ -52,6 +52,7 @@ android { compileOptions { sourceCompatibility = JavaVersion.VERSION_17 targetCompatibility = JavaVersion.VERSION_17 + isCoreLibraryDesugaringEnabled = true } kotlinOptions { @@ -77,6 +78,6 @@ dependencies { implementation(project(":network")) implementation(project(":cryptography")) implementation(project(":logic")) - implementation(libs.bundles.android) + coreLibraryDesugaring(libs.desugarJdkLibs) } From aeef2a204145e6d0a826c5e4f97dbead1fa31305 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 6 Mar 2024 17:48:35 +0100 Subject: [PATCH 04/20] chore: change workManagerConfiguration to Kotlin getter --- .../com/wire/kalium/KaliumApplication.kt | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-) diff --git a/android/src/main/kotlin/com/wire/kalium/KaliumApplication.kt b/android/src/main/kotlin/com/wire/kalium/KaliumApplication.kt index e3fc05fdcef..b42764f9c4b 100644 --- a/android/src/main/kotlin/com/wire/kalium/KaliumApplication.kt +++ b/android/src/main/kotlin/com/wire/kalium/KaliumApplication.kt @@ -20,13 +20,13 @@ package com.wire.kalium import android.app.Application import androidx.work.Configuration +import com.wire.kalium.android.R import com.wire.kalium.logger.KaliumLogLevel import com.wire.kalium.logic.CoreLogger import com.wire.kalium.logic.CoreLogic import com.wire.kalium.logic.featureFlags.KaliumConfigs import com.wire.kalium.logic.sync.ForegroundNotificationDetailsProvider import com.wire.kalium.logic.sync.WrapperWorkerFactory -import com.wire.kalium.android.R import java.io.File class KaliumApplication : Application(), Configuration.Provider { @@ -48,14 +48,15 @@ class KaliumApplication : Application(), Configuration.Provider { ) } - override fun getWorkManagerConfiguration(): Configuration { - val myWorkerFactory = WrapperWorkerFactory(coreLogic, object : ForegroundNotificationDetailsProvider { - override fun getSmallIconResId(): Int = R.drawable.ic_launcher_foreground - }) + override val workManagerConfiguration: Configuration + get() { + val myWorkerFactory = WrapperWorkerFactory(coreLogic, object : ForegroundNotificationDetailsProvider { + override fun getSmallIconResId(): Int = R.drawable.ic_launcher_foreground + }) - return Configuration.Builder() - .setWorkerFactory(myWorkerFactory) - .build() - } + return Configuration.Builder() + .setWorkerFactory(myWorkerFactory) + .build() + } } From 49a22d5eadabe9aeda73dd67225a9325876661fa Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 13 Mar 2024 18:40:37 +0100 Subject: [PATCH 05/20] chore: match kotlin-test with kotlin version --- gradle/libs.versions.toml | 1 + testservice/build.gradle.kts | 2 +- util/build.gradle.kts | 2 +- 3 files changed, 3 insertions(+), 2 deletions(-) diff --git a/gradle/libs.versions.toml b/gradle/libs.versions.toml index 1dc825f62fd..da3d94abb23 100644 --- a/gradle/libs.versions.toml +++ b/gradle/libs.versions.toml @@ -86,6 +86,7 @@ detekt-core = ["detekt-api"] [libraries] # Kotlin Gradle Plugin kotlin-plugin = { group = "org.jetbrains.kotlin", name = "kotlin-gradle-plugin", version.ref = "kotlin" } +kotlin-test = { group = "org.jetbrains.kotlin", name = "kotlin-test", version.ref = "kotlin" } kotlin-nativeUtils = { module = "org.jetbrains.kotlin:kotlin-native-utils", version.ref = "kotlin" } ktxSerialization = { module = "org.jetbrains.kotlinx:kotlinx-serialization-json", version.ref = "ktx-serialization" } diff --git a/testservice/build.gradle.kts b/testservice/build.gradle.kts index 81671acef62..c0ef84c7dfe 100644 --- a/testservice/build.gradle.kts +++ b/testservice/build.gradle.kts @@ -87,5 +87,5 @@ dependencies { implementation(libs.okio.core) // Test - testImplementation(kotlin("test")) + testImplementation(libs.kotlin.test) } diff --git a/util/build.gradle.kts b/util/build.gradle.kts index 88e4b7fceab..7f83f8a0f73 100644 --- a/util/build.gradle.kts +++ b/util/build.gradle.kts @@ -39,7 +39,7 @@ kotlin { } val commonTest by getting { dependencies { - implementation(kotlin("test")) + implementation(libs.kotlin.test) implementation(libs.coroutines.test) } } From a3eea3a3467d6bc4e3da4063a45f340b6d06f41f Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 13 Mar 2024 18:48:20 +0100 Subject: [PATCH 06/20] chore: add desugaring to all android modules --- .../kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt | 1 + cryptography/build.gradle.kts | 6 ------ 2 files changed, 1 insertion(+), 6 deletions(-) diff --git a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt index 5428ceff928..ce96c500b0c 100644 --- a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt +++ b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt @@ -52,6 +52,7 @@ fun LibraryExtension.commonAndroidLibConfig( compileOptions { sourceCompatibility = JavaVersion.VERSION_17 targetCompatibility = JavaVersion.VERSION_17 + isCoreLibraryDesugaringEnabled = true } packaging { diff --git a/cryptography/build.gradle.kts b/cryptography/build.gradle.kts index 4a299931879..e1360e6c0d1 100644 --- a/cryptography/build.gradle.kts +++ b/cryptography/build.gradle.kts @@ -32,12 +32,6 @@ kaliumLibrary { } } -android { - compileOptions { - isCoreLibraryDesugaringEnabled = true - } -} - kotlin { androidTarget { dependencies { From 613db009b242f4c0b2e7b952940553e3f917f7e7 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 13 Mar 2024 19:06:16 +0100 Subject: [PATCH 07/20] chore: add desugaring to all android modules --- .../kotlin/com/wire/kalium/plugins/Multiplatform.kt | 10 +++++++--- cryptography/build.gradle.kts | 6 ------ 2 files changed, 7 insertions(+), 9 deletions(-) diff --git a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt index 1c1753d6dc6..0283c45fd4d 100644 --- a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt +++ b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt @@ -19,7 +19,7 @@ package com.wire.kalium.plugins import org.gradle.api.Project -import org.jetbrains.kotlin.gradle.ExperimentalKotlinGradlePluginApi +import org.gradle.kotlin.dsl.dependencies import org.jetbrains.kotlin.gradle.dsl.KotlinMultiplatformExtension /** @@ -30,7 +30,6 @@ import org.jetbrains.kotlin.gradle.dsl.KotlinMultiplatformExtension * * @see commonDokkaConfig */ -@OptIn(ExperimentalKotlinGradlePluginApi::class) fun Project.configureDefaultMultiplatform( enableApple: Boolean, enableJs: Boolean, @@ -47,7 +46,12 @@ fun Project.configureDefaultMultiplatform( applyDefaultHierarchyTemplate() jvm { commonJvmConfig(includeNativeInterop, enableIntegrationTests) } - androidTarget { commmonKotlinAndroidTargetConfig() } + androidTarget { + commmonKotlinAndroidTargetConfig() + dependencies { + add("coreLibraryDesugaring", libs.findLibrary("desugarJdkLibs").get()) + } + } if (enableJs) { js { commonJsConfig(enableJsTests) } diff --git a/cryptography/build.gradle.kts b/cryptography/build.gradle.kts index e1360e6c0d1..e5e40b5317e 100644 --- a/cryptography/build.gradle.kts +++ b/cryptography/build.gradle.kts @@ -33,12 +33,6 @@ kaliumLibrary { } kotlin { - androidTarget { - dependencies { - coreLibraryDesugaring(libs.desugarJdkLibs) - } - } - ios { binaries.all { linkerOpts("-framework", "Security") From 4ddc627d035527a0ecd9ba9f561b21a29228503a Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 13 Mar 2024 19:07:18 +0100 Subject: [PATCH 08/20] chore: configure AndroidInstrumentedTest to run using `commonTest` sourceSet --- .../kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt | 6 ++++++ .../main/kotlin/com/wire/kalium/plugins/Multiplatform.kt | 2 -- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt index ce96c500b0c..b19d722b646 100644 --- a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt +++ b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/CommonAndroidConfig.kt @@ -20,11 +20,17 @@ package com.wire.kalium.plugins import com.android.build.gradle.LibraryExtension import org.gradle.api.JavaVersion +import org.jetbrains.kotlin.gradle.ExperimentalKotlinGradlePluginApi +import org.jetbrains.kotlin.gradle.plugin.KotlinSourceSetTree import org.jetbrains.kotlin.gradle.plugin.mpp.KotlinAndroidTarget private const val BASE_NAMESPACE = "com.wire.kalium" fun KotlinAndroidTarget.commmonKotlinAndroidTargetConfig() { + @OptIn(ExperimentalKotlinGradlePluginApi::class) // this is experimental API and will likely change in the future into more robust DSL + instrumentedTestVariant { + sourceSetTree.set(KotlinSourceSetTree.test) + } /** NO-OP. Nothing to do here for now **/ } diff --git a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt index 0283c45fd4d..5448bdcbadf 100644 --- a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt +++ b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt @@ -68,8 +68,6 @@ fun Project.configureDefaultMultiplatform( } kotlinExtension.sourceSets.getByName("androidInstrumentedTest") { - // Add dependency to commonTest, as it isn't added by default anymore since Kotlin 1.9 - dependsOn(kotlinExtension.sourceSets.getByName("commonTest")) dependencies { // Add common runner and rules to Android Instrumented Tests From 30e8e10ba24f972c73721142680b27e48d4bf6b7 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 13 Mar 2024 19:31:56 +0100 Subject: [PATCH 09/20] chore: simplify desugaring dependency declaration --- .../src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt index 5448bdcbadf..987aee4549e 100644 --- a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt +++ b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt @@ -49,7 +49,7 @@ fun Project.configureDefaultMultiplatform( androidTarget { commmonKotlinAndroidTargetConfig() dependencies { - add("coreLibraryDesugaring", libs.findLibrary("desugarJdkLibs").get()) + add("coreLibraryDesugaring", library("desugarJdkLibs")) } } From 2ac7ca41c5b829f8a0ac8eed849d6ce28e005e00 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Wed, 13 Mar 2024 19:32:47 +0100 Subject: [PATCH 10/20] test: fix missing parameter on `FileNotFoundException` --- .../feature/client/UpdateClientVerificationStatusUseCaseTest.kt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/logic/src/commonTest/kotlin/com/wire/kalium/logic/feature/client/UpdateClientVerificationStatusUseCaseTest.kt b/logic/src/commonTest/kotlin/com/wire/kalium/logic/feature/client/UpdateClientVerificationStatusUseCaseTest.kt index 27361a68a56..641bf186457 100644 --- a/logic/src/commonTest/kotlin/com/wire/kalium/logic/feature/client/UpdateClientVerificationStatusUseCaseTest.kt +++ b/logic/src/commonTest/kotlin/com/wire/kalium/logic/feature/client/UpdateClientVerificationStatusUseCaseTest.kt @@ -80,7 +80,7 @@ class UpdateClientVerificationStatusUseCaseTest { val userId = UserId("userId", "domain") val clientID = ClientId("clientId") - val expectedError = StorageFailure.Generic(FileNotFoundException()) + val expectedError = StorageFailure.Generic(FileNotFoundException("Oopsie")) val (arrangement, useCase) = arrange { withUpdateClientProteusVerificationStatus(Either.Left(expectedError)) From 7c9c79db4f447ce107c1da9473b743d72510c91e Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Thu, 14 Mar 2024 15:59:54 +0100 Subject: [PATCH 11/20] chore: centralise kotlin-test dependency declaration in common script --- .../main/kotlin/com/wire/kalium/plugins/Multiplatform.kt | 6 ++++++ calling/build.gradle.kts | 4 +--- cryptography/build.gradle.kts | 1 - logger/build.gradle.kts | 4 +--- logic/build.gradle.kts | 1 - monkeys/build.gradle.kts | 2 +- network/build.gradle.kts | 1 - persistence-test/build.gradle.kts | 2 +- persistence/build.gradle.kts | 1 - protobuf/build.gradle.kts | 4 +--- tango-tests/build.gradle.kts | 2 +- util/build.gradle.kts | 1 - 12 files changed, 12 insertions(+), 17 deletions(-) diff --git a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt index 987aee4549e..5926f5b566a 100644 --- a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt +++ b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt @@ -77,6 +77,12 @@ fun Project.configureDefaultMultiplatform( } } + kotlinExtension.sourceSets.getByName("commonTest") { + dependencies { + implementation(library("kotlin.test")) + } + } + kotlinExtension.sourceSets.all { languageSettings { // Most of the native code requires this opt-in diff --git a/calling/build.gradle.kts b/calling/build.gradle.kts index 4252737b121..2851cc4187d 100644 --- a/calling/build.gradle.kts +++ b/calling/build.gradle.kts @@ -63,9 +63,7 @@ kotlin { } val commonTest by getting { - dependencies { - implementation(kotlin("test")) - } + dependencies { } } } } diff --git a/cryptography/build.gradle.kts b/cryptography/build.gradle.kts index e5e40b5317e..3d86ef000c6 100644 --- a/cryptography/build.gradle.kts +++ b/cryptography/build.gradle.kts @@ -59,7 +59,6 @@ kotlin { } val commonTest by getting { dependencies { - implementation(kotlin("test")) implementation(libs.coroutines.test) implementation(libs.okio.test) } diff --git a/logger/build.gradle.kts b/logger/build.gradle.kts index 71d4e2e26cd..42f17019848 100644 --- a/logger/build.gradle.kts +++ b/logger/build.gradle.kts @@ -41,9 +41,7 @@ kotlin { } val commonTest by getting { - dependencies { - implementation(kotlin("test")) - } + dependencies { } } val androidUnitTest by getting { diff --git a/logic/build.gradle.kts b/logic/build.gradle.kts index f966511c7ea..76056db7419 100644 --- a/logic/build.gradle.kts +++ b/logic/build.gradle.kts @@ -68,7 +68,6 @@ kotlin { } val commonTest by getting { dependencies { - implementation(kotlin("test")) implementation(project(":persistence-test")) // coroutines implementation(libs.coroutines.test) diff --git a/monkeys/build.gradle.kts b/monkeys/build.gradle.kts index 1fbef0c9c60..684696a76c6 100644 --- a/monkeys/build.gradle.kts +++ b/monkeys/build.gradle.kts @@ -111,7 +111,7 @@ sourceSets { val test by getting { dependencies { - implementation(kotlin("test")) + implementation(libs.kotlin.test) // coroutines implementation(libs.coroutines.test) diff --git a/network/build.gradle.kts b/network/build.gradle.kts index 3ac9952185d..131d9ee6546 100644 --- a/network/build.gradle.kts +++ b/network/build.gradle.kts @@ -67,7 +67,6 @@ kotlin { } val commonTest by getting { dependencies { - implementation(kotlin("test")) // coroutines implementation(libs.coroutines.test) // ktor test diff --git a/persistence-test/build.gradle.kts b/persistence-test/build.gradle.kts index 7f3c4a98334..57d0533628b 100644 --- a/persistence-test/build.gradle.kts +++ b/persistence-test/build.gradle.kts @@ -33,7 +33,7 @@ kotlin { val commonMain by getting { dependencies { implementation(project(":persistence")) - implementation(kotlin("test")) + implementation(libs.kotlin.test) // coroutines implementation(libs.coroutines.core) implementation(libs.coroutines.test) diff --git a/persistence/build.gradle.kts b/persistence/build.gradle.kts index 3eb216d0a8e..56df903590c 100644 --- a/persistence/build.gradle.kts +++ b/persistence/build.gradle.kts @@ -77,7 +77,6 @@ kotlin { } val commonTest by getting { dependencies { - implementation(kotlin("test")) // coroutines implementation(libs.coroutines.test) implementation(libs.turbine) diff --git a/protobuf/build.gradle.kts b/protobuf/build.gradle.kts index 35609793502..e79e91f99e0 100644 --- a/protobuf/build.gradle.kts +++ b/protobuf/build.gradle.kts @@ -46,9 +46,7 @@ kotlin { } } val commonTest by getting { - dependencies { - implementation(kotlin("test")) - } + dependencies { } } val androidUnitTest by getting { dependencies { diff --git a/tango-tests/build.gradle.kts b/tango-tests/build.gradle.kts index 2d1ee061712..65618043780 100644 --- a/tango-tests/build.gradle.kts +++ b/tango-tests/build.gradle.kts @@ -29,7 +29,7 @@ kotlin { implementation(project(":network")) implementation(project(":logic")) implementation(project(":persistence")) - implementation(kotlin("test")) + implementation(libs.kotlin.test) implementation(libs.settings.kmpTest) implementation(libs.ktor.utils) diff --git a/util/build.gradle.kts b/util/build.gradle.kts index 7f83f8a0f73..49946e4b5c2 100644 --- a/util/build.gradle.kts +++ b/util/build.gradle.kts @@ -39,7 +39,6 @@ kotlin { } val commonTest by getting { dependencies { - implementation(libs.kotlin.test) implementation(libs.coroutines.test) } } From 4b7fdee2caccd76d73efeb3b8e35fb3774a00eae Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Thu, 14 Mar 2024 16:24:29 +0100 Subject: [PATCH 12/20] chore: revert android test version --- gradle/libs.versions.toml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gradle/libs.versions.toml b/gradle/libs.versions.toml index da3d94abb23..a4f7487b609 100644 --- a/gradle/libs.versions.toml +++ b/gradle/libs.versions.toml @@ -16,10 +16,10 @@ okio = "3.7.0" ok-http = "4.11.0" mockative = "1.4.1" android-work = "2.9.0" -android-test-runner = "1.5.2" +android-test-runner = "1.5.0" android-test-core-ktx = "1.5.0" android-test-rules = "1.5.0" -android-test-core = "1.5.0" +android-test-core = "1.4.0" androidx-arch = "2.2.0" androidx-test-orchestrator = "1.4.2" androidx-sqlite = "2.4.0" From 9da156cba8856c702dcd11f90776c698b5550b41 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 2 Apr 2024 12:27:14 +0200 Subject: [PATCH 13/20] chore: bump Kotlin to 1.9.23 --- gradle/libs.versions.toml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/gradle/libs.versions.toml b/gradle/libs.versions.toml index a4f7487b609..6bc914e5845 100644 --- a/gradle/libs.versions.toml +++ b/gradle/libs.versions.toml @@ -1,11 +1,11 @@ [versions] -kotlin = "1.9.22" +kotlin = "1.9.23" activity-compose = "1.3.1" app-compat = "1.1.0" android-paging3 = "3.2.1" cli-kt = "3.5.0" coroutines = "1.8.0" -compose-compiler = "1.5.10" +compose-compiler = "1.5.11" compose-ui = "1.3.2" compose-material = "1.3.1" cryptobox4j = "1.4.0" @@ -73,7 +73,7 @@ kotlin-multiplatform = { id = "org.jetbrains.kotlin.multiplatform", version.ref kotlin-android = { id = "org.jetbrains.kotlin.android", version.ref = "kotlin" } kotlin-serialization = { id = "org.jetbrains.kotlin.plugin.serialization", version.ref = "kotlin" } kover = { id = "org.jetbrains.kotlinx.kover", version.ref = "kover" } -ksp = { id = "com.google.devtools.ksp", version = "1.9.22-1.0.17" } +ksp = { id = "com.google.devtools.ksp", version = "1.9.23-1.0.19" } carthage = { id = "com.wire.carthage-gradle-plugin", version.ref = "carthage" } sqldelight = { id = "app.cash.sqldelight", version.ref = "sqldelight" } protobuf = { id = "com.google.protobuf", version.ref = "protobufCodegen" } From 4a529a596a637aa64fd40e4b7fff478175527a13 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 2 Apr 2024 12:27:45 +0200 Subject: [PATCH 14/20] chore: force kotlin-test version to match current kotlin version --- .../main/kotlin/com/wire/kalium/plugins/Multiplatform.kt | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt index 5926f5b566a..996af734a26 100644 --- a/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt +++ b/buildSrc/src/main/kotlin/com/wire/kalium/plugins/Multiplatform.kt @@ -83,6 +83,12 @@ fun Project.configureDefaultMultiplatform( } } + configurations.all { + resolutionStrategy { + force("org.jetbrains.kotlin:kotlin-test:${libs.findVersion("kotlin").get().requiredVersion}") + } + } + kotlinExtension.sourceSets.all { languageSettings { // Most of the native code requires this opt-in From 5bbb413c59df783607e1afeebe639cd9f7562892 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 2 Apr 2024 12:42:18 +0200 Subject: [PATCH 15/20] chore: bump kover and detekt --- gradle/libs.versions.toml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gradle/libs.versions.toml b/gradle/libs.versions.toml index 6bc914e5845..13c929a3112 100644 --- a/gradle/libs.versions.toml +++ b/gradle/libs.versions.toml @@ -27,7 +27,7 @@ benasher-uuid = "0.8.0" ktx-datetime = { strictly = "0.5.0" } ktx-serialization = "1.5.1" ktx-atomicfu = "0.23.2" -kover = "0.7.1" +kover = "0.7.5" multiplatform-settings = "1.1.1" moduleGraph = "0.5.0" # if you update sqlDelight check if https://github.com/cashapp/sqldelight/issues/4154 is fixed @@ -43,7 +43,7 @@ core-crypto-multiplatform = "0.6.0-rc.3-multiplatform-pre1" completeKotlin = "1.1.0" desugar-jdk = "2.0.4" kermit = "2.0.1" -detekt = "1.19.0" +detekt = "1.23.0" agp = "8.2.0" dokka = "1.8.20" carthage = "0.0.1" From 36bb434bd71b2491315a5e780b1e68fc50b11a84 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 2 Apr 2024 12:49:37 +0200 Subject: [PATCH 16/20] chore: bump detekt to 1.23.6 --- gradle/libs.versions.toml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/gradle/libs.versions.toml b/gradle/libs.versions.toml index 13c929a3112..57fb105d15e 100644 --- a/gradle/libs.versions.toml +++ b/gradle/libs.versions.toml @@ -43,7 +43,7 @@ core-crypto-multiplatform = "0.6.0-rc.3-multiplatform-pre1" completeKotlin = "1.1.0" desugar-jdk = "2.0.4" kermit = "2.0.1" -detekt = "1.23.0" +detekt = "1.23.6" agp = "8.2.0" dokka = "1.8.20" carthage = "0.0.1" From 504733d6777ed3e037cbb3c9e485be188a91e3ea Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 2 Apr 2024 13:30:50 +0200 Subject: [PATCH 17/20] chore: remove deprecated detekt rules --- .../src/main/kotlin/scripts/detekt.gradle.kts | 1 + detekt/detekt.yml | 40 ++++++++----------- 2 files changed, 17 insertions(+), 24 deletions(-) diff --git a/buildSrc/src/main/kotlin/scripts/detekt.gradle.kts b/buildSrc/src/main/kotlin/scripts/detekt.gradle.kts index 4c85e7fb7b0..f1f5c677b90 100644 --- a/buildSrc/src/main/kotlin/scripts/detekt.gradle.kts +++ b/buildSrc/src/main/kotlin/scripts/detekt.gradle.kts @@ -30,6 +30,7 @@ dependencies { val detektVersion = libs.findVersion("detekt").get() detekt("io.gitlab.arturbosch.detekt:detekt-cli:$detektVersion") detektPlugins("io.gitlab.arturbosch.detekt:detekt-formatting:$detektVersion") + detektPlugins("io.gitlab.arturbosch.detekt:detekt-rules-libraries:$detektVersion") detektPlugins("com.wire:detekt-rules:1.0.0-SNAPSHOT") { isChanging = true } diff --git a/detekt/detekt.yml b/detekt/detekt.yml index 19c8b4d48c8..caf168f5903 100644 --- a/detekt/detekt.yml +++ b/detekt/detekt.yml @@ -66,7 +66,7 @@ complexity: threshold: 10 includeStaticDeclarations: false includePrivateDeclarations: false - ComplexMethod: + CyclomaticComplexMethod: active: true threshold: 15 ignoreSingleWhenExpression: false @@ -334,7 +334,6 @@ naming: parameterPattern: '[a-z][A-Za-z0-9]*' privateParameterPattern: '[a-z][A-Za-z0-9]*' excludeClassPattern: '$^' - ignoreOverridden: true EnumNaming: active: true excludes: [ '**/build/**', '**/test/**', '**/androidTest/**', '**/androidUnitTest/**', '**/androidInstrumentedTest/**', '**/commonTest/**', '**/jvmTest/**', '**/jsTest/**', '**/iosTest/**' ] @@ -357,13 +356,11 @@ naming: functionPattern: '([a-z][a-zA-Z0-9]*)|(`.*`)' excludeClassPattern: '$^' ignoreAnnotated: [ 'Composable' ] - ignoreOverridden: true FunctionParameterNaming: active: true excludes: [ '**/build/**', '**/test/**', '**/androidTest/**', '**/androidUnitTest/**', '**/androidInstrumentedTest/**', '**/androidAndroidTest/**', '**/commonTest/**', '**/jvmTest/**', '**/jsTest/**', '**/iosTest/**' ] parameterPattern: '[a-z][A-Za-z0-9]*' excludeClassPattern: '$^' - ignoreOverridden: true InvalidPackageDeclaration: active: false rootPackage: '' @@ -403,7 +400,6 @@ naming: variablePattern: '[a-z][A-Za-z0-9]*' privateVariablePattern: '(_)?[a-z][A-Za-z0-9]*' excludeClassPattern: '$^' - ignoreOverridden: true performance: active: true @@ -422,8 +418,6 @@ potential-bugs: active: true Deprecation: active: false - DuplicateCaseInWhenExpression: - active: true EqualsAlwaysReturnsTrueOrFalse: active: true EqualsWithHashCodeExist: @@ -447,10 +441,6 @@ potential-bugs: ignoreOnClassesPattern: '' MapGetWithNotNullAssertionOperator: active: false - MissingWhenCase: - active: true - RedundantElseInWhen: - active: true UnconditionalJumpStatementInLoop: active: false UnnecessaryNotNullOperator: @@ -471,11 +461,15 @@ potential-bugs: style: active: true excludes: [ '**/generated/pbandk/**', '**/build/generated/**' ] + BracesOnWhenStatements: + active: false + BracesOnIfStatements: + active: false CollapsibleIfStatements: active: false DataClassContainsFunctions: active: false - conversionFunctionPrefix: 'to' + conversionFunctionPrefix: ['to'] DataClassShouldBeImmutable: active: false EqualsNullCall: @@ -491,7 +485,7 @@ style: includeLineWrapping: false ForbiddenComment: active: false - values: [ 'TODO:', 'FIXME:', 'STOPSHIP:' ] + comments: [ 'TODO:', 'FIXME:', 'STOPSHIP:' ] allowedPatterns: '' ForbiddenImport: active: false @@ -500,9 +494,6 @@ style: ForbiddenMethodCall: active: false methods: [ ] - ForbiddenPublicDataClass: - active: false - ignorePackages: [ '*.internal', '*.internal.*' ] ForbiddenVoid: active: false ignoreOverridden: false @@ -510,10 +501,8 @@ style: FunctionOnlyReturningConstant: active: true ignoreOverridableFunction: true - excludedFunctions: 'describeContents, empty' + excludedFunctions: ['describeContents', 'empty'] ignoreAnnotated: [ 'dagger.Provides' ] - LibraryCodeMustSpecifyReturnType: - active: true LoopWithTooManyJumpStatements: active: true maxJumpCount: 1 @@ -531,8 +520,6 @@ style: ignoreNamedArgument: true ignoreEnums: false ignoreRanges: false - MandatoryBracesIfStatements: - active: false MandatoryBracesLoops: active: false MaxLineLength: @@ -556,8 +543,6 @@ style: active: true OptionalUnit: active: false - OptionalWhenBraces: - active: false PreferToOverPairSyntax: active: false ProtectedMemberInFinalClass: @@ -569,7 +554,7 @@ style: ReturnCount: active: true max: 2 - excludedFunctions: 'equals' + excludedFunctions: ['equals'] excludeLabeled: false excludeReturnFromLambda: true excludeGuardClauses: false @@ -632,6 +617,13 @@ style: excludes: [ '**/build/**', '**/test/**', '**/androidTest/**', '**/androidUnitTest/**', '**/androidInstrumentedTest/**', '**/commonTest/**', '**/jvmTest/**', '**/jsTest/**', '**/iosTest/**' ] excludeImports: [ 'java.util.*', 'kotlinx.android.synthetic.*' ] +libraries: + ForbiddenPublicDataClass: + active: false + ignorePackages: [ '*.internal', '*.internal.*' ] + LibraryCodeMustSpecifyReturnType: + active: true + WireRuleSet: EnforceSerializableFields: active: true From 5afbc8bdd41d8f32d20a04b29349d238685e0433 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 2 Apr 2024 14:28:31 +0200 Subject: [PATCH 18/20] chore: update detekt rules --- .../com/wire/kalium/KaliumApplication.kt | 9 ++++++--- .../src/main/kotlin/scripts/detekt.gradle.kts | 6 +++--- detekt/detekt.yml | 2 ++ .../logic/configuration/server/ServerConfig.kt | 18 ++++++++++++------ .../com/wire/kalium/logic/di/MapperProvider.kt | 1 + 5 files changed, 24 insertions(+), 12 deletions(-) diff --git a/android/src/main/kotlin/com/wire/kalium/KaliumApplication.kt b/android/src/main/kotlin/com/wire/kalium/KaliumApplication.kt index b42764f9c4b..3819da44213 100644 --- a/android/src/main/kotlin/com/wire/kalium/KaliumApplication.kt +++ b/android/src/main/kotlin/com/wire/kalium/KaliumApplication.kt @@ -50,9 +50,12 @@ class KaliumApplication : Application(), Configuration.Provider { override val workManagerConfiguration: Configuration get() { - val myWorkerFactory = WrapperWorkerFactory(coreLogic, object : ForegroundNotificationDetailsProvider { - override fun getSmallIconResId(): Int = R.drawable.ic_launcher_foreground - }) + val myWorkerFactory = WrapperWorkerFactory( + coreLogic, + object : ForegroundNotificationDetailsProvider { + override fun getSmallIconResId(): Int = R.drawable.ic_launcher_foreground + } + ) return Configuration.Builder() .setWorkerFactory(myWorkerFactory) diff --git a/buildSrc/src/main/kotlin/scripts/detekt.gradle.kts b/buildSrc/src/main/kotlin/scripts/detekt.gradle.kts index f1f5c677b90..7d4d953b20a 100644 --- a/buildSrc/src/main/kotlin/scripts/detekt.gradle.kts +++ b/buildSrc/src/main/kotlin/scripts/detekt.gradle.kts @@ -31,7 +31,7 @@ dependencies { detekt("io.gitlab.arturbosch.detekt:detekt-cli:$detektVersion") detektPlugins("io.gitlab.arturbosch.detekt:detekt-formatting:$detektVersion") detektPlugins("io.gitlab.arturbosch.detekt:detekt-rules-libraries:$detektVersion") - detektPlugins("com.wire:detekt-rules:1.0.0-SNAPSHOT") { + detektPlugins("com.wire:detekt-rules:1.0.0-1.23.6") { isChanging = true } } @@ -40,8 +40,8 @@ detekt { buildUponDefaultConfig = true // activate all available (even unstable) rules. // allRules = false - config = files("$rootDir/detekt/detekt.yml") - source = files("$rootDir") + config.setFrom(files("$rootDir/detekt/detekt.yml")) + source.setFrom(files("$rootDir")) // a way of suppressing issues before introducing detekt baseline = file("$rootDir/detekt/baseline.xml") diff --git a/detekt/detekt.yml b/detekt/detekt.yml index caf168f5903..2ef348d1357 100644 --- a/detekt/detekt.yml +++ b/detekt/detekt.yml @@ -623,6 +623,8 @@ libraries: ignorePackages: [ '*.internal', '*.internal.*' ] LibraryCodeMustSpecifyReturnType: active: true + LibraryEntitiesShouldNotBePublic: + active: false WireRuleSet: EnforceSerializableFields: diff --git a/logic/src/commonMain/kotlin/com/wire/kalium/logic/configuration/server/ServerConfig.kt b/logic/src/commonMain/kotlin/com/wire/kalium/logic/configuration/server/ServerConfig.kt index 4565642c47f..f9f73547dcf 100644 --- a/logic/src/commonMain/kotlin/com/wire/kalium/logic/configuration/server/ServerConfig.kt +++ b/logic/src/commonMain/kotlin/com/wire/kalium/logic/configuration/server/ServerConfig.kt @@ -90,7 +90,7 @@ data class ServerConfig( data class MetaData( @SerialName("federation") val federation: Boolean, @SerialName("commonApiVersion") - @Serializable(with = CommonApiVersionTypeSerializer::class) + @Serializable(CommonApiVersionTypeSerializer::class) val commonApiVersion: CommonApiVersionType, @SerialName("domain") val domain: String? ) @@ -166,7 +166,8 @@ class ServerConfigMapperImpl( ) : ServerConfigMapper { override fun toDTO(serverConfig: ServerConfig): ServerConfigDTO = with(serverConfig) { ServerConfigDTO( - id = id, links = ServerConfigDTO.Links( + id = id, + links = ServerConfigDTO.Links( links.api, links.accounts, links.webSocket, @@ -176,8 +177,11 @@ class ServerConfigMapperImpl( links.title, isOnPremises = links.isOnPremises, apiProxy = links.apiProxy?.let { toDTO(it) } - ), ServerConfigDTO.MetaData( - federation = metaData.federation, apiVersionMapper.toDTO(metaData.commonApiVersion), metaData.domain + ), + metaData = ServerConfigDTO.MetaData( + federation = metaData.federation, + commonApiVersion = apiVersionMapper.toDTO(metaData.commonApiVersion), + domain = metaData.domain ) ) } @@ -198,7 +202,8 @@ class ServerConfigMapperImpl( override fun toDTO(serverConfigEntity: ServerConfigEntity): ServerConfigDTO = with(serverConfigEntity) { ServerConfigDTO( - id = id, links = ServerConfigDTO.Links( + id = id, + links = ServerConfigDTO.Links( api = links.api, accounts = links.accounts, webSocket = links.webSocket, @@ -208,7 +213,8 @@ class ServerConfigMapperImpl( title = links.title, isOnPremises = links.isOnPremises, apiProxy = links.apiProxy?.let { toDTO(it) } - ), ServerConfigDTO.MetaData( + ), + metaData = ServerConfigDTO.MetaData( federation = metaData.federation, commonApiVersion = apiVersionMapper.toDTO(metaData.apiVersion), domain = metaData.domain ) ) diff --git a/logic/src/commonMain/kotlin/com/wire/kalium/logic/di/MapperProvider.kt b/logic/src/commonMain/kotlin/com/wire/kalium/logic/di/MapperProvider.kt index 354bcda0755..349d2cd8fb0 100644 --- a/logic/src/commonMain/kotlin/com/wire/kalium/logic/di/MapperProvider.kt +++ b/logic/src/commonMain/kotlin/com/wire/kalium/logic/di/MapperProvider.kt @@ -100,6 +100,7 @@ import com.wire.kalium.logic.data.user.type.DomainUserTypeMapperImpl import com.wire.kalium.logic.data.user.type.UserEntityTypeMapper import com.wire.kalium.logic.data.user.type.UserEntityTypeMapperImpl +@Suppress("TooManyFunctions") internal object MapperProvider { fun apiVersionMapper(): ApiVersionMapper = ApiVersionMapperImpl() fun idMapper(): IdMapper = IdMapperImpl() From ed418248f9c082ff93d6b8aa6f816d4cf00e1aee Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 2 Apr 2024 15:39:46 +0200 Subject: [PATCH 19/20] chore: update detekt baseline --- detekt/baseline.xml | 3117 ++++++++++++++++++++++++++++++++++++------- 1 file changed, 2646 insertions(+), 471 deletions(-) diff --git a/detekt/baseline.xml b/detekt/baseline.xml index 138f865249e..c49a7ae762f 100644 --- a/detekt/baseline.xml +++ b/detekt/baseline.xml @@ -1,474 +1,2649 @@ - - - MatchingDeclarationName:Widgets.kt$CustomScrollRegion : Widget - - - ClassNaming:Cryptobox.module_@wireapp_cryptobox.kt$T$0 - ClassNaming:Size_t.kt$Size_t : IntegerType - ClassNaming:Uint32_t.kt$Uint32_t : IntegerType - CommentSpacing:com.wire.kalium.logic.data.call.CallClient.kt:17 - CommentSpacing:com.wire.kalium.logic.data.location.Location.kt:4 - CommentSpacing:com.wire.kalium.logic.feature.call.MediaManagerServiceImpl.kt:20 - CommentSpacing:com.wire.kalium.logic.feature.call.scenario.OnSFTRequest.kt:18 - CommentSpacing:com.wire.kalium.logic.feature.message.MessageSendFailureHandler.kt:28 - CommentSpacing:com.wire.kalium.logic.feature.message.MessageSendFailureHandler.kt:29 - ConstructorParameterNaming:MessageApi.kt$MessageApi.Parameters.DefaultParameters$val `data`: String? = null - EmptyDefaultConstructor:KaliumException.kt$KaliumException$() - EmptyDefaultConstructor:KaliumException.kt$KaliumException.FeatureError$() - Filename:com.wire.kalium.logic.data.conversation.ConversationStatus.kt:1 - Filename:com.wire.kalium.logic.feature.session.SessionResult.kt:1 - FunctionNaming:Calling.kt$Calling$fun wcall_answer(inst: Handle, conversationId: String, callType: Int, cbrEnabled: Boolean) - FunctionNaming:Calling.kt$Calling$fun wcall_config_update(inst: Handle, error: Int, jsonString: String) - FunctionNaming:Calling.kt$Calling$fun wcall_create( userId: String, clientId: String, readyHandler: ReadyHandler, sendHandler: SendHandler, sftRequestHandler: SFTRequestHandler, incomingCallHandler: IncomingCallHandler, missedCallHandler: MissedCallHandler, answeredCallHandler: AnsweredCallHandler, establishedCallHandler: EstablishedCallHandler, closeCallHandler: CloseCallHandler, metricsHandler: MetricsHandler, callConfigRequestHandler: CallConfigRequestHandler, constantBitRateStateChangeHandler: ConstantBitRateStateChangeHandler, videoReceiveStateHandler: VideoReceiveStateHandler, arg: Pointer? ): Handle - FunctionNaming:Calling.kt$Calling$fun wcall_end(inst: Handle, conversationId: String) - FunctionNaming:Calling.kt$Calling$fun wcall_init(env: Int): Int - FunctionNaming:Calling.kt$Calling$fun wcall_library_version(): String - FunctionNaming:Calling.kt$Calling$fun wcall_recv_msg( inst: Handle, msg: ByteArray, len: Int, curr_time: Uint32_t, msg_time: Uint32_t, convId: String, userId: String, clientId: String ): Int - FunctionNaming:Calling.kt$Calling$fun wcall_reject(inst: Handle, conversationId: String) - FunctionNaming:Calling.kt$Calling$fun wcall_resp( inst: Handle, status: Int, reason: String, arg: Pointer? ): Int - FunctionNaming:Calling.kt$Calling$fun wcall_set_log_handler(logHandler: LogHandler, arg: Pointer?) - FunctionNaming:Calling.kt$Calling$fun wcall_set_mute(inst: Handle, muted: Int) - FunctionNaming:Calling.kt$Calling$fun wcall_set_participant_changed_handler( inst: Handle, wcall_participant_changed_h: ParticipantChangedHandler, arg: Pointer? ) - FunctionNaming:Calling.kt$Calling$fun wcall_sft_resp( inst: Handle, error: Int, data: ByteArray, length: Int, ctx: Pointer? ) - FunctionNaming:Calling.kt$Calling$fun wcall_start(inst: Handle, conversationId: String, callType: Int, convType: Int, audioCbr: Int): Int - FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun get_prekey_bundle(preKeyId: Number = definedExternally): Promise<PreKeyBundle> - FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun get_serialized_last_resort_prekey(): Promise<`T$0`> - FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun get_serialized_standard_prekeys(): Promise<Array<`T$0`>> - FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun new_prekeys(start: Number, size: Number): Promise<Array<PreKey>> - FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun serialize_prekey(prekey: PreKey): `T$0` - FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun session_delete(sessionId: String): Promise<String> - FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun session_from_prekey(sessionId: String, preKeyBundle: ArrayBuffer): Promise<CryptoboxSession> - FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun session_load(sessionId: String): Promise<CryptoboxSession> - FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun delete_all(): Promise<Boolean> - FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun load_identity(): Promise<IdentityKeyPair?> - FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun load_prekeys(): Promise<Array<PreKey>> - FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun save_identity(identity: IdentityKeyPair): Promise<IdentityKeyPair> - FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun save_prekey(preKey: PreKey): Promise<PreKey> - FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun save_prekeys(preKeys: Array<PreKey>): Promise<Array<PreKey>> - FunctionNaming:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession$open fun fingerprint_local(): String - FunctionNaming:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession$open fun fingerprint_remote(): String - FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun array_begin(): Encoder - FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun array_end(): Encoder - FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun get_buffer(): ArrayBuffer - FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun object_begin(): Encoder - FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun object_end(): Encoder - FunctionNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair.Companion$fun construct_private_key(ed25519_key_pair: KeyPair): SecretKey - FunctionNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair.Companion$fun construct_public_key(ed25519_key_pair: KeyPair): PublicKey - FunctionNaming:PreKey.module_@wireapp_proteus.kt$PreKey.Companion$fun generate_prekeys(start: Number, size: Number): Array<PreKey> - FunctionNaming:PreKey.module_@wireapp_proteus.kt$PreKey.Companion$fun last_resort(): PreKey - FunctionNaming:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$open fun serialised_json(): SerialisedJSON - FunctionNaming:PreKeyStore.module_@wireapp_proteus.kt$PreKeyStore$open fun delete_prekey(prekeyId: Number): Promise<Number> - FunctionNaming:PreKeyStore.module_@wireapp_proteus.kt$PreKeyStore$open fun load_prekey(prekeyId: Number): Promise<PreKey?> - FunctionNaming:SecretKey.module_@wireapp_proteus.kt$SecretKey.Companion$fun shared_secret(publicKey: PublicKey, secretKey: SecretKey): Uint8Array - FunctionParameterNaming:Calling.kt$Calling$curr_time: Uint32_t - FunctionParameterNaming:Calling.kt$Calling$msg_time: Uint32_t - FunctionParameterNaming:Calling.kt$Calling$wcall_participant_changed_h: ParticipantChangedHandler - FunctionParameterNaming:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession$pk_store: CryptoboxCRUDStore - FunctionParameterNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair.Companion$ed25519_key_pair: KeyPair - LongParameterList:Calling.kt$Calling$( inst: Handle, msg: ByteArray, len: Int, curr_time: Uint32_t, msg_time: Uint32_t, convId: String, userId: String, clientId: String ) - LongParameterList:Calling.kt$Calling$( userId: String, clientId: String, readyHandler: ReadyHandler, sendHandler: SendHandler, sftRequestHandler: SFTRequestHandler, incomingCallHandler: IncomingCallHandler, missedCallHandler: MissedCallHandler, answeredCallHandler: AnsweredCallHandler, establishedCallHandler: EstablishedCallHandler, closeCallHandler: CloseCallHandler, metricsHandler: MetricsHandler, callConfigRequestHandler: CallConfigRequestHandler, constantBitRateStateChangeHandler: ConstantBitRateStateChangeHandler, videoReceiveStateHandler: VideoReceiveStateHandler, arg: Pointer? ) - LongParameterList:IncomingCallHandler.kt$IncomingCallHandler$( conversationId: String, messageTime: Uint32_t, userId: String, clientId: String, isVideoCall: Boolean, shouldRing: Boolean, conversationType: Int, arg: Pointer? ) - LongParameterList:ToggleReactionUseCase.kt$ToggleReactionUseCase$( clientId: ClientId, conversationId: ConversationId, date: String, messageId: String, currentReactions: UserReactions, newReaction: String ) - LongParameterList:ToggleReactionUseCase.kt$ToggleReactionUseCase$( clientId: ClientId, conversationId: ConversationId, date: String, messageId: String, removedReaction: String, currentReactions: UserReactions ) - MagicNumber:CallManagerImpl.kt$CallManagerImpl$1000 - MagicNumber:ConversationStatus.kt$MutedConversationStatus.AllMuted$3 - MagicNumber:CustomErrors.kt$CustomErrors$500 - MagicNumber:GlobalCallManager.kt$LogHandlerImpl$3 - MagicNumber:MLSClientImpl.kt$MLSClientImpl$30 - MagicNumber:NetworkUtils.kt$300 - MagicNumber:NetworkUtils.kt$399 - MagicNumber:NetworkUtils.kt$400 - MagicNumber:NetworkUtils.kt$499 - MagicNumber:NetworkUtils.kt$500 - MagicNumber:NetworkUtils.kt$599 - MagicNumber:ProteusClientImpl.kt$ProteusClientImpl$65535 - MagicNumber:ProteusException.kt$ProteusException.Companion$13 - MagicNumber:ProteusException.kt$ProteusException.Companion$14 - MagicNumber:ProteusException.kt$ProteusException.Companion$15 - MagicNumber:ProteusException.kt$ProteusException.Companion$3 - MagicNumber:ProteusException.kt$ProteusException.Companion$4 - MagicNumber:ProteusException.kt$ProteusException.Companion$5 - MagicNumber:ProteusException.kt$ProteusException.Companion$6 - MagicNumber:ProteusException.kt$ProteusException.Companion$7 - MagicNumber:ProteusException.kt$ProteusException.Companion$8 - MagicNumber:ProteusException.kt$ProteusException.Companion$9 - MatchingDeclarationName:ConversationStatus.kt$MutedConversationStatus - MatchingDeclarationName:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore : PreKeyStore - MatchingDeclarationName:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession - MatchingDeclarationName:Encoder.module_@wireapp_cbor.kt$Encoder - MatchingDeclarationName:IdentityKey.module_@wireapp_proteus.kt$IdentityKey - MatchingDeclarationName:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair - MatchingDeclarationName:KeyPair.module_@wireapp_proteus.kt$KeyPair - MatchingDeclarationName:MemoryEngine.module_@wireapp_store-engine.kt$MemoryEngine : CRUDEngine - MatchingDeclarationName:PreKey.module_@wireapp_proteus.kt$PreKey - MatchingDeclarationName:PreKeyStore.module_@wireapp_proteus.kt$PreKeyStore - MatchingDeclarationName:PublicKey.module_@wireapp_proteus.kt$PublicKey - MatchingDeclarationName:SecretKey.module_@wireapp_proteus.kt$SecretKey - MatchingDeclarationName:SessionResult.kt$GetAllSessionsResult - MaxLineLength:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$external open - MaxLineLength:MemoryEngine.module_@wireapp_store-engine.kt$MemoryEngine$override fun <PrimaryKey, ChangesType> updateOrCreate(tableName: String, primaryKey: PrimaryKey, changes: ChangesType): Promise<PrimaryKey> - MaxLineLength:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$constructor(publicIdentityKey: IdentityKey, preKeyId: Number, publicKey: PublicKey, signature: Uint8Array? = definedExternally, version: Number = definedExternally) - ModifierOrder:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$external open - ModifierOrder:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$external open - ModifierOrder:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$override open - ModifierOrder:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession$external open - ModifierOrder:Decoder.module_@wireapp_cbor.kt$Decoder$external open - ModifierOrder:Encoder.module_@wireapp_cbor.kt$Encoder$external open - ModifierOrder:IdentityKey.module_@wireapp_proteus.kt$IdentityKey$external open - ModifierOrder:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$external open - ModifierOrder:KeyPair.module_@wireapp_proteus.kt$KeyPair$external open - ModifierOrder:MemoryEngine.module_@wireapp_store-engine.kt$MemoryEngine$external open - ModifierOrder:PreKey.module_@wireapp_proteus.kt$PreKey$external open - ModifierOrder:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$external open - ModifierOrder:PreKeyStore.module_@wireapp_proteus.kt$PreKeyStore$external open - ModifierOrder:PublicKey.module_@wireapp_proteus.kt$PublicKey$external open - ModifierOrder:SecretKey.module_@wireapp_proteus.kt$SecretKey$external open - NestedBlockDepth:ValidateSSOCodeUseCase.kt$ValidateSSOCodeUseCaseImpl$override fun invoke(ssoCode: String): ValidateSSOCodeResult - NoConsecutiveBlankLines:com.wire.kalium.logic.data.auth.login.LoginRepositoryTest.kt:22 - NoConsecutiveBlankLines:com.wire.kalium.logic.data.connection.ConnectionMapperTest.kt:17 - NoConsecutiveBlankLines:com.wire.kalium.logic.data.connection.ConnectionMapperTest.kt:43 - NoConsecutiveBlankLines:com.wire.kalium.logic.data.connection.ConnectionMapperTest.kt:68 - NoConsecutiveBlankLines:com.wire.kalium.logic.data.conversation.MemberMapperTest.kt:127 - NoConsecutiveBlankLines:com.wire.kalium.logic.feature.message.MessageSendFailureHandler.kt:11 - NoConsecutiveBlankLines:com.wire.kalium.logic.feature.register.RequestActivationCodeUseCaseTest.kt:66 - NoConsecutiveBlankLines:com.wire.kalium.logic.feature.register.VerifyActivationCodeUseCaseTest.kt:88 - NoConsecutiveBlankLines:com.wire.kalium.logic.feature.register.VerifyActivationCodeUseCaseTest.kt:96 - NoConsecutiveBlankLines:com.wire.kalium.logic.feature.server.UpdateApiVersionsUseCase.kt:25 - NoConsecutiveBlankLines:com.wire.kalium.logic.feature.user.GetUserInfoUseCaseTest.kt:234 - NoConsecutiveBlankLines:com.wire.kalium.logic.functional.FlowTest.kt:13 - NoConsecutiveBlankLines:com.wire.kalium.network.api.base.model.PushTokenBody.kt:3 - NoConsecutiveBlankLines:com.wire.kalium.network.api.base.unauthenticated.SSOSettingsResponse.kt:3 - NoConsecutiveBlankLines:com.wire.kalium.network.api.base.unauthenticated.SSOSettingsResponse.kt:7 - NoConsecutiveBlankLines:com.wire.kalium.persistence.kmmSettings.KaliumPreferencesTest.kt:34 - NoConsecutiveBlankLines:com.wire.kalium.persistence.kmmSettings.KaliumPreferencesTest.kt:55 - NoMultipleSpaces:com.wire.kalium.logic.configuration.server.ServerConfigTest.kt:19 - NoMultipleSpaces:com.wire.kalium.logic.configuration.server.ServerConfigTest.kt:27 - NoMultipleSpaces:com.wire.kalium.logic.configuration.server.ServerConfigTest.kt:35 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.LogoutUseCase.kt:21 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCase.kt:32 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCase.kt:33 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCase.kt:34 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCase.kt:35 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCase.kt:36 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCaseTest.kt:32 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCaseTest.kt:33 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCaseTest.kt:34 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCaseTest.kt:39 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCaseTest.kt:40 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCaseTest.kt:41 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCaseTest.kt:42 - NoMultipleSpaces:com.wire.kalium.logic.feature.auth.ValidatePasswordUseCaseTest.kt:43 - NoMultipleSpaces:com.wire.kalium.persistence.GlobalDBBaseTest.kt:7 - NoSemicolons:com.wire.kalium.logic.data.user.type.UserType.kt:1 - NoUnusedImports:com.wire.kalium.logic.data.user.ConnectionStateMapper.kt:4 - NoUnusedImports:com.wire.kalium.logic.feature.auth.sso.ValidateSSOCodeUseCaseTest.kt:4 - NoUnusedImports:com.wire.kalium.logic.feature.call.MediaManagerServiceImpl.kt:6 - NoUnusedImports:com.wire.kalium.logic.feature.call.MediaManagerServiceImpl.kt:7 - NoUnusedImports:com.wire.kalium.logic.feature.call.usecase.RejectCallUseCaseTest.kt:5 - NoUnusedImports:com.wire.kalium.logic.feature.user.UploadUserAvatarUseCaseTest.kt:5 - NoWildcardImports:com.wire.kalium.logic.feature.asset.UpdateAssetMessageDownloadStatusUseCaseTest.kt:8 - ObjectPropertyNaming:Decoder.module_@wireapp_cbor.kt$Decoder.Companion$var _check_overflow: Any - PackageName:com.wire.kalium.logic.test_util.TestKaliumDispatcher.kt:1 - PackageName:com.wire.kalium.logic.test_util.TestNetworkException.kt:1 - PackageName:com.wire.kalium.logic.test_util.TimeUtils.kt:1 - ParameterListWrapping:com.wire.kalium.network.utils.NetworkResponse.kt:14 - ParameterListWrapping:com.wire.kalium.persistence.client.LastRetrievedNotificationEventStorage.kt:19 - ReturnCount:NetworkUtils.kt$internal fun String.splitSetCookieHeader(): List<String> - SpacingAroundColon:com.wire.kalium.cryptography.exceptions.ProteusException.kt:3 - SpacingAroundColon:com.wire.kalium.logic.feature.session.SessionResult.kt:7 - SpacingAroundColon:com.wire.kalium.persistence.client.LastRetrievedNotificationEventStorage.kt:19 - SpacingAroundCurly:com.wire.kalium.logic.feature.call.usecase.RejectCallUseCaseTest.kt:27 - StringTemplate:com.wire.kalium.cryptography.IDs.kt:26 - StringTemplate:com.wire.kalium.logic.data.sso.SSOUtil.kt:5 - TooGenericExceptionCaught:CoreFailure.kt$e: Exception - TooGenericExceptionCaught:NetworkUtils.kt$e: Exception - TooGenericExceptionCaught:ProteusClientImpl.kt$ProteusClientImpl$e: Exception - TooManyFunctions:Calling.kt$Calling : Library - TooManyFunctions:ConversationDAO.kt$ConversationDAO - TooManyFunctions:ConversationRepository.kt$ConversationRepository - TooManyFunctions:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox - TooManyFunctions:Decoder.module_@wireapp_cbor.kt$Decoder - TooManyFunctions:Encoder.module_@wireapp_cbor.kt$Encoder - TooManyFunctions:MapperProvider.kt$MapperProvider$MapperProvider - TopLevelPropertyNaming:Uint32_t.kt$private const val integerSize = 4 - UnnecessaryAbstractClass:GlobalDBBaseTest.kt$GlobalDBBaseTest - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var create_last_resort_prekey: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var create_new_identity: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var get_prekey: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var get_session_queue: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var load_session_from_cache: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var publish_event: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var publish_prekeys: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var publish_session_id: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var refill_prekeys: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var remove_session_from_cache: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var save_identity: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var save_session_in_cache: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var session_from_message: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var session_save: Any - VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var session_update: Any - VariableNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open var from_store: Any - VariableNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open var to_store: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _advance: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _bytes: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _f32: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _f64: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read_length: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read_signed: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read_type_info: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read_unsigned: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _skip_until_break: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _skip_value: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _type_info_with_assert: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _u16: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _u32: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _u64: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _u8: Any - VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_array_length: Number - VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_bytes_length: Number - VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_nesting: Number - VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_object_size: Number - VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_text_length: Number - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _advance: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _bytes: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _ensure: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _f32: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _f64: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _grow_buffer: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _new_buffer_length: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _u16: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _u32: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _u64: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _u8: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _write: Any - VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _write_type_and_len: Any - VariableNaming:IdentityKey.module_@wireapp_proteus.kt$IdentityKey$open var public_key: PublicKey - VariableNaming:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$open var public_key: IdentityKey - VariableNaming:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$open var secret_key: SecretKey - VariableNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair$open var public_key: PublicKey - VariableNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair$open var secret_key: SecretKey - VariableNaming:PreKey.module_@wireapp_proteus.kt$PreKey$open var key_id: Number - VariableNaming:PreKey.module_@wireapp_proteus.kt$PreKey$open var key_pair: KeyPair - VariableNaming:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$open var identity_key: IdentityKey - VariableNaming:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$open var prekey_id: Number - VariableNaming:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$open var public_key: PublicKey - VariableNaming:PublicKey.module_@wireapp_proteus.kt$PublicKey$open var pub_curve: Uint8Array - VariableNaming:PublicKey.module_@wireapp_proteus.kt$PublicKey$open var pub_edward: Uint8Array - VariableNaming:SecretKey.module_@wireapp_proteus.kt$SecretKey$open var sec_curve: Uint8Array - VariableNaming:SecretKey.module_@wireapp_proteus.kt$SecretKey$open var sec_edward: Uint8Array - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import kotlin.js.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.khronos.webgl.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.events.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.parsing.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.svg.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.url.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.fetch.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.files.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.notifications.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.performance.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.workers.* - WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.xhr.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import kotlin.js.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.khronos.webgl.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.events.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.parsing.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.svg.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.url.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.fetch.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.files.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.notifications.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.performance.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.workers.* - WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.xhr.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import kotlin.js.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.khronos.webgl.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.events.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.parsing.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.svg.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.url.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.fetch.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.files.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.notifications.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.performance.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.workers.* - WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.xhr.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import kotlin.js.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.khronos.webgl.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.events.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.parsing.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.svg.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.url.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.fetch.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.files.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.notifications.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.performance.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.workers.* - WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.xhr.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import kotlin.js.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.khronos.webgl.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.events.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.parsing.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.svg.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.url.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.fetch.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.files.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.notifications.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.performance.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.workers.* - WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.xhr.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import kotlin.js.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.khronos.webgl.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.events.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.parsing.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.svg.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.url.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.fetch.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.files.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.notifications.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.performance.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.workers.* - WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.xhr.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import kotlin.js.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.khronos.webgl.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.events.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.url.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.fetch.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.files.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.notifications.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.performance.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.workers.* - WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.xhr.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import kotlin.js.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.khronos.webgl.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.events.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.url.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.fetch.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.files.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.notifications.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.performance.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.workers.* - WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.xhr.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import kotlin.js.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.khronos.webgl.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.events.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.url.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.fetch.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.files.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.notifications.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.performance.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.workers.* - WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.xhr.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import kotlin.js.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.khronos.webgl.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.events.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.parsing.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.svg.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.url.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.fetch.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.files.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.notifications.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.performance.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.workers.* - WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.xhr.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import kotlin.js.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.khronos.webgl.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.events.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.url.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.fetch.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.files.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.notifications.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.performance.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.workers.* - WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.xhr.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import kotlin.js.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.khronos.webgl.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.events.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.url.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.fetch.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.files.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.notifications.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.performance.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.workers.* - WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.xhr.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import kotlin.js.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.khronos.webgl.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.events.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.url.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.fetch.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.files.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.notifications.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.performance.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.workers.* - WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.xhr.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import kotlin.js.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.khronos.webgl.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.events.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.url.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.fetch.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.files.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.notifications.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.performance.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.workers.* - WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.xhr.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import kotlin.js.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.khronos.webgl.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.events.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.url.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.fetch.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.files.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.notifications.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.performance.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.workers.* - WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.xhr.* - + + MatchingDeclarationName:Widgets.kt$CustomScrollRegion : Widget + + + AnnotationSpacing:HttpClientConnectionSpecsTest.kt$HttpClientConnectionSpecsTest$@Test + AnnotationSpacing:NetworkResponse.kt$@OptIn(ExperimentalContracts::class) + AnnotationSpacing:ProteusClient.kt$ProteusClient$@Suppress("TooManyFunctions") + AnnotationSpacing:SendButtonMessageUseCase.kt$SendButtonMessageUseCase$@Suppress("LongParameterList") + AnnotationSpacing:SendEditTextMessageUseCase.kt$SendEditTextMessageUseCase$@Suppress("LongParameterList") + AnnotationSpacing:SendKnockUseCase.kt$SendKnockUseCase$@Suppress("LongParameterList") + AnnotationSpacing:SendTextMessageUseCase.kt$SendTextMessageUseCase$@Suppress("LongParameterList") + ArgumentListWrapping:ACMEApi.kt$ACMEApiImpl$("getACMEDirectories: Url cannot be empty") + ArgumentListWrapping:ACMEApi.kt$ACMEApiImpl$("sendACMERequest: Url cannot be empty") + ArgumentListWrapping:ACMEApi.kt$ACMEApiImpl$(IllegalArgumentException("getACMEDirectories: Url cannot be empty")) + ArgumentListWrapping:ACMEApi.kt$ACMEApiImpl$(IllegalArgumentException("sendACMERequest: Url cannot be empty")) + ArgumentListWrapping:ACMEApi.kt$ACMEApiImpl$(KaliumException.GenericError(IllegalArgumentException("getACMEDirectories: Url cannot be empty"))) + ArgumentListWrapping:ACMEApi.kt$ACMEApiImpl$(KaliumException.GenericError(IllegalArgumentException("sendACMERequest: Url cannot be empty"))) + ArgumentListWrapping:AcceptConnectionRequestUseCase.kt$AcceptConnectionRequestUseCaseImpl$("An error occurred when accepting the connection request from ${userId.toLogString()}: $it") + ArgumentListWrapping:AccessTokenDTOJson.kt$AccessTokenDTOJson$( AccessTokenDTO( userId = "user_id", value = "Nlrhltkj-NgJUjEVevHz8Ilgy_pyWCT2b0kQb-GlnamyswanghN9DcC3an5RUuA7sh1_nC3hv2ZzMRlIhPM7Ag==.v=1.k=1.d=1637254939." + "t=a.l=.u=75ebeb16-a860-4be4-84a7-157654b492cf.c=18401233206926541098", expiresIn = 900, tokenType = "Bearer" ), jsonProvider ) + ArgumentListWrapping:AccessTokenRefresherTest.kt$AccessTokenRefresherTest$(userId = TestUser.USER_ID, TEST_REFRESH_RESULT.accessToken, TEST_REFRESH_RESULT.refreshToken, null) + ArgumentListWrapping:AccountRepositoryTest.kt$AccountRepositoryTest.Arrangement$(Unit, mapOf(), 200) + ArgumentListWrapping:AccountsDAO.kt$AccountsDAOImpl$(mapper = mapper::fromPersistentWebSocketStatus) + ArgumentListWrapping:AccountsDAO.kt$AccountsDAOImpl$(queriesContext) + ArgumentListWrapping:ActivationRequestJson.kt$ActivationRequestJson$( RegisterApi.ActivationParam.Email(email = "user@domain.de", code = "123456"), jsonProvider ) + ArgumentListWrapping:AddAuthenticatedUserUseCase.kt$AddAuthenticatedUserUseCase$( { Result.Failure.Generic(it) }, { doesValidSessionExist -> when (doesValidSessionExist) { true -> onUserExist(serverConfigId, ssoId, authTokens, proxyCredentials, replace) false -> storeUser(serverConfigId, ssoId, authTokens, proxyCredentials) } } ) + ArgumentListWrapping:AddAuthenticatedUserUseCaseTest.kt$AddAuthenticatedUserUseCaseTest$(TEST_SERVER_CONFIG.id, TEST_SSO_ID, newSession, proxyCredentials, Either.Right(Unit)) + ArgumentListWrapping:AddAuthenticatedUserUseCaseTest.kt$AddAuthenticatedUserUseCaseTest$(Unit) + ArgumentListWrapping:AddAuthenticatedUserUseCaseTest.kt$AddAuthenticatedUserUseCaseTest.Arrangement$(serverConfigId, ssoId, accountTokens, proxyCredentials) + ArgumentListWrapping:AddAuthenticatedUserUseCaseTest.kt$AddAuthenticatedUserUseCaseTest.Arrangement$(sessionRepository) + ArgumentListWrapping:AddUserToConversationAction.kt$AddUserToConversationAction$(monkeyConversation.conversationId, participants.map { it.internalId }) + ArgumentListWrapping:AddUserToConversationAction.kt$AddUserToConversationAction$(sender) + ArgumentListWrapping:AddUserToConversationEventAction.kt$AddUserToConversationEventAction$(1u, UserCount.fixed(eventConfig.newMembers.count().toUInt())) + ArgumentListWrapping:AddUserToConversationEventAction.kt$AddUserToConversationEventAction$(ActionType.AddUsersToConversation(1u, UserCount.fixed(eventConfig.newMembers.count().toUInt())), {}) + ArgumentListWrapping:AddUserToConversationEventAction.kt$AddUserToConversationEventAction$(eventConfig.newMembers.count().toUInt()) + ArgumentListWrapping:Administration.kt$(text = "Please init the monkey first through the /set api", status = HttpStatusCode.UnprocessableEntity) + ArgumentListWrapping:ApiTest.kt$ApiTest$("charset", "UTF-8") + ArgumentListWrapping:ApiTest.kt$ApiTest$(ByteReadChannel(responseBody), statusCode, assertion, headers, networkStateObserver) + ArgumentListWrapping:ApiTest.kt$ApiTest$(ContentType.Application.JoseJson.withParameter("charset", "UTF-8")) + ArgumentListWrapping:ApiTest.kt$ApiTest$(expected = expectedHost, actual = this.url.host) + ArgumentListWrapping:ApiTest.kt$ApiTest$(pathAndQuery, this.url.encodedPathAndQuery) + ArgumentListWrapping:ApiTest.kt$ApiTest$(responseBody) + ArgumentListWrapping:ApiTest.kt$ApiTest$(this.url.parameters[name], hasValue) + ArgumentListWrapping:ApplicationMessageHandler.kt$ApplicationMessageHandlerImpl$(content, signaling.conversationId, signaling.senderUserId) + ArgumentListWrapping:ApplicationMessageHandler.kt$ApplicationMessageHandlerImpl$(content, signaling.conversationId, signaling.senderUserId, signaling.date) + ArgumentListWrapping:ApplicationMessageHandler.kt$ApplicationMessageHandlerImpl$(message.conversationId, quotedReference.quotedMessageId) + ArgumentListWrapping:ApplicationMessageHandlerTest.kt$ApplicationMessageHandlerTest$( 1000, "some-image.jpg", "image/jpg", AssetContent.AssetMetadata.Image(200, 200), AssetContent.RemoteData( ByteArray(16), ByteArray(16), "assetid", null, null, null ) ) + ArgumentListWrapping:ApplicationMessageHandlerTest.kt$ApplicationMessageHandlerTest$( ByteArray(16), ByteArray(16), "assetid", null, null, null ) + ArgumentListWrapping:ApproveLegalHoldRequestUseCaseTest.kt$ApproveLegalHoldRequestUseCaseTest.Arrangement$(teamRepository, selfTeamIdProvider) + ArgumentListWrapping:Asset.kt$( "audio/mp3", "audio/mp4", "audio/mpeg", "audio/ogg", "audio/wav", "audio/x-wav", "audio/x-pn-wav", "audio/x-m4a" ) + ArgumentListWrapping:AssetApiV0.kt$AssetApiV0$("""ASSETS 401: "WWWAuthenticate header": "${httpResponse.headers[HttpHeaders.WWWAuthenticate]}"""") + ArgumentListWrapping:AssetMapper.kt$AssetMapperImpl$(width = metadataType.value.width, height = metadataType.value.height) + ArgumentListWrapping:AssetMessageHandler.kt$AssetMessageHandlerImpl$("The previously persisted message has a different sender id than the one we are trying to process") + ArgumentListWrapping:AssetRepository.kt$AssetDataSource$( assetId, assetName.fileExtension() ?: getExtensionFromMimeType(mimeType) ) + ArgumentListWrapping:AssetRepository.kt$AssetDataSource$(EncryptionFailure.WrongAssetHash) + ArgumentListWrapping:AssetRepository.kt$AssetDataSource$(assetId = assetId, assetDomain = assetDomain, assetName = assetId, assetToken = null, mimeType = null) + ArgumentListWrapping:AssetRepository.kt$AssetDataSource$(assetId, assetDomain, persistentAssetDataPath, assetDataSize) + ArgumentListWrapping:AssetRepository.kt$AssetDataSource$(assetId, extension) + ArgumentListWrapping:AssetRepository.kt$AssetDataSource$(assetName = buildFileName(assetId, extension)) + ArgumentListWrapping:AssetRepository.kt$AssetDataSource$(assetResponse.key, assetResponse.domain, decodedDataPath, uploadAssetData.dataSize, extension) + ArgumentListWrapping:AssetRepository.kt$AssetDataSource$(tempEncryptedDataPath, encryptedDataSize, mimeType, false, RetentionType.PERSISTENT) + ArgumentListWrapping:AssetRepositoryTest.kt$AssetRepositoryTest$("${assetKey.value}.${assetName.fileExtension()}") + ArgumentListWrapping:AssetRepositoryTest.kt$AssetRepositoryTest$(assetKey, stubAssetEntity(assetKey.value, assetPath, assetRawData.size.toLong())) + ArgumentListWrapping:AssetRepositoryTest.kt$AssetRepositoryTest$(assetKey, stubAssetEntity(assetKey.value, dummyPath, expectedImage.size.toLong())) + ArgumentListWrapping:AssetRepositoryTest.kt$AssetRepositoryTest$(assetKey.value, assetPath, assetRawData.size.toLong()) + ArgumentListWrapping:AssetRepositoryTest.kt$AssetRepositoryTest$(assetKey.value, dummyPath, expectedImage.size.toLong()) + ArgumentListWrapping:AuthTokenStorage.kt$AuthTokenStorageImpl$(authTokenEntity.userId) + ArgumentListWrapping:AuthTokenStorage.kt$AuthTokenStorageImpl$(proxyCredentialsKey(authTokenEntity.userId), it, ProxyCredentialsEntity.serializer()) + ArgumentListWrapping:AuthTokenStorageTest.kt$AuthTokenStorageTest$(accessToken = "new_access_token", tokenType = "new_token_type", refreshToken = "new_refresh_token") + ArgumentListWrapping:AuthTokenStorageTest.kt$AuthTokenStorageTest.Companion$("user_id", "user_domain") + ArgumentListWrapping:AuthTokenStorageTest.kt$AuthTokenStorageTest.Companion$(UserIDEntity("user_id", "user_domain"), "access_token", "refresh_token", "token_type", "label") + ArgumentListWrapping:AuthenticatedNetworkContainerV0.kt$AuthenticatedNetworkContainerV0$(networkClient, websocketClient, backendConfig) + ArgumentListWrapping:AuthenticatedNetworkContainerV2.kt$AuthenticatedNetworkContainerV2$(networkClient, websocketClient, backendConfig) + ArgumentListWrapping:AuthenticatedNetworkContainerV3.kt$AuthenticatedNetworkContainerV3$(networkClient, websocketClient, backendConfig) + ArgumentListWrapping:AuthenticatedNetworkContainerV4.kt$AuthenticatedNetworkContainerV4$(networkClient, websocketClient, backendConfig) + ArgumentListWrapping:AuthenticatedNetworkContainerV5.kt$AuthenticatedNetworkContainerV5$(networkClient, websocketClient, backendConfig) + ArgumentListWrapping:AuthenticatedNetworkContainerV6.kt$AuthenticatedNetworkContainerV6$(networkClient, websocketClient, backendConfig) + ArgumentListWrapping:AuthenticationScope.kt$AuthenticationScope$(it) + ArgumentListWrapping:AuthenticationScope.kt$AuthenticationScope$(unauthenticatedNetworkContainer.sso, unauthenticatedNetworkContainer.domainLookupApi) + ArgumentListWrapping:BackupCoder.kt$BackupCoder$(userId, decodedHeader.salt, decodedHeader.opslimit, decodedHeader.memlimit) + ArgumentListWrapping:BackupUtils.kt$("There was an error trying to extract the provided compressed file", e) + ArgumentListWrapping:BackupUtils.kt$("There was an error trying to validate the provided compressed file", e) + ArgumentListWrapping:BackupUtils.kt$(RuntimeException("There was an error trying to extract the provided compressed file", e)) + ArgumentListWrapping:BackupUtils.kt$(RuntimeException("There was an error trying to validate the provided compressed file", e)) + ArgumentListWrapping:BackupUtils.kt$(StorageFailure.Generic(RuntimeException("There was an error trying to extract the provided compressed file", e))) + ArgumentListWrapping:BackupUtils.kt$(StorageFailure.Generic(RuntimeException("There was an error trying to validate the provided compressed file", e))) + ArgumentListWrapping:BaseDatabaseTest.kt$BaseDatabaseTest$(ApplicationProvider.getApplicationContext()) + ArgumentListWrapping:BaseDatabaseTest.kt$BaseDatabaseTest$(NSCachesDirectory, NSUserDomainMask, null, true, null) + ArgumentListWrapping:BaseProteusClientTest.kt$BaseProteusClientTest$(proteusStore.value, ioContext = testCoroutineScheduler, defaultContext = testCoroutineScheduler) + ArgumentListWrapping:CallDAOImpl.kt$CallDAOImpl$(queriesContext) + ArgumentListWrapping:CallManagerImpl.kt$CallManagerImpl$(callRepository, callMapper, qualifiedIdMapper, scope, kaliumConfigs) + ArgumentListWrapping:CallRepositoryTest.kt$CallRepositoryTest$(TestKaliumDispatcher.default) + ArgumentListWrapping:CallingParticipantsOrder.kt$CallingParticipantsOrderImpl$(otherParticipants, false) + ArgumentListWrapping:CallsScope.kt$CallsScope$(callManager, KaliumDispatcherImpl) + ArgumentListWrapping:CallsScope.kt$CallsScope$(userConfigRepository, callRepository) + ArgumentListWrapping:ChaCha20CoderTest.kt$ChaCha20CoderTest$(encryptedDataSource, decryptedDataOutputSink, passphrase, userId) + ArgumentListWrapping:ChaCha20Decryptor.kt$ChaCha20Decryptor$("Error while decrypting the backup data with ChaCha20. Probably the provided password is wrong:\n $e}") + ArgumentListWrapping:ChaCha20Decryptor.kt$ChaCha20Decryptor$("There was an error decoding backup header data. Stored hashed userId differs from the provided one:\n $e}") + ArgumentListWrapping:ChaCha20Encryptor.kt$ChaCha20Encryptor$("There was an error decoding backup header data. Stored hashed userId differs from the provided one:\n $e}") + ArgumentListWrapping:ClassifiedDomainsConfigHandler.kt$ClassifiedDomainsConfigHandler$(classifiedDomainsEnabled, classifiedDomainsConfig.config.domains) + ArgumentListWrapping:ClearConversationContentUseCaseTest.kt$ClearConversationContentUseCaseTest.Arrangement$("an error") + ArgumentListWrapping:ClearConversationContentUseCaseTest.kt$ClearConversationContentUseCaseTest.Arrangement$(CoreFailure.Unknown(Throwable("an error"))) + ArgumentListWrapping:ClearConversationContentUseCaseTest.kt$ClearConversationContentUseCaseTest.Arrangement$(Throwable("an error")) + ArgumentListWrapping:ClearConversationContentUseCaseTest.kt$ClearConversationContentUseCaseTest.Arrangement$(Unit) + ArgumentListWrapping:ClearConversationContentUseCaseTest.kt$ClearConversationContentUseCaseTest.Arrangement$(if (isSuccessFull) Either.Right(Unit) else Either.Left(CoreFailure.Unknown(Throwable("an error")))) + ArgumentListWrapping:ClearUsersTypingEventsUseCaseTest.kt$ClearUsersTypingEventsUseCaseTest.Arrangement$(TypingIndicatorIncomingRepository::class) + ArgumentListWrapping:ClientApiV0Test.kt$ClientApiV0Test$( "", statusCode = HttpStatusCode.Created, assertion = { assertDelete() assertPathEqual("/push/tokens/$pid") } ) + ArgumentListWrapping:ClientApiV0Test.kt$ClientApiV0Test$( RegisterTokenJson.registerTokenResponse, statusCode = HttpStatusCode.Created, assertion = { assertPost() assertJsonBodyContent(VALID_PUSH_TOKEN_REQUEST.rawJson) } ) + ArgumentListWrapping:ClientDAOImpl.kt$ClientDAOImpl$(queriesContext) + ArgumentListWrapping:ClientDAOTest.kt$ClientDAOTest$(user.id, "id1", deviceType = null, isValid = true, isProteusVerified = false, isMLSCapable = true) + ArgumentListWrapping:ClientDAOTest.kt$ClientDAOTest.Companion$(ConversationEntity.AccessRole.NON_TEAM_MEMBER, ConversationEntity.AccessRole.TEAM_MEMBER) + ArgumentListWrapping:ClientFingerprintUseCase.kt$ClientFingerprintUseCaseImpl$(CryptoSessionId(userId.toCrypto(), CryptoClientId(clientId.value))) + ArgumentListWrapping:ClientFingerprintUseCase.kt$ClientFingerprintUseCaseImpl$(clientId.value) + ArgumentListWrapping:ClientFingerprintUseCase.kt$ClientFingerprintUseCaseImpl$(userId.toCrypto(), CryptoClientId(clientId.value)) + ArgumentListWrapping:ClientRegistrationStorageImpl.kt$ClientRegistrationStorageImpl$(CLIENT_REGISTRATION_BLOCKED_BY_E2EI) + ArgumentListWrapping:ClientRegistrationStorageImpl.kt$ClientRegistrationStorageImpl$(HAS_REGISTERED_MLS_CLIENT_KEY) + ArgumentListWrapping:ClientRegistrationStorageImpl.kt$ClientRegistrationStorageImpl$(REGISTERED_CLIENT_ID_KEY) + ArgumentListWrapping:ClientRegistrationStorageImpl.kt$ClientRegistrationStorageImpl$(retainedClientId, RETAINED_CLIENT_ID_KEY) + ArgumentListWrapping:ClientRegistrationStorageImpl.kt$ClientRegistrationStorageImpl$(true.toString(), HAS_REGISTERED_MLS_CLIENT_KEY) + ArgumentListWrapping:ClientRegistrationStorageTest.kt$ClientRegistrationStorageTest$(dispatcher) + ArgumentListWrapping:ClientRemoteRepositoryTest.kt$ClientRemoteRepositoryTest.Companion$( senderId = "7239", client = "cliId", token = "7239", transport = "GCM" ) + ArgumentListWrapping:ClientRepository.kt$ClientDataSource$(body) + ArgumentListWrapping:ClientRepository.kt$ClientDataSource$(token) + ArgumentListWrapping:ClientRepositoryTest.kt$ClientRepositoryTest$(it) + ArgumentListWrapping:ClientRepositoryTest.kt$ClientRepositoryTest$(user1ClientsList.map { arrangement.clientMapper.fromClientEntity(it) }, it[userId1.toModel()]) + ArgumentListWrapping:ClientRepositoryTest.kt$ClientRepositoryTest.Arrangement$( clientRemoteRepository, clientRegistrationStorage, clientDAO, newClientDAO, selfUserId, clientApi, clientMapper ) + ArgumentListWrapping:ClientRepositoryTest.kt$ClientRepositoryTest.Companion$( 420, "forbidden", "forbidden" ) + ArgumentListWrapping:ClientScope.kt$ClientScope$(clientRepository, clientIdProvider) + ArgumentListWrapping:ClientScope.kt$ClientScope$(proteusClientProvider, preKeyRepository) + ArgumentListWrapping:CodeUpdatedHandler.kt$CodeUpdateHandlerImpl$( event.conversationId.toDao(), event.link(serverConfigLinks.accounts), event.isPasswordProtected ) + ArgumentListWrapping:CommitBundleEventReceiver.kt$CommitBundleEventReceiverImpl$("Unexpected event received by commit bundle: ${event.toLogString()}") + ArgumentListWrapping:CommonAndroidConfig.kt$(ExperimentalKotlinGradlePluginApi::class) + ArgumentListWrapping:CompositeMessageDAO.kt$CompositeMessageDAOImpl$(context) + ArgumentListWrapping:ConnectionDAOImpl.kt$ConnectionDAOImpl$(queriesContext) + ArgumentListWrapping:ConnectionRepository.kt$ConnectionDataSource$(connection) + ArgumentListWrapping:ConnectionRepository.kt$ConnectionDataSource$(conversationId.toDao()) + ArgumentListWrapping:ConnectionRepository.kt$ConnectionDataSource$(it) + ArgumentListWrapping:ConnectionRepositoryTest.kt$ConnectionRepositoryTest$(UserId(userId.value, userId.domain), ConnectionState.ACCEPTED) + ArgumentListWrapping:ConnectionRepositoryTest.kt$ConnectionRepositoryTest$(UserId(userId.value, userId.domain), ConnectionState.NOT_CONNECTED) + ArgumentListWrapping:ConnectionRepositoryTest.kt$ConnectionRepositoryTest$(UserId(userId.value, userId.domain), ConnectionState.PENDING) + ArgumentListWrapping:ConnectionRepositoryTest.kt$ConnectionRepositoryTest$(userId.value, userId.domain) + ArgumentListWrapping:ConnectionRepositoryTest.kt$ConnectionRepositoryTest.Arrangement$("An error the server threw!") + ArgumentListWrapping:ConnectionRepositoryTest.kt$ConnectionRepositoryTest.Arrangement$(KaliumException.GenericError(RuntimeException("An error the server threw!"))) + ArgumentListWrapping:ConnectionRepositoryTest.kt$ConnectionRepositoryTest.Arrangement$(RuntimeException("An error the server threw!")) + ArgumentListWrapping:ConnectionScope.kt$ConnectionScope$(connectionRepository) + ArgumentListWrapping:ConnectionScope.kt$ConnectionScope$(connectionRepository, userRepository) + ArgumentListWrapping:ConversationApiV0.kt$ConversationApiV0$(ConversationMemberRemovedResponse.Unchanged, response) + ArgumentListWrapping:ConversationApiV0.kt$ConversationApiV0$(UpdateConversationAccessResponse.AccessUnchanged, httpResponse) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( "", statusCode = HttpStatusCode.NoContent ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( "", statusCode = HttpStatusCode.NoContent, assertion = { assertPost() assertPathEqual("$PATH_CONVERSATIONS/$PATH_JOIN") } ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( "", statusCode = HttpStatusCode.NoContent, assertion = { assertPut() assertPathEqual("/conversations/anta.wire.link/ebafd3d4-1548-49f2-ac4e-b2757e6ca44b/access") assertJsonBodyContent(UPDATE_ACCESS_ROLE_REQUEST.rawJson) } ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( "", statusCode = HttpStatusCode.NoContent, assertion = { assertPut() assertPathEqual("/conversations/conversationDomain/conversationId/members/userDomain/userId") } ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( "", statusCode = HttpStatusCode.NoContent, assertion = { assertPut() assertPathEqual("/conversations/conversationDomain/conversationId/name") } ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( AddServiceResponseJson.valid.rawJson, statusCode = HttpStatusCode.Created, assertion = { assertPost() assertPathEqual("conversations/${conversationId.value}/bots") assertNoQueryParams() } ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( EventContentDTOJson.validAccessUpdate.rawJson, statusCode = HttpStatusCode.OK ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( EventContentDTOJson.validAccessUpdateWithDeprecatedAccessRoleField.rawJson, statusCode = HttpStatusCode.OK ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( EventContentDTOJson.validMemberJoin.rawJson, statusCode = HttpStatusCode.OK, assertion = { assertPost() assertPathEqual("$PATH_CONVERSATIONS/$PATH_JOIN") } ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( EventContentDTOJson.validMemberJoin.rawJson, statusCode = HttpStatusCode.OK, assertion = { assertPost() assertPathEqual("$PATH_CONVERSATIONS/${conversationId.value}/$PATH_MEMBERS/$PATH_V2") } ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( EventContentDTOJson.validMemberLeave.rawJson, statusCode = HttpStatusCode.OK, assertion = { assertDelete() assertPathEqual( "$PATH_CONVERSATIONS/${conversationId.domain}/${conversationId.value}/$PATH_MEMBERS/${userId.domain}/${userId.value}" ) } ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( EventContentDTOJson.validNullAccessRole, statusCode = HttpStatusCode.OK ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( MEMBER_UPDATE_REQUEST.serializableData, ConversationId(conversationId, domain) ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( setOf(ConversationAccessDTO.PRIVATE), setOf(ConversationAccessRoleDTO.TEAM_MEMBER) ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$( setOf(ConversationAccessDTO.PRIVATE, ConversationAccessDTO.INVITE), setOf() ) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$("$PATH_CONVERSATIONS/${conversationId.domain}/${conversationId.value}/${PATH_RECEIPT_MODE}") + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$("ebafd3d4-1548-49f2-ac4e-b2757e6ca44b", "anta.wire.link") + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$(ConversationId("ebafd3d4-1548-49f2-ac4e-b2757e6ca44b", "anta.wire.link"), accessRoles) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$(SendTypingStatusNotificationRequestJson.createValid(TypingIndicatorStatus.STOPPED).rawJson) + ArgumentListWrapping:ConversationApiV0Test.kt$ConversationApiV0Test$(TypingIndicatorStatus.STOPPED) + ArgumentListWrapping:ConversationApiV2Test.kt$ConversationApiV2Test$( ConversationDetailsResponse.withNullReceiptMode.rawJson, statusCode = HttpStatusCode.OK ) + ArgumentListWrapping:ConversationApiV2Test.kt$ConversationApiV2Test$( EventContentDTOJson.validMemberJoin.rawJson, statusCode = HttpStatusCode.OK, assertion = { assertPost() assertPathEqual("$PATH_CONVERSATIONS/${conversationId.domain}/${conversationId.value}/$PATH_MEMBERS") } ) + ArgumentListWrapping:ConversationApiV4.kt$ConversationApiV4$("$PATH_CONVERSATIONS/${conversationId.domain}/${conversationId.value}/$PATH_TYPING_NOTIFICATION") + ArgumentListWrapping:ConversationApiV4Test.kt$ConversationApiV4Test$("${PATH_CONVERSATIONS}/${conversationId.domain}/${conversationId.value}/${PATH_MEMBERS}") + ArgumentListWrapping:ConversationApiV4Test.kt$ConversationApiV4Test$("${PATH_CONVERSATIONS}/${conversationId.domain}/${conversationId.value}/${PATH_TYPING_NOTIFICATION}") + ArgumentListWrapping:ConversationApiV4Test.kt$ConversationApiV4Test$(FederationConflictResponse(conflictingBackends)) + ArgumentListWrapping:ConversationApiV4Test.kt$ConversationApiV4Test$(SendTypingStatusNotificationRequestJson.createValid(TypingIndicatorStatus.STARTED).rawJson) + ArgumentListWrapping:ConversationApiV4Test.kt$ConversationApiV4Test$(TypingIndicatorStatus.STARTED) + ArgumentListWrapping:ConversationApiV4Test.kt$ConversationApiV4Test$(conflictingBackends) + ArgumentListWrapping:ConversationApiV5.kt$ConversationApiV5$( UpdateConversationProtocolResponse.ProtocolUnchanged, httpResponse ) + ArgumentListWrapping:ConversationApiV5Test.kt$ConversationApiV5Test$("${PATH_CONVERSATIONS}/${conversationId.domain}/${conversationId.value}/${PATH_PROTOCOL}") + ArgumentListWrapping:ConversationDAOImpl.kt$ConversationDAOImpl$(coroutineContext) + ArgumentListWrapping:ConversationDAOImpl.kt$ConversationDAOImpl$(qualifiedID, conversationMapper::mapProtocolInfo) + ArgumentListWrapping:ConversationDAOImpl.kt$ConversationDAOImpl$(qualifiedID, conversationMapper::toModel) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$( (result?.protocolInfo as ConversationEntity.ProtocolInfo.MLS).groupState, ConversationEntity.GroupState.PENDING_WELCOME_MESSAGE ) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$( accessRole = listOf(ConversationEntity.AccessRole.TEAM_MEMBER), access = listOf(ConversationEntity.Access.INVITE) ) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$( conversationEntity1.id, "${mySelfId.value}@${mySelfId.domain}" ) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$( expectedUserA.copy(clientId = clientCA1), conversationDAO.getE2EIConversationClientInfoByClientId(clientCA1) ) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$( expectedUserA.copy(clientId = clientCA2), conversationDAO.getE2EIConversationClientInfoByClientId(clientCA2) ) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$( expectedUserB.copy(clientId = clientCB1), conversationDAO.getE2EIConversationClientInfoByClientId(clientCB1) ) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$( expectedUserB.copy(clientId = clientCB2), conversationDAO.getE2EIConversationClientInfoByClientId(clientCB2) ) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$((conversationEntity2.protocolInfo as ConversationEntity.ProtocolInfo.MLS).groupId) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$((conversationEntity6.protocolInfo as ConversationEntity.ProtocolInfo.Mixed).groupId) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(ConversationEntity.Access.INVITE) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(ConversationEntity.AccessRole.TEAM_MEMBER) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(ConversationEntity.Type.GROUP, ConversationEntity.Protocol.PROTEUS, teamId) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(SupportedProtocolEntity.PROTEUS) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(activeOneOnOneConversationId = conversationEntity2.id, name = null) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(clientCA1) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(clientCA2) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(clientCB1) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(clientCB2) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(clientId = clientCA1) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(clientId = clientCA2) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(clientId = clientCB1) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(clientId = clientCB2) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(conversationEntity1.copy(id = userA.id, type = ConversationEntity.Type.ONE_ON_ONE)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(conversationEntity1.copy(id = userA.id, type = ConversationEntity.Type.SELF)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(conversationEntity1.copy(id = userB.id, type = ConversationEntity.Type.ONE_ON_ONE)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(conversationEntity1.copy(receiptMode = ConversationEntity.ReceiptMode.ENABLED)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(conversationEntity4.copy(protocolInfo = ConversationEntity.ProtocolInfo.Proteus)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(conversationProtocolInfo.groupId) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(expected, conversationDAO.observeConversationByGroupID(conversationProtocolInfo.groupId).first()?.protocolInfo) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(groupId = "groupAB") + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(id = conversationId, type = ConversationEntity.Type.CONNECTION_PENDING) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(id = userA.id, type = ConversationEntity.Type.ONE_ON_ONE) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(id = userA.id, type = ConversationEntity.Type.SELF) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(id = userB.id, type = ConversationEntity.Type.ONE_ON_ONE) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(insertedClient.copy(user1.id, id = clientId), insertedClient.copy(user1.id, id = "id1")) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(insertedClient.copy(userA.id, id = clientCA1), insertedClient.copy(userA.id, id = clientCA2)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(insertedClient.copy(userB.id, id = clientCB1), insertedClient.copy(userB.id, id = clientCB2)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(listOf(insertedClient.copy(user1.id, id = clientId), insertedClient.copy(user1.id, id = "id1"))) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(listOf(insertedClient.copy(userA.id, id = clientCA1), insertedClient.copy(userA.id, id = clientCA2))) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(listOf(insertedClient.copy(userB.id, id = clientCB1), insertedClient.copy(userB.id, id = clientCB2))) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(name = null, type = ConversationEntity.Type.GROUP, hasIncompleteMetadata = false) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(protocolInfo = ConversationEntity.ProtocolInfo.Proteus) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(receiptMode = ConversationEntity.ReceiptMode.ENABLED) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(supportedProtocols = setOf(SupportedProtocolEntity.PROTEUS)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(team, user3.copy(supportedProtocols = setOf(SupportedProtocolEntity.PROTEUS)), conversationEntity5.id) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(user1.id, id = "id1") + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(user1.id, id = clientId) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(user1.id, protocol = ConversationEntity.Protocol.MLS) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(user1.id, protocol = ConversationEntity.Protocol.PROTEUS) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(user2.copy(activeOneOnOneConversationId = conversationEntity2.id, name = null)) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(userA.id, id = clientCA1) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(userA.id, id = clientCA2) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(userB.id, id = clientCB1) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest$(userB.id, id = clientCB2) + ArgumentListWrapping:ConversationDAOTest.kt$ConversationDAOTest.Companion$(ConversationEntity.AccessRole.NON_TEAM_MEMBER, ConversationEntity.AccessRole.TEAM_MEMBER) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$( conversationEntity.id, conversationResponse ) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$( conversationEntity.id.toModel(), lastUsersAttempt.failedUsers, lastUsersAttempt.failType ) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$( conversationEntity.id.toModel(), protocolSpecificAdditionFailures.toList(), FailedToAdd.Type.Unknown ) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$( conversationId, (validUsers + failedUsers), failType ) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$( conversationId, lastUsersAttempt.failedUsers, lastUsersAttempt.failType ) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$( conversationId, userIdList + lastUsersAttempt.failedUsers, failType ) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$( conversationResponse, mlsGroupState = ConversationEntity.GroupState.PENDING_CREATION, selfTeamId ) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(GroupID(groupId), userIdList) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(GroupID(protocol.groupId), listOf(selfUserId)) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(apiResult.value, selfTeamId, usersList, lastUsersAttempt) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(failedUsers, failType) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(groupId) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(it.usersWithConsent, it.usersWithoutConsent + it.usersFailed, FailedToAdd.Type.LegalHold) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(name, validUsers, options, LastUsersAttempt.Failed(failedUsers, failType)) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(protocol.groupId) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(selfUserId) + ArgumentListWrapping:ConversationGroupRepository.kt$ConversationGroupRepositoryImpl$(validUsers, conversationId, LastUsersAttempt.Failed(failedUsers, failType)) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$( TestConversation.USER_1.copy(domain = failedDomain), TestUser.OTHER_FEDERATED_USER_ID ) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(CONVERSATION_RESPONSE, emptyMap(), 201) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(ERROR_MISSING_LEGALHOLD_CONSENT, API_SUCCESS_MEMBER_ADDED) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(ListUsersLegalHoldConsent(usersWithConsent, usersWithoutConsent, usersFailed)) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(MLSAdditionResult(setOf(TestUser.USER_ID), notAddedUsers = missingMembersFromMLSGroup)) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(MessageContent.MemberChange.FailedToAdd.Type.Federation) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(NetworkResponse.Success(CONVERSATION_RESPONSE, emptyMap(), 201)) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(NetworkResponse.Success(conversationResponse, emptyMap(), 201)) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(TestConversation.USER_1, TestUser.OTHER_FEDERATED_USER_ID_2, TestUser.OTHER_FEDERATED_USER_ID) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(TestConversation.USER_1.copy(domain = failedDomain), TestUser.OTHER_FEDERATED_USER_ID) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(TestUser.USER_ID) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(anything(), eq(listOf(unreachableUserId)), eq(MessageContent.MemberChange.FailedToAdd.Type.Federation)) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(arrangement.newGroupConversationSystemMessagesCreator::conversationFailedToAddMembers) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(arrayOf(ERROR_MISSING_LEGALHOLD_CONSENT, API_SUCCESS_MEMBER_ADDED)) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(arrayOf(NetworkResponse.Success(CONVERSATION_RESPONSE, emptyMap(), 201))) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(arrayOf(NetworkResponse.Success(conversationResponse, emptyMap(), 201))) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(conversationResponse, emptyMap(), 201) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(domain = failedDomain) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(expectedInitialUsersNotFromUnreachableInformed, TestConversation.ID) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(listOf(unreachableUserId)) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(setOf(TestUser.USER_ID), notAddedUsers = missingMembersFromMLSGroup) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(unreachableUserId) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(usersWithConsent, usersWithoutConsent, usersFailed) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Arrangement$(JoinExistingMLSConversationUseCase::class) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Arrangement$(newGroupConversationSystemMessagesCreator::conversationStarted, fun1<ConversationEntity>()) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Companion$(CoreFailure.MissingKeyPackages(setOf(TestUser.OTHER_FEDERATED_USER_ID))) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Companion$(TestUser.OTHER_FEDERATED_USER_ID) + ArgumentListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Companion$(setOf(TestUser.OTHER_FEDERATED_USER_ID)) + ArgumentListWrapping:ConversationMapper.kt$ConversationMapperImpl$(userAvailabilityStatus) + ArgumentListWrapping:ConversationMapperTest.kt$ConversationMapperTest$(response, mlsGroupState = null, SELF_USER_TEAM_ID) + ArgumentListWrapping:ConversationMapperTest.kt$ConversationMapperTest.Companion$("other1", "domain1") + ArgumentListWrapping:ConversationMapperTest.kt$ConversationMapperTest.Companion$(ConversationMemberDTO.Other(service = null, id = UserId("other1", "domain1"), conversationRole = "wire_admin")) + ArgumentListWrapping:ConversationMapperTest.kt$ConversationMapperTest.Companion$(service = null, id = UserId("other1", "domain1"), conversationRole = "wire_admin") + ArgumentListWrapping:ConversationMessageTimerEventHandlerTest.kt$ConversationMessageTimerEventHandlerTest$( eq(Message.System( event.id, MessageContent.ConversationMessageTimerChanged( messageTimer = event.messageTimer ), event.conversationId, event.timestampIso, event.senderUserId, Message.Status.Sent, Message.Visibility.VISIBLE, expirationData = null ))) + ArgumentListWrapping:ConversationMetaDataDAOTest.kt$ConversationMetaDataDAOTest.Companion$(ConversationEntity.AccessRole.NON_TEAM_MEMBER, ConversationEntity.AccessRole.TEAM_MEMBER) + ArgumentListWrapping:ConversationPool.kt$ConversationPool$( conversation.conversationId, creator.internalId, conversation.members().map { it.internalId }, protocol ) + ArgumentListWrapping:ConversationPool.kt$ConversationPool$(conversation.conversationId, creator.internalId, monkeyList.map { it.internalId }, protocol) + ArgumentListWrapping:ConversationPool.kt$ConversationPool$(name, protocol, userCount, coreLogic, monkeyPool, preset) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$( memberMapper.fromApiModelToDaoModel(conversation.members), idMapper.fromApiToDao(conversation.id) ) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$( members.map(memberMapper::toDaoModel), conversationID.toDao() ) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(conversation, lastMessageMap[conversation.id]?.let { messageMapper.fromEntityToMessagePreview(it) }, unreadEvents.firstOrNull { it.conversationId == conversation.id }?.unreadEvents?.mapKeys { when (it.key) { UnreadEventTypeEntity.KNOCK -> UnreadEventType.KNOCK UnreadEventTypeEntity.MISSED_CALL -> UnreadEventType.MISSED_CALL UnreadEventTypeEntity.MENTION -> UnreadEventType.MENTION UnreadEventTypeEntity.REPLY -> UnreadEventType.REPLY UnreadEventTypeEntity.MESSAGE -> UnreadEventType.MESSAGE } } ) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(conversationId = conversationId.toDao(), notified = true) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(conversationId = conversationIdEntity, notified = false) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(idMapper.fromGroupIDEntity(it), originatedFromEvent) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(isArchived, archivedStatusTimestamp) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(it) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(member.id.toDao(), conversationID.toDao(), conversationRoleMapper.toDAO(member.role)) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(member.role) + ArgumentListWrapping:ConversationRepository.kt$ConversationDataSource$(otherUserId.toDao(), protocol.toDao()) + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$( conversationId, firstMessageId, text, mentions ) + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$( conversationId, temp.toOkioPath(), byteArray.size.toLong(), "image", type, width, height, 0L ) + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$( conversationId, text, mentions, quotedMessageId ) + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$( conversationId, text, mentions, quotedMessageId, buttons ) + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$("Instance ${instance.instanceId}: Send button action confirmation for button $buttonId") + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$(Response.Status.OK) + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$(SendTextResponse(instance.instanceId, "", "")) + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$(conversationId, referenceMessageId, buttonId) + ArgumentListWrapping:ConversationRepository.kt$ConversationRepository.Companion$(instance.instanceId, "", "") + ArgumentListWrapping:ConversationRepositoryTest.kt$ConversationRepositoryTest$( id = conversationIdEntity, type = ConversationEntity.Type.ONE_ON_ONE, otherUserId = QualifiedIDEntity("otherUser", "domain") ) + ArgumentListWrapping:ConversationRepositoryTest.kt$ConversationRepositoryTest$(federatedDomain) + ArgumentListWrapping:ConversationRepositoryTest.kt$ConversationRepositoryTest$(selfDomain, federatedDomain) + ArgumentListWrapping:ConversationRepositoryTest.kt$ConversationRepositoryTest.Companion$( UpdateConversationProtocolResponse.ProtocolUnchanged, emptyMap(), 204 ) + ArgumentListWrapping:ConversationRepositoryTest.kt$ConversationRepositoryTest.Companion$( UpdateConversationProtocolResponse.ProtocolUpdated( EventContentDTO.Conversation.ProtocolUpdate( TestConversation.NETWORK_ID, ConversationProtocolDTO(ConvProtocol.MIXED), TestUser.NETWORK_ID ) ), emptyMap(), 200 ) + ArgumentListWrapping:ConversationResources.kt$ConversationResources$("id") + ArgumentListWrapping:ConversationResponse.kt$ConversationMemberDTO.Self$("otr_muted_status") + ArgumentListWrapping:ConversationResponse.kt$ConversationMemberDTO.Self$(with = MutedStatusSerializer::class) + ArgumentListWrapping:ConversationResponseJson.kt$ConversationResponseJson$( conversationResponse, conversationResponseSerializer ) + ArgumentListWrapping:ConversationResponseJson.kt$ConversationResponseJson$( conversationResponse, conversationResponseSerializerWithDeprecatedAccessRole ) + ArgumentListWrapping:ConversationScope.kt$ConversationScope$(conversationGroupRepository, userRepository, refreshUsersWithoutMetadata) + ArgumentListWrapping:ConversationScope.kt$ConversationScope$(conversationRepository = conversationRepository, userSessionCoroutineScope = scope) + ArgumentListWrapping:ConversationStatusMapperTest.kt$ConversationStatusMapperTest$(MutedConversationStatus.OnlyMentionsAndRepliesAllowed) + ArgumentListWrapping:ConversationStatusMapperTest.kt$ConversationStatusMapperTest$(MutedConversationStatus.OnlyMentionsAndRepliesAllowed, 1649708697237L) + ArgumentListWrapping:ConversationTest.kt$ConversationTest$(Conversation.AccessRole.NON_TEAM_MEMBER) + ArgumentListWrapping:ConversationTest.kt$ConversationTest$(accessRole = listOf(Conversation.AccessRole.NON_TEAM_MEMBER)) + ArgumentListWrapping:ConversationTest.kt$ConversationTest$(guestAllowed = false, servicesAllowed = false, nonTeamMembersAllowed = false) + ArgumentListWrapping:CoreCryptoCentral.kt$CoreCryptoCentralImpl$( (enrollment as E2EIClientImpl).wireE2eIdentity, certificateChain, newMLSKeyPackageCount ) + ArgumentListWrapping:CoreCryptoCentralImpl.kt$("Not yet implemented") + ArgumentListWrapping:CoreFailure.kt$(NetworkFailure.FederatedBackendFailure.ConflictingBackends(exception.errorResponse.nonFederatingBackends)) + ArgumentListWrapping:CoreFailure.kt$(NetworkFailure.FederatedBackendFailure.FailedDomains(exception.errorResponse.unreachableBackends)) + ArgumentListWrapping:CoreFailure.kt$(NetworkFailure.FederatedBackendFailure.FederationDenied(exception.errorResponse.label)) + ArgumentListWrapping:CoreFailure.kt$(NetworkFailure.FederatedBackendFailure.FederationNotEnabled(exception.errorResponse.label)) + ArgumentListWrapping:CoreFailure.kt$(exception.errorResponse.label) + ArgumentListWrapping:CoreFailure.kt$(exception.errorResponse.nonFederatingBackends) + ArgumentListWrapping:CoreFailure.kt$(exception.errorResponse.unreachableBackends) + ArgumentListWrapping:CoreLogic.kt$CoreLogic$( rootPath = rootPath, kaliumConfigs = kaliumConfigs, userAgent = userAgent ) + ArgumentListWrapping:CreateBackupUseCase.kt$CreateBackupUseCaseImpl$( { error -> CreateBackupResult.Failure(error) }, { (backupFilePath, backupSize) -> val isBackupEncrypted = password.isNotEmpty() if (isBackupEncrypted) { encryptAndCompressFile(backupFilePath, password) } else CreateBackupResult.Success(backupFilePath, backupSize, backupFilePath.name) }) + ArgumentListWrapping:CreateBackupUseCase.kt$CreateBackupUseCaseImpl$("Failed to compress encrypted backup file") + ArgumentListWrapping:CreateBackupUseCase.kt$CreateBackupUseCaseImpl$(RuntimeException("Failed to compress encrypted backup file")) + ArgumentListWrapping:CreateBackupUseCase.kt$CreateBackupUseCaseImpl$(StorageFailure.Generic(RuntimeException("Failed to compress encrypted backup file"))) + ArgumentListWrapping:CreateBackupUseCase.kt$CreateBackupUseCaseImpl$(finalBackupFilePath, backupEncryptedCompressedDataSize, finalBackupFilePath.name) + ArgumentListWrapping:CreateBackupUseCaseTest.kt$CreateBackupUseCaseTest$(dispatcher.default) + ArgumentListWrapping:CreateBackupUseCaseTest.kt$CreateBackupUseCaseTest$(result.backupFilePath) + ArgumentListWrapping:CreateBackupUseCaseTest.kt$CreateBackupUseCaseTest$(source(result.backupFilePath), extractedFilesPath, ExtractFilesParam.All, fakeFileSystem) + ArgumentListWrapping:CreateConversationAction.kt$CreateConversationAction$(sender) + ArgumentListWrapping:CreateConversationAction.kt$CreateConversationAction$(this.config.team, this.config.userCount, this.config.protocol, monkeyPool) + ArgumentListWrapping:CreateConversationAction.kt$CreateConversationAction$(this.config.userCount, this.config.protocol, monkeyPool) + ArgumentListWrapping:CreateGroupCommand.kt$CreateGroupCommand$("Failed to retrieve connections: ${it.storageFailure}") + ArgumentListWrapping:CreateGroupCommand.kt$CreateGroupCommand$(ConversationOptions.Protocol.MLS) + ArgumentListWrapping:CreateGroupCommand.kt$CreateGroupCommand$(help = "Protocol for sending messages") + ArgumentListWrapping:CreateGroupConversationUseCase.kt$CreateGroupConversationUseCase$(creatorClientId = clientId) + ArgumentListWrapping:CreateGroupConversationUseCase.kt$CreateGroupConversationUseCase$(name, userIdList, options.copy(creatorClientId = clientId)) + ArgumentListWrapping:CreateGroupConversationUseCaseTest.kt$CreateGroupConversationUseCaseTest$(arrangement.newGroupConversationSystemMessagesCreator::conversationReadReceiptStatus, fun1<Conversation>()) + ArgumentListWrapping:CreateGroupConversationUseCaseTest.kt$CreateGroupConversationUseCaseTest$(protocol = ConversationOptions.Protocol.MLS, creatorClientId = creatorClientId) + ArgumentListWrapping:CreateGroupConversationUseCaseTest.kt$CreateGroupConversationUseCaseTest.Arrangement$(newGroupConversationSystemMessagesCreator::conversationReadReceiptStatus, fun1<Conversation>()) + ArgumentListWrapping:CryptoSessionMapperTest.kt$CryptoSessionMapperTest$(domainToUserIdTOClientIdToPrekeyMap) + ArgumentListWrapping:CryptoUtils.kt$(data) + ArgumentListWrapping:CryptoUtils.kt$(secretKey) + ArgumentListWrapping:CryptographyException.kt$CryptographyException$(message, rootCause) + ArgumentListWrapping:CustomServerConfigRepositoryTest.kt$CustomServerConfigRepositoryTest.Arrangement$(serverConfigApi, developmentApiEnabled, serverConfigurationDAO, backendMetaDataUtil) + ArgumentListWrapping:DatabaseExporterTest.kt$DatabaseExporterTest$(id = "normal", expireAfterMs = null, sender = OTHER_USER, senderUserId = OTHER_USER.id) + ArgumentListWrapping:DatabaseExporterTest.kt$DatabaseExporterTest$(id = "selfDelete", expireAfterMs = 10000, sender = OTHER_USER, senderUserId = OTHER_USER.id) + ArgumentListWrapping:DatabaseExporterTest.kt$DatabaseExporterTest.Companion$( "I'm quoting others", quotedMessageId = OTHER_MESSAGE.id ) + ArgumentListWrapping:DatabaseExporterTest.kt$DatabaseExporterTest.Companion$( "I'm quoting selfUser", quotedMessageId = SELF_MESSAGE.id ) + ArgumentListWrapping:DatabaseExporterTest.kt$DatabaseExporterTest.Companion$( messageBody = "@$@${OTHER_USER_2.name}", mentions = listOf(OTHER_MENTION) ) + ArgumentListWrapping:DatabaseExporterTest.kt$DatabaseExporterTest.Companion$( messageBody = "@${SELF_USER.name} @${OTHER_USER_2.name}", mentions = listOf(SELF_MENTION) ) + ArgumentListWrapping:DatabaseExporterTest.kt$DatabaseExporterTest.Companion$( start = 0, length = 9, userId = SELF_USER_ID ) + ArgumentListWrapping:DatabaseExporterTest.kt$DatabaseExporterTest.Companion$( start = 10, length = 11, userId = OTHER_USER_2.id ) + ArgumentListWrapping:DatabaseImporterTest.kt$DatabaseImporterTest$(::mapFromDetailsToConversationEntity) + ArgumentListWrapping:DatabaseImporterTest.kt$DatabaseImporterTest$(ConversationEntity.AccessRole.values()[index % ConversationEntity.AccessRole.values().size]) + ArgumentListWrapping:DatabaseImporterTest.kt$DatabaseImporterTest$(conversationEntity.id) + ArgumentListWrapping:DatabaseImporterTest.kt$DatabaseImporterTest$(emptyList(), restoredMembers) + ArgumentListWrapping:DatabaseImporterTest.kt$DatabaseImporterTest$(readDateBackup) + ArgumentListWrapping:DatabaseImporterTest.kt$DatabaseImporterTest$(readDateBackup2) + ArgumentListWrapping:DatabaseImporterTest.kt$DatabaseImporterTest$(userConversations.map(::mapFromDetailsToConversationEntity)) + ArgumentListWrapping:DateTimeUtilTest.kt$DateTimeUtilTest$(isoDateTimeStringWith0MillisMinus1s, isoDateTimeStringWith0Millis) + ArgumentListWrapping:DeleteClientCommand.kt$DeleteClientCommand$("Delete client failed: ${deleteClientResult.genericFailure}") + ArgumentListWrapping:DeleteClientCommand.kt$DeleteClientCommand$("password", promptSuffix = ": ", hideInput = true) + ArgumentListWrapping:DeleteClientCommand.kt$DeleteClientCommand$(help = "Account password") + ArgumentListWrapping:DeleteClientUseCase.kt$DeleteClientUseCaseImpl$( { handleError(it) }, { DeleteClientResult.Success }) + ArgumentListWrapping:DeleteClientUseCaseTest.kt$DeleteClientUseCaseTest.Arrangement$(classOf<UpdateSupportedProtocolsAndResolveOneOnOnesUseCase>()) + ArgumentListWrapping:DeleteClientUseCaseTest.kt$DeleteClientUseCaseTest.Companion$("no internet") + ArgumentListWrapping:DeleteClientUseCaseTest.kt$DeleteClientUseCaseTest.Companion$(IOException("no internet")) + ArgumentListWrapping:DeleteClientUseCaseTest.kt$DeleteClientUseCaseTest.Companion$(KaliumException.GenericError(IOException("no internet"))) + ArgumentListWrapping:DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest.kt$DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest$( matching { it.conversationId == SELF_CONVERSION_ID.first() && it.content == MessageContent.DeleteForMe(messageId, conversationId) }, matching { it == MessageTarget.Conversation() }) + ArgumentListWrapping:DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest.kt$DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest$( matching { it.conversationId == conversationId && it.content == MessageContent.DeleteMessage(messageId) }, matching { it == MessageTarget.Users(listOf(senderUserID)) }) + ArgumentListWrapping:DeleteMessageUseCaseTest.kt$DeleteMessageUseCaseTest.Arrangement$(Either.Right(TestMessage.TEXT_MESSAGE.copy(status = status, expirationData = expirationData))) + ArgumentListWrapping:DeleteMessageUseCaseTest.kt$DeleteMessageUseCaseTest.Arrangement$(TestMessage.TEXT_MESSAGE.copy(status = status, expirationData = expirationData)) + ArgumentListWrapping:DeleteMessageUseCaseTest.kt$DeleteMessageUseCaseTest.Arrangement$(status = status, expirationData = expirationData) + ArgumentListWrapping:DestroyConversationAction.kt$DestroyConversationAction$(sender) + ArgumentListWrapping:E2EIApiV0.kt$E2EIApiV0$(::getWireNonce.name) + ArgumentListWrapping:E2EIClientImpl.kt$E2EIClientImpl.Companion$( value.newNonce, value.newAccount, value.newOrder ) + ArgumentListWrapping:E2EIClientTest.kt$E2EIClientTest$( user.name, user.handle, user.teamId,90.days ) + ArgumentListWrapping:E2EIRepository.kt$E2EIRepositoryImpl$(challengeResponse) + ArgumentListWrapping:E2EIRepository.kt$E2EIRepositoryImpl$(clientId, e2eiClient, certificateChain, isNewClient) + ArgumentListWrapping:E2EIRepository.kt$E2EIRepositoryImpl$(coreCrypto, Json.encodeToString(challengeResponse).encodeToByteArray()) + ArgumentListWrapping:E2EIRepository.kt$E2EIRepositoryImpl$(it) + ArgumentListWrapping:E2EIRepositoryTest.kt$E2EIRepositoryTest.Arrangement.Companion$( true, RANDOM_URL, DateTimeUtil.currentInstant() ) + ArgumentListWrapping:E2EISettings.kt$E2EISettings$( isRequired, discoverUrl, gracePeriodEnd?.toEpochMilliseconds() ) + ArgumentListWrapping:EncryptedSettingsBuilderTest.kt$EncryptedSettingsBuilderTest$("test-key") + ArgumentListWrapping:EncryptedSettingsBuilderTest.kt$EncryptedSettingsBuilderTest$(actualProperties.getProperty("test-key"), "test-value", "App settings file contains wrong property") + ArgumentListWrapping:EncryptedSettingsBuilderTest.kt$EncryptedSettingsBuilderTest$(actualProperties.getProperty("test-key"), "test-value", "User settings file contains wrong property") + ArgumentListWrapping:EncryptedSettingsBuilderTest.kt$EncryptedSettingsBuilderTest$(coroutineDispatcher) + ArgumentListWrapping:EncryptedSettingsBuilderTest.kt$EncryptedSettingsBuilderTest$(rootPath, "user-pref-${userIDEntity.value}-${userIDEntity.domain}") + ArgumentListWrapping:EndCallOnConversationChangeUseCaseTest.kt$EndCallOnConversationChangeUseCaseTest$(proteusVerificationStatus = Conversation.VerificationStatus.DEGRADED) + ArgumentListWrapping:EndCallOnConversationChangeUseCaseTest.kt$EndCallOnConversationChangeUseCaseTest.Companion$(Conversation.AccessRole.GUEST) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(OIDC_AUTHZ.challenge) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(RANDOM_DPoP_TOKEN) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(RANDOM_ID_TOKEN) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(RANDOM_ID_TOKEN, REFRESH_TOKEN, INITIALIZATION_RESULT) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(REFRESH_TOKEN) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(any<Nonce>()) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(any<Nonce>(), any<List<String>>()) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(any<Nonce>(), any<String>()) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(any<String>()) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(any<String>(), any<Nonce>()) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::certificateRequest) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::checkOrderRequest) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::createNewAccount) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::createNewOrder) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::fetchAndSetTrustAnchors) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::finalize) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::getACMENonce) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::getAuthorizations) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::getDPoPToken) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::getOAuthRefreshToken) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::getWireAccessToken) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::getWireNonce) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::loadACMEDirectories) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::rotateKeysAndMigrateConversations) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::validateDPoPChallenge) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(arrangement.e2EIRepository::validateOIDCChallenge) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(eq(RANDOM_DPoP_TOKEN)) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(eq(RANDOM_ID_TOKEN), eq(REFRESH_TOKEN), any<Nonce>(), eq(OIDC_AUTHZ.challenge)) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$(exactly = once) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$( identifier = "identifier", keyAuth = null, challenge = ACME_CHALLENGE ) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$( oidcAuthorization = OIDC_AUTHZ, dpopAuthorization = DPOP_AUTHZ, nonce = RANDOM_NONCE ) + ArgumentListWrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$( target = ACME_CHALLENGE.target, oAuthState = REFRESH_TOKEN, dPopAuthorizations = DPOP_AUTHZ, oidcAuthorizations = OIDC_AUTHZ, oAuthClaims = OAUTH_CLAIMS, lastNonce = RANDOM_NONCE, orderLocation = RANDOM_LOCATION ) + ArgumentListWrapping:EnrollE2EIUseCase.kt$EnrollE2EIUseCaseImpl$( idToken, oAuthState, prevNonce, oidcAuthorizations.challenge ) + ArgumentListWrapping:EnrollE2EIUseCase.kt$EnrollE2EIUseCaseImpl$( wireAccessToken.token, prevNonce, dPopAuthorizations.challenge ) + ArgumentListWrapping:EnvelopeProtoMapper.kt$EnvelopeProtoMapperImpl$( envelopeParameters.messageOption.userIDs.map { QualifiedUserId(it.value, it.domain) }) + ArgumentListWrapping:EnvelopeProtoMapperTest.kt$EnvelopeProtoMapperTest$( user, mapOf( Pair("241b5be49179d81b", ByteArray(0)), Pair("8bdacec7398a982e", ByteArray(0)), Pair("e47d908549239b72", ByteArray(0)), Pair("4c8346ce67fa0d7", ByteArray(0)) ) ) + ArgumentListWrapping:EphemeralMessageDeletionHandlerTest.kt$EphemeralMessageDeletionHandlerTest.Arrangement$(classOf<DeleteEphemeralMessageForSelfUserAsSenderUseCase>()) + ArgumentListWrapping:EventContentDTO.kt$EventContentDTO.Conversation.MemberJoinDTO$("from") + ArgumentListWrapping:EventContentDTO.kt$EventContentDTO.Conversation.MemberJoinDTO$("this.qualifiedFrom") + ArgumentListWrapping:EventContentDTO.kt$EventContentDTO.Conversation.MemberJoinDTO$("use qualifiedFrom", replaceWith = ReplaceWith("this.qualifiedFrom")) + ArgumentListWrapping:EventContentDTO.kt$JsonCorrectingSerializer$(FeatureConfigUpdatedDTOSerializer) + ArgumentListWrapping:EventGatherer.kt$EventGathererImpl$("Unknown Websocket error: $cause, message: ${cause.message}", CoreFailure.Unknown(cause)) + ArgumentListWrapping:EventGatherer.kt$EventGathererImpl$(cause) + ArgumentListWrapping:EventGathererTest.kt$EventGathererTest$(TestEvent.newConnection(eventId = "event_$value").wrapInEnvelope()) + ArgumentListWrapping:EventGathererTest.kt$EventGathererTest$(WebSocketEvent.BinaryPayloadReceived(TestEvent.newConnection(eventId = "event_$value").wrapInEnvelope())) + ArgumentListWrapping:EventGathererTest.kt$EventGathererTest$(eventId = "event_$value") + ArgumentListWrapping:EventRepository.kt$EventDataSource$(it) + ArgumentListWrapping:EventRepository.kt$EventDataSource$(webSocketEvent.payload, true) + ArgumentListWrapping:EventRepositoryTest.kt$EventRepositoryTest.Arrangement$(notificationApi, metaDAO, clientIdProvider, TestUser.SELF.id) + ArgumentListWrapping:FeatureConfigEventReceiver.kt$FeatureConfigEventReceiverImpl$(event.model, duringSlowSync = false) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$( SelfDeletingMessagesConfigModel( enforcedTimeoutSeconds = null ), Status.DISABLED ) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$( SelfDeletingMessagesConfigModel(enforcedTimeoutSeconds = 0), Status.ENABLED ) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$( SelfDeletingMessagesConfigModel(enforcedTimeoutSeconds = newEnforcedDuration.inWholeSeconds), Status.ENABLED ) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$( SelfDeletingMessagesConfigModel(enforcedTimeoutSeconds = newEnforcedTimeoutSeconds), Status.DISABLED ) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$( SelfDeletingMessagesConfigModel(enforcedTimeoutSeconds = newEnforcedTimeoutSeconds), Status.ENABLED ) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$(Either.Right(FileSharingStatus(state = FileSharingStatus.Value.Disabled, isStatusChanged = false))) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$(Either.Right(FileSharingStatus(state = FileSharingStatus.Value.EnabledAll, isStatusChanged = false))) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$(FileSharingStatus(state = FileSharingStatus.Value.Disabled, isStatusChanged = false)) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$(FileSharingStatus(state = FileSharingStatus.Value.EnabledAll, isStatusChanged = false)) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$(enforcedTimeoutSeconds = newEnforcedDuration.inWholeSeconds) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$(state = FileSharingStatus.Value.Disabled, isStatusChanged = false) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$(state = FileSharingStatus.Value.EnabledAll, isStatusChanged = false) + ArgumentListWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest.Arrangement$(classOf<UpdateSupportedProtocolsAndResolveOneOnOnesUseCase>()) + ArgumentListWrapping:FeatureConfigJson.kt$FeatureConfigJson$( AppLockConfigDTO(true, 0), FeatureFlagStatusDTO.ENABLED ) + ArgumentListWrapping:FeatureConfigMapperTest.kt$FeatureConfigMapperTest.Arrangement$( MLSConfigDTO( SupportedProtocolDTO.MLS, listOf(SupportedProtocolDTO.MLS), emptyList(), 1 ), FeatureFlagStatusDTO.ENABLED ) + ArgumentListWrapping:FeatureConfigRepositoryTest.kt$FeatureConfigRepositoryTest.Arrangement$( AppLockConfigDTO(true, 0), FeatureFlagStatusDTO.ENABLED ) + ArgumentListWrapping:FeatureConfigRepositoryTest.kt$FeatureConfigRepositoryTest.Arrangement$( MLSConfigDTO( SupportedProtocolDTO.PROTEUS, listOf(SupportedProtocolDTO.PROTEUS), emptyList(), 1 ), FeatureFlagStatusDTO.ENABLED ) + ArgumentListWrapping:FederationEventReceiver.kt$FederationEventReceiverImpl$(conversationId, userIds.filter { it.domain == firstDomain }) + ArgumentListWrapping:FederationEventReceiver.kt$FederationEventReceiverImpl$(conversationId, userIds.filter { it.domain == secondDomain }) + ArgumentListWrapping:FederationEventReceiver.kt$FederationEventReceiverImpl$(conversationId, userIds.filter { it.domain == selfUserId.domain }) + ArgumentListWrapping:FederationEventReceiver.kt$FederationEventReceiverImpl$(conversationId, userIds.filterNot { it.domain == selfUserId.domain }) + ArgumentListWrapping:FederationEventReceiverTest.kt$FederationEventReceiverTest$(defederatedUsersCount) + ArgumentListWrapping:FederationEventReceiverTest.kt$FederationEventReceiverTest$(defederatedUsersCountTwo) + ArgumentListWrapping:FederationEventReceiverTest.kt$FederationEventReceiverTest$(value = "defId$it", domain = defederatedDomain) + ArgumentListWrapping:FederationEventReceiverTest.kt$FederationEventReceiverTest$(value = "defIdTwo$it", domain = defederatedDomainTwo) + ArgumentListWrapping:FetchUsersClientsFromRemoteUseCaseTest.kt$FetchUsersClientsFromRemoteUseCaseTest$( SimpleClientResponse("111", DeviceTypeDTO.Phone), SimpleClientResponse("2222", DeviceTypeDTO.Desktop) ) + ArgumentListWrapping:GetAssetMessagesForConversationUseCaseTest.kt$GetAssetMessagesForConversationUseCaseTest$(testDispatcher.default) + ArgumentListWrapping:GetAssetSizeLimitUseCaseTest.kt$GetAssetSizeLimitUseCaseTest$(dispatcher.default) + ArgumentListWrapping:GetIncomingCallsUseCaseTest.kt$GetIncomingCallsUseCaseTest$(conversationWithMuteStatus(id, MutedConversationStatus.AllAllowed)) + ArgumentListWrapping:GetIncomingCallsUseCaseTest.kt$GetIncomingCallsUseCaseTest$(id, MutedConversationStatus.AllAllowed) + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$("The message associated to this id, was not an asset message") + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$("There was an error downloading asset with id => ${assetMetadata.assetKey.obfuscateId()}") + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$(AssetTransferStatus.FAILED_DOWNLOAD, conversationId, messageId) + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$(AssetTransferStatus.NOT_FOUND, conversationId, messageId) + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$(AssetTransferStatus.SAVED_INTERNALLY, conversationId, messageId) + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$(IllegalStateException("The message associated to this id, was not an asset message")) + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$(QualifiedID(assetMetadata.assetKey, domain)) + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$(assetMetadata.assetKey, domain) + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$(decodedAssetPath, assetMetadata.assetSize, assetMetadata.assetName) + ArgumentListWrapping:GetMessageAssetUseCase.kt$GetMessageAssetUseCaseImpl$(it, false) + ArgumentListWrapping:GetMessageAssetUseCaseTest.kt$GetMessageAssetUseCaseTest$(arrangement.mockedImageContent.remoteData.assetId) + ArgumentListWrapping:GetMessageAssetUseCaseTest.kt$GetMessageAssetUseCaseTest$(conversationId = someConversationId, messageId = someMessageId, encryptedPath = encryptedPath) + ArgumentListWrapping:GetMessageAssetUseCaseTest.kt$GetMessageAssetUseCaseTest$(eq(arrangement.mockedImageContent.remoteData.assetId), any(), any(), any(), any(), any(), any(), any()) + ArgumentListWrapping:GetMessageAssetUseCaseTest.kt$GetMessageAssetUseCaseTest$(eq(arrangement.mockedImageContent.remoteData.assetId), any(), any(), any(), any(), any(), any(), eq(true)) + ArgumentListWrapping:GetMessageAssetUseCaseTest.kt$GetMessageAssetUseCaseTest$(testDispatcher.default) + ArgumentListWrapping:GetMessageAssetUseCaseTest.kt$GetMessageAssetUseCaseTest$(true) + ArgumentListWrapping:GetMessageAssetUseCaseTest.kt$GetMessageAssetUseCaseTest.Arrangement$( assetDataSource, messageRepository, userRepository, updateAssetMessageTransferStatus, testScope, testDispatcher ) + ArgumentListWrapping:GetMessageByIdUseCaseTest.kt$GetMessageByIdUseCaseTest$(testDispatchers.io) + ArgumentListWrapping:GetNotificationsUseCaseTest.kt$GetNotificationsUseCaseTest$( conversationId(1), "some convo", listOf(), false ) + ArgumentListWrapping:GetPaginatedFlowOfMessagesByConversationUseCase.kt$GetPaginatedFlowOfMessagesByConversationUseCase$( conversationId, visibility, pagingConfig, startingOffset ) + ArgumentListWrapping:GetPaginatedFlowOfMessagesBySearchQueryAndConversationIdUseCase.kt$GetPaginatedFlowOfMessagesBySearchQueryAndConversationIdUseCase$( searchQuery, conversationId, pagingConfig, startingOffset ) + ArgumentListWrapping:GetPublicAssetUseCaseTest.kt$GetPublicAssetUseCaseTest$(NetworkFailure.FederatedBackendFailure.General::class, (publicAsset as PublicAssetResult.Failure).coreFailure::class) + ArgumentListWrapping:GetPublicAssetUseCaseTest.kt$GetPublicAssetUseCaseTest$(NetworkFailure.ServerMiscommunication::class, (publicAsset as PublicAssetResult.Failure).coreFailure::class) + ArgumentListWrapping:GetServerConfigUseCase.kt$GetServerConfigUseCase$(url) + ArgumentListWrapping:GetSessionsUseCase.kt$GetSessionsUseCase$( { when (it) { StorageFailure.DataNotFound -> GetAllSessionsResult.Failure.NoSessionFound is StorageFailure.Generic -> GetAllSessionsResult.Failure.Generic(it) } }, { GetAllSessionsResult.Success(it) } ) + ArgumentListWrapping:GetUserInfoUseCase.kt$GetUserInfoUseCaseImpl$( { GetUserInfoResult.Failure }, { team -> GetUserInfoResult.Success(otherUser, team) }) + ArgumentListWrapping:GlobalDBBaseTest.kt$GlobalDBBaseTest$("test_db_secret".toByteArray()) + ArgumentListWrapping:GlobalDBBaseTest.kt$GlobalDBBaseTest$(ApplicationProvider.getApplicationContext(), GlobalDatabaseSecret("test_db_secret".toByteArray())) + ArgumentListWrapping:GlobalDBBaseTest.kt$GlobalDBBaseTest$(NSCachesDirectory, NSUserDomainMask, null, true, null) + ArgumentListWrapping:GlobalKaliumScope.kt$GlobalKaliumScope$(customServerConfigRepository) + ArgumentListWrapping:GlobalPrefProvider.kt$GlobalPrefProvider$(SettingOptions.AppSettings(shouldEncryptData), EncryptedSettingsPlatformParam(context)) + ArgumentListWrapping:GlobalPrefProvider.kt$GlobalPrefProvider$(context) + ArgumentListWrapping:GlobalPrefProvider.kt$GlobalPrefProvider$(shouldEncryptData) + ArgumentListWrapping:GuestRoomConfigHandler.kt$GuestRoomConfigHandler$( { false }, { it.isGuestRoomLinkEnabled != status } ) + ArgumentListWrapping:HandleExternalRequestAction.kt$( """ Hey there, I hope you're doing well. I've got a bit of a craving for bananas, and I was wondering if you might be able to share a few with me? It would mean a lot. 😊 Thanks a bunch, A friendly monkey 🍌🐡 """.trimIndent(), """ Yo, I'm in need of some bananas, my friend. Can you hook me up? I'd appreciate it big time. Respect, A neutral monkey 🍌 """.trimIndent(), """ Listen up, I ain't messin' around. I want them bananas, and I want 'em now. You better deliver or there'll be consequences. No games, An evil monkey πŸŒπŸ‘ΏπŸ’€ """.trimIndent() ) + ArgumentListWrapping:IncrementalSyncManager.kt$IncrementalSyncManager$("$TAG IncrementalSync finished normally. Starting to observe ConnectionPolicy upgrade") + ArgumentListWrapping:IncrementalSyncManagerTest.kt$IncrementalSyncManagerTest$(TestKaliumDispatcher.default) + ArgumentListWrapping:IncrementalSyncManagerTest.kt$IncrementalSyncManagerTest.Arrangement$(classOf<IncrementalSyncRepository>()) + ArgumentListWrapping:IncrementalSyncManagerTest.kt$IncrementalSyncManagerTest.Arrangement$(mock(classOf<IncrementalSyncRepository>())) + ArgumentListWrapping:IncrementalSyncWorkerTest.kt$IncrementalSyncWorkerTest$(TestKaliumDispatcher.default) + ArgumentListWrapping:InstanceService.kt$InstanceService$( instanceRequest.email, instanceRequest.password, true, secondFactorVerificationCode = instanceRequest.verificationCode ) + ArgumentListWrapping:InstanceService.kt$InstanceService$( loginResult.serverConfigId, loginResult.ssoID, loginResult.authData, null, true ) + ArgumentListWrapping:InstanceService.kt$InstanceService$("Instance $instanceId: Client registration failed, 2FA code needed for account") + ArgumentListWrapping:InstanceService.kt$InstanceService$("Instance $instanceId: Client registration failed, invalid 2FA code") + ArgumentListWrapping:InstanceService.kt$InstanceService$("Instance $instanceId: Client registration failed, invalid password") + ArgumentListWrapping:InstanceService.kt$InstanceService$("Instance $instanceId: Client registration failed, missing password") + ArgumentListWrapping:InstanceService.kt$InstanceService$("Instance $instanceId: Client registration failed, too many clients") + ArgumentListWrapping:InstanceService.kt$InstanceService$("Instance $instanceId: Login with ${instanceRequest.email} on ${instanceRequest.customBackend.rest}") + ArgumentListWrapping:InstanceService.kt$InstanceService$(MetricRegistry.name("testservice", "instances", "total", "size"), Gauge { instances.size }) + ArgumentListWrapping:InstanceServiceTest.kt$InstanceServiceTest$("No directory for coreLogic was created", File(instancePath).exists()) + ArgumentListWrapping:InstanceServiceTest.kt$InstanceServiceTest$("No global-storage/global-db file found in $instancePath", File("$instancePath/global-storage/global-db").exists()) + ArgumentListWrapping:JoinConversationViaCodeUseCaseTest.kt$JoinConversationViaCodeUseCaseTest$( code, key, null, password, Either.Left( NetworkFailure.ServerMiscommunication( KaliumException.InvalidRequestError( ErrorResponse(403, "wrong password", "invalid-conversation-password") ) ) ) ) + ArgumentListWrapping:JoinExistingMLSConversationUseCaseTest.kt$JoinExistingMLSConversationUseCaseTest$(Arrangement.MLS_UNESTABLISHED_ONE_ONE_ONE_CONVERSATION.id) + ArgumentListWrapping:JoinExistingMLSConversationsUseCase.kt$JoinExistingMLSConversationsUseCaseImpl$(GroupState.PENDING_JOIN) + ArgumentListWrapping:KaliumHttpLogger.kt$KaliumHttpLogger$(request.headers.entries().map { it.key to it.value }) + ArgumentListWrapping:KaliumHttpLogger.kt$KaliumHttpLogger$(response.headers.entries().map { it.key to it.value }) + ArgumentListWrapping:KeyPackageManager.kt$KeyPackageManagerImpl$(LAST_KEY_PACKAGE_COUNT_CHECK) + ArgumentListWrapping:KeyPackageManagerTests.kt$KeyPackageManagerTests.Arrangement$( TestClient.CLIENT_ID, 0, true ) + ArgumentListWrapping:KeyPackageRepository.kt$KeyPackageDataSource$(KeyPackageApi.Param.SkipOwnClient(userId.toApi(), selfClientId.value)) + ArgumentListWrapping:KeyPackageRepository.kt$KeyPackageDataSource$(userId.toApi(), selfClientId.value) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest$(Arrangement.CLAIMED_KEY_PACKAGES.keyPackages[0]) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest$(listOf(Arrangement.CLAIMED_KEY_PACKAGES.keyPackages[0]), keyPackageResult.successfullyFetchedKeyPackages) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(1) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(MLS_CLIENT) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(MLS_CLIENT::generateKeyPackages) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(SELF_CLIENT_ID) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(SELF_CLIENT_ID.value) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(anything(), anything()) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(eq(1)) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(eq(SELF_CLIENT_ID)) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(eq(SELF_CLIENT_ID.value)) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(keyPackageApi) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(keyPackageApi::getAvailableKeyPackageCount) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(keyPackageApi::uploadKeyPackages) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(mlsClientProvider) + ArgumentListWrapping:KeyPackageRepositoryTest.kt$KeyPackageRepositoryTest.Arrangement$(mlsClientProvider::getMLSClient) + ArgumentListWrapping:LastReadContentHandler.kt$LastReadContentHandlerImpl$(messageContent.conversationId) + ArgumentListWrapping:LeaveConversationAction.kt$LeaveConversationAction$(sender) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$("missing legal hold consent for connection with user ${connection.qualifiedToId.toLogString()}") + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(connection.qualifiedConversationId, Conversation.LegalHoldStatus.DEGRADED) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(conversationId, newLegalHoldStatusAfterMembersChange) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(conversationId, newStatus, systemMessageTimestampIso) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(conversationId, systemMessageTimestampIso) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(legalHoldDisabled.userId, DateTimeUtil.currentIsoDateTimeString()) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(legalHoldEnabled.userId, DateTimeUtil.currentIsoDateTimeString()) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(listOf(message.conversationId), systemMessageTimestampIso) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(message.conversationId) + ArgumentListWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$(userId, systemMessageTimestampIso) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(LegalHoldState.Enabled) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(conversation(legalHoldStatus = Conversation.LegalHoldStatus.DISABLED)) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(conversation(legalHoldStatus = Conversation.LegalHoldStatus.ENABLED)) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(legalHoldStatus = Conversation.LegalHoldStatus.DISABLED) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(legalHoldStatus = Conversation.LegalHoldStatus.ENABLED) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(listOf(conversation(legalHoldStatus = Conversation.LegalHoldStatus.DISABLED))) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(listOf(conversation(legalHoldStatus = Conversation.LegalHoldStatus.ENABLED))) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(membersHavingLegalHoldClientBefore, membersHavingLegalHoldClientAfter) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$(userId) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest.Arrangement$(LegalHoldSystemMessagesHandler::class) + ArgumentListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest.Arrangement$(mock(LegalHoldSystemMessagesHandler::class)) + ArgumentListWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$(MessageContent.LegalHold.ForMembers.Disabled(listOf(TestUser.OTHER_USER_ID_2))) + ArgumentListWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$(MessageContent.LegalHold.ForMembers.Enabled(listOf(TestUser.OTHER_USER_ID_2))) + ArgumentListWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$(TestConversation.CONVERSATION.id to TestMessage.TEXT_MESSAGE) + ArgumentListWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$(TestUser.OTHER_USER_ID_2) + ArgumentListWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$(listOf(TestUser.OTHER_USER_ID_2)) + ArgumentListWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$(mapOf(TestConversation.CONVERSATION.id to TestMessage.TEXT_MESSAGE)) + ArgumentListWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$(matching { it.content is MessageContent.LegalHold.ForConversation.Disabled && it.date == timestampIso }) + ArgumentListWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$(matching { it.content is MessageContent.LegalHold.ForConversation.Enabled && it.date == timestampIso }) + ArgumentListWrapping:LegalHoldSystemMessagesHandler.kt$LegalHoldSystemMessagesHandlerImpl$(MessageContent.LegalHold.ForConversation.Disabled, conversationId, systemMessageTimestampIso) + ArgumentListWrapping:LegalHoldSystemMessagesHandler.kt$LegalHoldSystemMessagesHandlerImpl$(MessageContent.LegalHold.ForConversation.Enabled, conversationId, systemMessageTimestampIso) + ArgumentListWrapping:LegalHoldSystemMessagesHandler.kt$LegalHoldSystemMessagesHandlerImpl$(conversationId, Conversation.LegalHoldStatus.DISABLED, systemMessageTimestampIso) + ArgumentListWrapping:LegalHoldSystemMessagesHandler.kt$LegalHoldSystemMessagesHandlerImpl$(conversationId, Conversation.LegalHoldStatus.ENABLED, systemMessageTimestampIso) + ArgumentListWrapping:ListUserRequest.kt$(qualifiedHandles) + ArgumentListWrapping:ListUsersRequestJson.kt$ListUsersRequestJson$( QualifiedUserIdListRequest( listOf( QualifiedID("id1", "domain1"), QualifiedID("id11", "domain1"), QualifiedID("id2", "domain2") ) ), qualifiedIdsProvider ) + ArgumentListWrapping:LocalMonkey.kt$LocalMonkey$( id, monkey.monkeyType.userId() ) + ArgumentListWrapping:LocalMonkey.kt$LocalMonkey$( name, monkeyList.map { it.monkeyType.userId() }, ConversationOptions(protocol = protocol) ) + ArgumentListWrapping:LocalMonkey.kt$LocalMonkey$( userIdentifier = email, password = password, shouldPersistClient = false, secondFactorVerificationCode = secondFactor ) + ArgumentListWrapping:LoginUseCase.kt$LoginUseCaseImpl$(authTokens, ssoId, serverConfig.id, proxyCredentials) + ArgumentListWrapping:LoginUseCase.kt$LoginUseCaseImpl$(it, isEmail, cleanUserIdentifier) + ArgumentListWrapping:LoginUseCaseTest.kt$LoginUseCaseTest$("cooluser", listOf('!', ':', '?')) + ArgumentListWrapping:LoginUseCaseTest.kt$LoginUseCaseTest$('!', ':', '?') + ArgumentListWrapping:LoginUseCaseTest.kt$LoginUseCaseTest$(TEST_EMAIL, TEST_PASSWORD, TEST_PERSIST_CLIENT, TEST_LABEL, TEST_2FA_CODE) + ArgumentListWrapping:LoginUseCaseTest.kt$LoginUseCaseTest$(dirtyEmail, TEST_PASSWORD, TEST_PERSIST_CLIENT, TEST_LABEL, TEST_2FA_CODE) + ArgumentListWrapping:LoginUseCaseTest.kt$LoginUseCaseTest$(dirtyHandle, TEST_PASSWORD, TEST_PERSIST_CLIENT, TEST_LABEL, TEST_2FA_CODE) + ArgumentListWrapping:LoginWithEmailRequestJson.kt$LoginWithEmailRequestJson$( LoginApi.LoginParam.LoginWithEmail( email = "user@email.de", label = "label", password = "password", verificationCode = "verificationCode" ), jsonProvider ) + ArgumentListWrapping:LoginWithEmailRequestJson.kt$LoginWithEmailRequestJson$( LoginApi.LoginParam.LoginWithHandle( handle = "cool_user_name", label = "label", password = "password", ), jsonProvider ) + ArgumentListWrapping:LogoutApiV0Test.kt$LogoutApiV0Test$((errorResponse.kException as KaliumException.InvalidRequestError).errorResponse, ERROR_RESPONSE.serializableData) + ArgumentListWrapping:LogoutUseCaseTest.kt$LogoutUseCaseTest.Arrangement$(classOf<UserSessionScopeProvider>()) + ArgumentListWrapping:LogoutUseCaseTest.kt$LogoutUseCaseTest.Arrangement$(classOf<UserSessionWorkScheduler>()) + ArgumentListWrapping:LogoutUseCaseTest.kt$LogoutUseCaseTest.Arrangement$(mock(classOf<UserSessionScopeProvider>())) + ArgumentListWrapping:LogoutUseCaseTest.kt$LogoutUseCaseTest.Arrangement$(mock(classOf<UserSessionWorkScheduler>())) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl$(coreCrypto.decryptMessage(toUByteList(groupId.decodeBase64Bytes()), toUByteList(message))) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl$(coreCrypto.removeClientsFromConversation(toUByteList(groupId.decodeBase64Bytes()), clientIds)) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl$(groupId.decodeBase64Bytes()) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl$(keyRotationDuration.toJavaDuration(), MlsWirePolicy.PLAINTEXT) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl$(message) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl$(toDecryptedMessageBundle(coreCrypto.decryptMessage(toUByteList(groupId.decodeBase64Bytes()), toUByteList(message)))) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl$(toUByteList(groupId.decodeBase64Bytes()), clientIds) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl$(toUByteList(groupId.decodeBase64Bytes()), toUByteList(message)) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl.Companion$((toByteArray(it).commonToUtf8String())) + ArgumentListWrapping:MLSClientImpl.kt$MLSClientImpl.Companion$(it) + ArgumentListWrapping:MLSConfigHandler.kt$MLSConfigHandler$(SupportedProtocol.PROTEUS) + ArgumentListWrapping:MLSConfigHandler.kt$MLSConfigHandler$(if (mlsEnabled) mlsConfig.defaultProtocol else SupportedProtocol.PROTEUS) + ArgumentListWrapping:MLSConfigHandler.kt$MLSConfigHandler$(setOf(SupportedProtocol.PROTEUS)) + ArgumentListWrapping:MLSConversationRepository.kt$MLSConversationDataSource$(event, EventDeliveryInfo(isTransient = true, source = EventSource.LIVE)) + ArgumentListWrapping:MLSConversationRepository.kt$MLSConversationDataSource$(isTransient = true, source = EventSource.LIVE) + ArgumentListWrapping:MLSConversationRepository.kt$MLSConversationDataSource$(serialDispatcher) + ArgumentListWrapping:MLSConversationRepository.kt$MLSConversationDataSource$(user.userId, user.domain) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(Arrangement.GROUP_ID, TestConversation.ID) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(Arrangement.GROUP_ID, listOf(TestConversation.USER_ID1)) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(Either.Left(StorageFailure.DataNotFound), mlsConversationRepository.getClientIdentity(TestClient.CLIENT_ID)) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(Either.Right(listOf(WIRE_IDENTITY)), mlsConversationRepository.getUserIdentity(TestUser.OTHER_USER_ID)) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(StorageFailure.DataNotFound) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(TestClient.CLIENT_ID) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(TestClient.CLIENT_ID, arrangement.e2eiClient, "") + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(TestConversation.USER_ID1) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(TestKaliumDispatcher.default) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(TestUser.OTHER_USER_ID) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(WIRE_IDENTITY) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(handle = WireIdentity.Handle.fromString(handleWithSchemeAndDomain, domain)) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(handleWithSchemeAndDomain, domain) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(keyPackageSuccess) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(keyPackages = listOf(keyPackageSuccess), usersWithoutKeyPackages = usersMissingKeyPackages) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$(listOf(WIRE_IDENTITY)) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest.Arrangement$(NetworkResponse.Success(value = CLIENTS_OF_USERS_RESPONSE, headers = mapOf(), httpCode = 200)) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest.Arrangement$(value = CLIENTS_OF_USERS_RESPONSE, headers = mapOf(), httpCode = 200) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest.Arrangement.Companion$(409, "", "mls-client-mismatch") + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest.Arrangement.Companion$(409, "", "mls-stale-message") + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest.Arrangement.Companion$(ErrorResponse(409, "", "mls-client-mismatch")) + ArgumentListWrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest.Arrangement.Companion$(ErrorResponse(409, "", "mls-stale-message")) + ArgumentListWrapping:MLSConversationsVerificationStatusesHandler.kt$MLSConversationsVerificationStatusesHandlerImpl$( epochChangesData.conversationId.toModel(), epochChangesData.members.keys.map { it.toModel() }) + ArgumentListWrapping:MLSConversationsVerificationStatusesHandler.kt$MLSConversationsVerificationStatusesHandlerImpl$(conversationId, updatedStatus != VerificationStatus.DEGRADED) + ArgumentListWrapping:MLSConversationsVerificationStatusesHandlerTest.kt$MLSConversationsVerificationStatusesHandlerTest$(conversation = TestConversation.MLS_CONVERSATION) + ArgumentListWrapping:MLSKeyPackageCountUseCase.kt$MLSKeyPackageCountUseCaseImpl$( { MLSKeyPackageCountResult.Failure.Generic(it) }, { MLSKeyPackageCountResult.Success(selfClient, it, keyPackageLimitsProvider.needsRefill(it)) }) + ArgumentListWrapping:MLSKeyPackageCountUseCase.kt$MLSKeyPackageCountUseCaseImpl$( { MLSKeyPackageCountResult.Failure.NetworkCallFailure(it) }, { MLSKeyPackageCountResult.Success(selfClient, it.count, keyPackageLimitsProvider.needsRefill(it.count)) }) + ArgumentListWrapping:MLSKeyPackageCountUseCase.kt$MLSKeyPackageCountUseCaseImpl$(it.count) + ArgumentListWrapping:MLSKeyPackageCountUseCase.kt$MLSKeyPackageCountUseCaseImpl$(selfClient, it.count, keyPackageLimitsProvider.needsRefill(it.count)) + ArgumentListWrapping:MLSMessageCreator.kt$MLSMessageCreatorImpl$(groupId) + ArgumentListWrapping:MLSMessageCreator.kt$MLSMessageCreatorImpl$(idMapper.toCryptoModel(groupId), content.data) + ArgumentListWrapping:MLSMessageCreator.kt$MLSMessageCreatorImpl$(mlsClient.encryptMessage(idMapper.toCryptoModel(groupId), content.data)) + ArgumentListWrapping:MLSMessageUnpacker.kt$MLSMessageUnpackerImpl$( KaliumLogLevel.DEBUG, "Received MLS proposal, scheduling delayed commit", mapOf( "groupId" to groupId.toLogString(), "commitDelay" to "$commitDelay" ) ) + ArgumentListWrapping:MLSMessageUnpackerTest.kt$MLSMessageUnpackerTest$(TestConversation.GROUP_ID) + ArgumentListWrapping:MLSMessageUnpackerTest.kt$MLSMessageUnpackerTest$(matching { it.contentEquals(messageEvent.content.decodeBase64Bytes()) }, eq(TestConversation.GROUP_ID)) + ArgumentListWrapping:MLSMessageUnpackerTest.kt$MLSMessageUnpackerTest$(messageEvent.content.decodeBase64Bytes()) + ArgumentListWrapping:MLSMigrator.kt$MLSMigratorImpl$( conversationId, selfUserId, Protocol.MIXED ) + ArgumentListWrapping:MLSMigrator.kt$MLSMigratorImpl$( conversationId, selfUserId, Protocol.MLS ) + ArgumentListWrapping:MLSWelcomeEventHandler.kt$MLSWelcomeEventHandlerImpl$(groupID, Conversation.ProtocolInfo.MLSCapable.GroupState.ESTABLISHED) + ArgumentListWrapping:MLSWelcomeEventHandlerTest.kt$MLSWelcomeEventHandlerTest.Arrangement$(classOf<CertificateRevocationListRepository>()) + ArgumentListWrapping:MainActivity.kt$( modifier = Modifier.fillMaxWidth(), thickness = 0.5.dp ) + ArgumentListWrapping:MapperProvider.kt$MapperProvider$(idMapper(), selfUserId) + ArgumentListWrapping:MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest.kt$MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest$(any(), eq(false)) + ArgumentListWrapping:MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest.kt$MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest$(false) + ArgumentListWrapping:MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest.kt$MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest$(once) + ArgumentListWrapping:MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest.kt$MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest$(userConfigRepository) + ArgumentListWrapping:MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest.kt$MarkGuestLinkFeatureFlagAsNotChangedUseCaseTest$(userConfigRepository::setGuestRoomStatus) + ArgumentListWrapping:MarkLegalHoldChangeAsNotifiedForSelfUseCaseTest.kt$MarkLegalHoldChangeAsNotifiedForSelfUseCaseTest.Arrangement$(userConfigRepository) + ArgumentListWrapping:MemberChangeEventHandlerTest.kt$MemberChangeEventHandlerTest.Arrangement$(conversationRepository) + ArgumentListWrapping:MemberDAO.kt$MemberDAOImpl$(coroutineContext) + ArgumentListWrapping:MemberDAOTest.kt$MemberDAOTest$(conversationEntity1.id) + ArgumentListWrapping:MemberDAOTest.kt$MemberDAOTest$(dispatcher) + ArgumentListWrapping:MemberDAOTest.kt$MemberDAOTest$(member1, member2) + ArgumentListWrapping:MemberDAOTest.kt$MemberDAOTest$(setOf(member1, member2), memberDAO.observeConversationMembers(conversationEntity1.id).first().toSet()) + ArgumentListWrapping:MemberMapperTest.kt$MemberMapperTest.Companion$("other1", "domain1") + ArgumentListWrapping:MemberMapperTest.kt$MemberMapperTest.Companion$(id = UserIdDTO("other1", "domain1"), conversationRole = "wire_member", service = null) + ArgumentListWrapping:MemberUpdateDTO.kt$MemberUpdateDTO$("otr_muted_status") + ArgumentListWrapping:MemberUpdateDTO.kt$MemberUpdateDTO$(with = MutedStatusSerializer::class) + ArgumentListWrapping:MemberUpdateRequestJson.kt$MemberUpdateRequestJson$( null, null, null, null, "2022-04-11T14:15:48.044Z", MutedStatus.ALL_ALLOWED ) + ArgumentListWrapping:MembersToMentionUseCase.kt$MembersToMentionUseCase$(dispatcher.io) + ArgumentListWrapping:MessageContentEncoder.kt$MessageContentEncoder$(latitudeBEBytes + longitudeBEBytes + encodeMessageTimeStampInMillis(messageTimeStampInMillis)) + ArgumentListWrapping:MessageDAOBenchmarkTest.kt$MessageDAOBenchmarkTest$("Took $it to query visible messages from a single conversation, with $totalMessageCount random messages inserted") + ArgumentListWrapping:MessageDAOImpl.kt$MessageDAOImpl$( conversationId, visibility ) + ArgumentListWrapping:MessageDAOImpl.kt$MessageDAOImpl$( conversationId, visibility, date.toInstant(), mapper::toEntityMessageFromView ) + ArgumentListWrapping:MessageDAOImpl.kt$MessageDAOImpl$( userId, MessageEntity.Status.PENDING, mapper::toEntityMessageFromView ) + ArgumentListWrapping:MessageDAOImpl.kt$MessageDAOImpl$(coroutineContext) + ArgumentListWrapping:MessageDAOImpl.kt$MessageDAOImpl$(queries, assetViewQueries, mapper, coroutineContext) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$( id = it.toString(), date = "2000-01-01T11:0$it:00.000Z".toInstant(), conversationId = conversationId, senderUserId = userEntity1.id, ) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$( messageId, conversationId, listOf(userEntity1.id, userEntity2.id), RecipientFailureTypeEntity.MESSAGE_DELIVERY_FAILED ) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$(124) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$(AssetTransferStatusEntity.DOWNLOAD_IN_PROGRESS, messageId, conversationEntity1.id) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$(AssetTransferStatusEntity.UPLOAD_IN_PROGRESS, message2Id, conversationEntity1.id) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$(conversationEntity1.id, messageToSend.id, Instant.fromEpochMilliseconds(124), 1) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$(conversationInQuestion.id) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$(conversationInQuestion.id, dateInQuestion) + ArgumentListWrapping:MessageDAOTest.kt$MessageDAOTest$(userEntity1.id, userEntity2.id) + ArgumentListWrapping:MessageDraftDAOImpl.kt$MessageDraftDAOImpl$(conversationIDEntity) + ArgumentListWrapping:MessageDraftMapper.kt$( text = text, editMessageId = editMessageId, quotedMessageId = quotedMessageId, // self mentions are not supported in drafts selectedMentionList = selectedMentionList.map { it.toModel(selfUserId = null) }) + ArgumentListWrapping:MessageEnvelopeCreator.kt$MessageEnvelopeCreatorImpl$(message.id, message.content, expectsReadConfirmation, legalHoldStatus) + ArgumentListWrapping:MessageLegalHoldTest.kt$MessageLegalHoldTest.Companion$(ORIGINAL_MESSAGE_ID, ORIGINAL_CONTENT, CONVERSATION_ID, OTHER_USER.id) + ArgumentListWrapping:MessageLegalHoldTest.kt$MessageLegalHoldTest.Companion$(OTHER_USER.id) + ArgumentListWrapping:MessageLegalHoldTest.kt$MessageLegalHoldTest.Companion$(listOf(OTHER_USER.id), MessageEntity.LegalHoldType.ENABLED_FOR_MEMBERS) + ArgumentListWrapping:MessageMapper.kt$( this.mimeType, this.assetSizeInBytes, this.assetName ) + ArgumentListWrapping:MessageMapper.kt$(adminName) + ArgumentListWrapping:MessageMapper.kt$(domainList) + ArgumentListWrapping:MessageMapper.kt$(memberList) + ArgumentListWrapping:MessageMapper.kt$(memberList, MessageContent.MemberChange.FailedToAdd.Type.Federation) + ArgumentListWrapping:MessageMapper.kt$(memberList, MessageContent.MemberChange.FailedToAdd.Type.LegalHold) + ArgumentListWrapping:MessageMapper.kt$(memberList, MessageContent.MemberChange.FailedToAdd.Type.Unknown) + ArgumentListWrapping:MessageMapper.kt$(memberUserIdList, MessageEntity.MemberChangeType.FAILED_TO_ADD_FEDERATION) + ArgumentListWrapping:MessageMapper.kt$(memberUserIdList, MessageEntity.MemberChangeType.FAILED_TO_ADD_LEGAL_HOLD) + ArgumentListWrapping:MessageMapper.kt$(memberUserIdList, MessageEntity.MemberChangeType.FAILED_TO_ADD_UNKNOWN) + ArgumentListWrapping:MessageMapper.kt$(messageTimer) + ArgumentListWrapping:MessageMapper.kt$(protocol.toModel()) + ArgumentListWrapping:MessageMapper.kt$(this.members.map { it.toDao() }, MessageEntity.LegalHoldType.DISABLED_FOR_MEMBERS) + ArgumentListWrapping:MessageMapper.kt$(this.members.map { it.toDao() }, MessageEntity.LegalHoldType.ENABLED_FOR_MEMBERS) + ArgumentListWrapping:MessageMapper.kt$(userName) + ArgumentListWrapping:MessageMapper.kt$(username = senderName, messageBody = messageBody) + ArgumentListWrapping:MessageMapper.kt$(username = senderName, type = type.toModel()) + ArgumentListWrapping:MessageMapper.kt$MessageMapper$( senderName = senderName, messageBody = text.requireField("text") ) + ArgumentListWrapping:MessageMapper.kt$MessageMapper$("quotedMessageDateTime") + ArgumentListWrapping:MessageMapper.kt$MessageMapper$(conversationName.orEmpty()) + ArgumentListWrapping:MessageMapper.kt$MessageMapper$(userName = senderName) + ArgumentListWrapping:MessageMapper.kt$MessageMapperImpl$( expireAfter = it.toDuration(DurationUnit.MILLISECONDS), selfDeletionStatus = message.selfDeletionStartDate ?.let { Message.ExpirationData.SelfDeletionStatus.Started(it) } ?: Message.ExpirationData.SelfDeletionStatus.NotStarted) + ArgumentListWrapping:MessageMapper.kt$MessageMapperImpl$(message.editStatus.lastTimeStamp.toInstant()) + ArgumentListWrapping:MessageMapper.kt$MessageMapperImpl$(message.visibility.toModel() == Message.Visibility.HIDDEN, selfUserId) + ArgumentListWrapping:MessageMapperTest.kt$MessageMapperTest$(emptyList(), MessageEntity.LegalHoldType.DISABLED_FOR_CONVERSATION) + ArgumentListWrapping:MessageMapperTest.kt$MessageMapperTest$(emptyList(), MessageEntity.LegalHoldType.ENABLED_FOR_CONVERSATION) + ArgumentListWrapping:MessageMapperTest.kt$MessageMapperTest$(memberUserIdList, MessageEntity.LegalHoldType.DISABLED_FOR_MEMBERS) + ArgumentListWrapping:MessageMapperTest.kt$MessageMapperTest$(memberUserIdList, MessageEntity.LegalHoldType.ENABLED_FOR_MEMBERS) + ArgumentListWrapping:MessageNotificationsTest.kt$MessageNotificationsTest$(TEST_CONVERSATION_1.id, ConversationEntity.MutedStatus.ALL_MUTED, 0L) + ArgumentListWrapping:MessageNotificationsTest.kt$MessageNotificationsTest$(conversationId, mutedStatus, Clock.System.now().toEpochMilliseconds()) + ArgumentListWrapping:MessageNotificationsTest.kt$MessageNotificationsTest.Companion$( "I'm quoting others", quotedMessageId = OTHER_MESSAGE.id ) + ArgumentListWrapping:MessageNotificationsTest.kt$MessageNotificationsTest.Companion$( "I'm quoting selfUser", quotedMessageId = SELF_MESSAGE.id ) + ArgumentListWrapping:MessageNotificationsTest.kt$MessageNotificationsTest.Companion$( messageBody = "@$@${OTHER_USER_2.name}", mentions = listOf(OTHER_MENTION) ) + ArgumentListWrapping:MessageNotificationsTest.kt$MessageNotificationsTest.Companion$( messageBody = "@${SELF_USER.name} @${OTHER_USER_2.name}", mentions = listOf(SELF_MENTION) ) + ArgumentListWrapping:MessageNotificationsTest.kt$MessageNotificationsTest.Companion$( start = 0, length = 9, userId = SELF_USER_ID ) + ArgumentListWrapping:MessageNotificationsTest.kt$MessageNotificationsTest.Companion$( start = 10, length = 11, userId = OTHER_USER_2.id ) + ArgumentListWrapping:MessageReactionsTest.kt$MessageReactionsTest$(initialMessageEntity.id, initialMessageEntity.conversationId, OTHER_USER.id, "date", "😑") + ArgumentListWrapping:MessageReactionsTest.kt$MessageReactionsTest$(initialMessageEntity.id, initialMessageEntity.conversationId, OTHER_USER.id, "date", firstEmoji) + ArgumentListWrapping:MessageReactionsTest.kt$MessageReactionsTest$(initialMessageEntity.id, initialMessageEntity.conversationId, SELF_USER_ID, "date", firstEmoji) + ArgumentListWrapping:MessageReactionsTest.kt$MessageReactionsTest$(initialMessageEntity.id, initialMessageEntity.conversationId, SELF_USER_ID, "date", secondEmoji) + ArgumentListWrapping:MessageReplyTest.kt$MessageReplyTest$(dispatcher) + ArgumentListWrapping:MessageRepository.kt$MessageDataSource$(messageOption.userIDs.map { it.toApi() }) + ArgumentListWrapping:MessageRepositoryTest.kt$MessageRepositoryTest$( matching { (it.messageOption is MessageApi.QualifiedMessageOption.ReportSome) && ((it.messageOption as MessageApi.QualifiedMessageOption.ReportSome) .userIDs == recipient.map { it.id }) }, anything() ) + ArgumentListWrapping:MessageRepositoryTest.kt$MessageRepositoryTest$( matching { it.recipients.isEmpty() && it.messageOption == MessageApi.QualifiedMessageOption.IgnoreAll }, anything() ) + ArgumentListWrapping:MessageRepositoryTest.kt$MessageRepositoryTest$( matching { it.recipients.isEmpty() && it.messageOption == MessageApi.QualifiedMessageOption.ReportAll }, anything() ) + ArgumentListWrapping:MessageRepositoryTest.kt$MessageRepositoryTest$(conversationID, messageID, newServerData, millis) + ArgumentListWrapping:MessageScope.kt$MessageScope$( messageRepository, dispatcher ) + ArgumentListWrapping:MessageScope.kt$MessageScope$(slowSyncRepository, selfUserId, currentClientIdProvider, messageSender, dispatcher) + ArgumentListWrapping:MessageSendFailureHandler.kt$MessageSendFailureHandlerImpl$(Unit) + ArgumentListWrapping:MessageSendFailureHandlerTest.kt$MessageSendFailureHandlerTest$( failureData, null ) + ArgumentListWrapping:MessageSendFailureHandlerTest.kt$MessageSendFailureHandlerTest$(arrangement.userOne, arrangement.userTwo) + ArgumentListWrapping:MessageSendFailureHandlerTest.kt$MessageSendFailureHandlerTest$(failure, arrangement.conversationId, arrangement.messageId, "text") + ArgumentListWrapping:MessageSendFailureHandlerTest.kt$MessageSendFailureHandlerTest$(mapOf(arrangement.userOne, arrangement.userTwo), mapOf(), mapOf(), null) + ArgumentListWrapping:MessageSender.kt$MessageSenderImpl$((messageTarget.usersToIgnore + usersWithoutSessions.users).toSet()) + ArgumentListWrapping:MessageSender.kt$MessageSenderImpl$(conversationId, messageTimestampIso, handleClientsHaveChangedFailure) + ArgumentListWrapping:MessageSender.kt$MessageSenderImpl$(envelope, message, option, target, remainingAttempts) + ArgumentListWrapping:MessageSender.kt$MessageSenderImpl$(it, "Broadcast", message.toLogString(), message.id, message.date, null, remainingAttempts = 1) + ArgumentListWrapping:MessageSender.kt$MessageSenderImpl$(message.conversationId, message.id, filteredUsersFailed) + ArgumentListWrapping:MessageSender.kt$MessageSenderImpl$(message.conversationId, message.id, messageSent.failedToConfirmClients) + ArgumentListWrapping:MessageSender.kt$MessageSenderImpl$(message.conversationId, message.id, usersWithoutSessions) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest$(Arrangement.TEST_CONVERSATION_ID, Arrangement.TEST_MESSAGE_UUID) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest$(Either.Left(failure), Either.Right(MessageSent(MESSAGE_SENT_TIME))) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest$(Either.Left(failure), Either.Right(TestMessage.TEST_DATE_STRING)) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest$(MESSAGE_SENT_TIME) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest$(MessageSent(MESSAGE_SENT_TIME)) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest$(TestMessage.TEST_DATE_STRING) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest$(failure) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest.Arrangement$(StorageFailure.DataNotFound) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest.Arrangement$(TestMessage.TEST_DATE_STRING) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest.Arrangement$(TestMessage.TEST_MESSAGE_SENT) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest.Arrangement$(TestMessage.TEXT_MESSAGE) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest.Arrangement$(if (failing) Either.Left(StorageFailure.DataNotFound) else Either.Right(TestMessage.TEXT_MESSAGE)) + ArgumentListWrapping:MessageSenderTest.kt$MessageSenderTest.Arrangement$(sendMlsMessageWithResult) + ArgumentListWrapping:MessageSendingInterceptor.kt$MessageSendingInterceptorImpl$(originalMessage.conversationId, replyMessageContent.quotedMessageReference.quotedMessageId) + ArgumentListWrapping:MessageTextEditHandler.kt$MessageTextEditHandlerImpl$(message.conversationId, messageContent.editMessageId) + ArgumentListWrapping:MessageTextEditTest.kt$MessageTextEditTest$(ORIGINAL_MESSAGE_ID) + ArgumentListWrapping:MessageTextEditTest.kt$MessageTextEditTest$(OTHER_USER.id, CONVERSATION_ID, Clock.System.now(), ReceiptTypeEntity.READ, listOf(ORIGINAL_MESSAGE_ID)) + ArgumentListWrapping:MessageTextEditTest.kt$MessageTextEditTest$(OTHER_USER.id, CONVERSATION_ID, instant, ReceiptTypeEntity.READ, listOf(ORIGINAL_MESSAGE_ID)) + ArgumentListWrapping:MigrationDAOTest.kt$MigrationDAOTest$(id = "conversation_id") + ArgumentListWrapping:MigrationDAOTest.kt$MigrationDAOTest$(type = ConversationEntity.Type.GROUP, name = "conv name") + ArgumentListWrapping:MigrationDAOTest.kt$MigrationDAOTest$(type = ConversationEntity.Type.ONE_ON_ONE, name = "migration name") + ArgumentListWrapping:Monkey.kt$( user.email, backendConfig.passwordForUsers, UserId(user.unqualifiedId, backendConfig.domain), team, oldCode ) + ArgumentListWrapping:Monkey.kt$(Monkey::external) + ArgumentListWrapping:Monkey.kt$(request.name, request.monkeys.map(Monkey::external), request.protocol, request.isDestroyable) + ArgumentListWrapping:Monkey.kt$Monkey$(this.connectedMonkeys().randomOrNull() ?: error("Monkey ${this.monkeyType.userId()} not connected to anyone")) + ArgumentListWrapping:MonkeyApplication.kt$MonkeyApplication$( coreLogic, prefix, config.groupCount, config.userCount, config.protocol, monkeyPool ) + ArgumentListWrapping:MonkeyApplication.kt$MonkeyApplication$("-l", "--log-level", help = "log level") + ArgumentListWrapping:MonkeyApplication.kt$MonkeyApplication$("-w", "--sequential-warmup", help = "Should the warmup happen sequentially?") + ArgumentListWrapping:MonkeyApplication.kt$MonkeyApplication$("Creating initial key packages for clients (logging everyone in and out). This can take a while...") + ArgumentListWrapping:MonkeyApplication.kt$MonkeyApplication$(KaliumLogLevel.INFO) + ArgumentListWrapping:MonkeyApplication.kt$MonkeyApplication.Companion$("CC-Version") + ArgumentListWrapping:MonkeyConversation.kt$MonkeyConversation$("g_conversationMembers", listOf(Tag.of("id", conversationId.toString())), this.participants) + ArgumentListWrapping:MonkeyConversation.kt$MonkeyConversation$("id", conversationId.toString()) + ArgumentListWrapping:MonkeyConversation.kt$MonkeyConversation$(Tag.of("id", conversationId.toString())) + ArgumentListWrapping:MonkeyPool.kt$MonkeyPool$( "g_loggedInUsers", listOf(Tag.of("domain", domain), Tag.of("testCase", testCase)), usersById ) + ArgumentListWrapping:MonkeyPool.kt$MonkeyPool$( "g_loggedOutUsers", listOf(Tag.of("domain", domain), Tag.of("testCase", testCase)), usersById ) + ArgumentListWrapping:MonkeyPool.kt$MonkeyPool$(Monkey::external) + ArgumentListWrapping:MonkeyServer.kt$MonkeyServer$( "-f", envvar = "FILE_BACKEND_CONFIG" ) + ArgumentListWrapping:MonkeyServer.kt$MonkeyServer$("-l", "--log-level", help = "log level") + ArgumentListWrapping:MonkeyServer.kt$MonkeyServer$(KaliumLogLevel.INFO) + ArgumentListWrapping:NeedsToRegisterClientUseCaseTest.kt$NeedsToRegisterClientUseCaseTest.Arrangement$(currentClientIdProvider, sessionRepository, proteusClientProvider, selfUserId) + ArgumentListWrapping:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest$(dispatcher.default) + ArgumentListWrapping:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest$(networkType = NetworkType.MOBILE, setAsDefault = true, withInternetValidated = false) + ArgumentListWrapping:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest$(networkType = NetworkType.MOBILE, setAsDefault = true, withInternetValidated = true) + ArgumentListWrapping:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest$(networkType = NetworkType.WIFI, setAsDefault = true, withInternetValidated = true) + ArgumentListWrapping:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest.Arrangement$(Context.CONNECTIVITY_SERVICE) + ArgumentListWrapping:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest.Arrangement$(NetworkInfo.DetailedState.CONNECTED, networkType.type, 0, true, true) + ArgumentListWrapping:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest.Arrangement$(context, dispatcher) + ArgumentListWrapping:NetworkUtils.kt$(responseString) + ArgumentListWrapping:NewConversationEventHandler.kt$NewConversationEventHandlerImpl$(event.conversation.id.toModel()) + ArgumentListWrapping:NewConversationEventHandler.kt$NewConversationEventHandlerImpl$(event.conversation.members.otherMembers.map { it.id.toModel() }.toSet()) + ArgumentListWrapping:NewConversationEventHandler.kt$NewConversationEventHandlerImpl$(event.conversationId, DateTimeUtil.currentInstant()) + ArgumentListWrapping:NewConversationEventHandlerTest.kt$NewConversationEventHandlerTest$(arrangement.newGroupConversationSystemMessagesCreator::conversationResolvedMembersAdded) + ArgumentListWrapping:NewConversationEventHandlerTest.kt$NewConversationEventHandlerTest$(arrangement.newGroupConversationSystemMessagesCreator::conversationStartedUnverifiedWarning) + ArgumentListWrapping:NewConversationEventHandlerTest.kt$NewConversationEventHandlerTest.Arrangement$(newGroupConversationSystemMessagesCreator::conversationReadReceiptStatus, fun1<ConversationResponse>()) + ArgumentListWrapping:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$( ConversationMemberDTO.Self( TestUser.SELF.id.toApi(), "wire_admin" ), emptyList() ) + ArgumentListWrapping:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$( TestConversation.ID, listOf(TestUser.OTHER.id), MessageContent.MemberChange.FailedToAdd.Type.Unknown ) + ArgumentListWrapping:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$(TestConversation.CONVERSATION.copy(type = Conversation.Type.GROUP)) + ArgumentListWrapping:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$(TestConversation.CONVERSATION_RESPONSE.copy(type = ConversationResponse.Type.ONE_TO_ONE)) + ArgumentListWrapping:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$(type = Conversation.Type.GROUP) + ArgumentListWrapping:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$(type = ConversationResponse.Type.ONE_TO_ONE) + ArgumentListWrapping:NewMessageEventHandlerTest.kt$NewMessageEventHandlerTest$( Either.Right( applicationMessage.copy( content = applicationMessage.content.copy(expiresAfterMillis = 123L) ) )) + ArgumentListWrapping:NotificationEventsResponseJson.kt$NotificationEventsResponseJson$( AppLockConfigDTO(true, 60), FeatureFlagStatusDTO.ENABLED ) + ArgumentListWrapping:ObfuscateUtil.kt$("qualified_id", "qualified_ids", "qualified_users", "content", "payload") + ArgumentListWrapping:ObserveClientDetailsUseCase.kt$ObserveClientDetailsUseCaseImpl$( { GetClientDetailsResult.Failure.Generic(it) }, { client -> provideClientId.invoke().getOrNull()?.let { currentClientId -> GetClientDetailsResult.Success(client, currentClientId.value == clientId.value) } ?: GetClientDetailsResult.Success(client, false) }) + ArgumentListWrapping:ObserveConversationAssetStatusesUseCase.kt$ObserveAssetStatusesUseCaseImpl$( { mapOf() }, { assetList -> assetList.associateBy { assetStatus -> assetStatus.id } }) + ArgumentListWrapping:ObserveConversationInteractionAvailabilityUseCase.kt$ObserveConversationInteractionAvailabilityUseCase$(dispatcher.io) + ArgumentListWrapping:ObserveConversationInteractionAvailabilityUseCase.kt$ObserveConversationInteractionAvailabilityUseCase$(failure) + ArgumentListWrapping:ObserveConversationListDetailsUseCaseTest.kt$ObserveConversationListDetailsUseCaseTest$(conversation = successConversation) + ArgumentListWrapping:ObserveConversationMembersUseCaseTest.kt$ObserveConversationMembersUseCaseTest$(Member(otherUser.id, Member.Role.Admin), Member(selfUser.id, Member.Role.Member)) + ArgumentListWrapping:ObserveConversationMembersUseCaseTest.kt$ObserveConversationMembersUseCaseTest$(listOf(Member(otherUser.id, Member.Role.Admin), Member(selfUser.id, Member.Role.Member))) + ArgumentListWrapping:ObserveConversationMembersUseCaseTest.kt$ObserveConversationMembersUseCaseTest$(otherUser.id, Member.Role.Admin) + ArgumentListWrapping:ObserveConversationMembersUseCaseTest.kt$ObserveConversationMembersUseCaseTest$(selfUser.id, Member.Role.Member) + ArgumentListWrapping:ObserveE2EIRequiredUseCase.kt$ObserveE2EIRequiredUseCaseImpl$(certificateResult.certificate) + ArgumentListWrapping:ObserveE2EIRequiredUseCaseTest.kt$ObserveE2EIRequiredUseCaseTest$(TestKaliumDispatcher.io) + ArgumentListWrapping:ObserveE2EIRequiredUseCaseTest.kt$ObserveE2EIRequiredUseCaseTest.Arrangement$(userConfigRepository, featureSupport, e2eiCertificate, currentClientIdProvider, testDispatcher) + ArgumentListWrapping:ObserveFileSharingStatusUseCase.kt$ObserveFileSharingStatusUseCaseImpl$("Storage Error : ${it.rootCause} in ObserveFileSharingStatusUseCase", it.rootCause) + ArgumentListWrapping:ObserveGuestRoomLinkFeatureFlagUseCase.kt$ObserveGuestRoomLinkFeatureFlagUseCaseImpl$("Storage Error : ${it.rootCause} in ObserveGuestRoomLinkFeatureFlagUseCase", it.rootCause) + ArgumentListWrapping:ObserveIfAppUpdateRequiredUseCase.kt$ObserveIfAppUpdateRequiredUseCaseImpl$(dtoCredentials) + ArgumentListWrapping:ObserveIsAppLockEditableUseCaseTest.kt$ObserveIsAppLockEditableUseCaseTest$(AccountInfo.Valid(TestUser.SELF.id), AccountInfo.Valid(TestUser.OTHER.id)) + ArgumentListWrapping:ObserveIsAppLockEditableUseCaseTest.kt$ObserveIsAppLockEditableUseCaseTest$(TestUser.OTHER.id) + ArgumentListWrapping:ObserveIsAppLockEditableUseCaseTest.kt$ObserveIsAppLockEditableUseCaseTest$(TestUser.SELF.id) + ArgumentListWrapping:ObserveIsAppLockEditableUseCaseTest.kt$ObserveIsAppLockEditableUseCaseTest$(flowOf(listOf(AccountInfo.Valid(TestUser.SELF.id), AccountInfo.Valid(TestUser.OTHER.id)))) + ArgumentListWrapping:ObserveIsAppLockEditableUseCaseTest.kt$ObserveIsAppLockEditableUseCaseTest$(listOf(AccountInfo.Valid(TestUser.SELF.id), AccountInfo.Valid(TestUser.OTHER.id))) + ArgumentListWrapping:ObserveIsAppLockEditableUseCaseTest.kt$ObserveIsAppLockEditableUseCaseTest.Arrangement$(userSessionScopeProvider::getOrCreate, KFunction2<UserId, UserSessionScope.() -> UserConfigRepository>()) + ArgumentListWrapping:ObserveIsSelfUserMemberUseCaseTest.kt$ObserveIsSelfUserMemberUseCaseTest.Arrangement$(any(), any()) + ArgumentListWrapping:ObserveIsSelfUserMemberUseCaseTest.kt$ObserveIsSelfUserMemberUseCaseTest.Arrangement$(conversationRepository) + ArgumentListWrapping:ObserveIsSelfUserMemberUseCaseTest.kt$ObserveIsSelfUserMemberUseCaseTest.Arrangement$(conversationRepository::observeIsUserMember) + ArgumentListWrapping:ObserveLegalHoldStateForSelfUserUseCaseTest.kt$ObserveLegalHoldStateForSelfUserUseCaseTest$("fingerprint".toByteArray()) + ArgumentListWrapping:ObserveMemberDetailsByIdsUseCaseTest.kt$ObserveMemberDetailsByIdsUseCaseTest$(list.size, 1) + ArgumentListWrapping:ObserveMessageReceiptsUseCase.kt$ObserveMessageReceiptsUseCaseImpl$("[ObserveMessageReceiptsUseCase] - Observing read receipts for " + "Conversation: ${conversationId.toLogString()}") + ArgumentListWrapping:ObserveNewClientsUseCaseTest.kt$ObserveNewClientsUseCaseTest$( NewClientResult.InOtherAccount( listOf(TestClient.CLIENT), TestUser.OTHER_USER_ID, TestUser.SELF.name, TestUser.SELF.handle ), awaitItem() ) + ArgumentListWrapping:ObserveNewClientsUseCaseTest.kt$ObserveNewClientsUseCaseTest.Arrangement$(classOf<UserClientRepositoryProvider>()) + ArgumentListWrapping:ObserveNewClientsUseCaseTest.kt$ObserveNewClientsUseCaseTest.Arrangement$(mock(classOf<UserClientRepositoryProvider>())) + ArgumentListWrapping:ObserveScreenshotCensoringConfigUseCaseTest.kt$ObserveScreenshotCensoringConfigUseCaseTest$(5L.toDuration(DurationUnit.MINUTES)) + ArgumentListWrapping:ObserveScreenshotCensoringConfigUseCaseTest.kt$ObserveScreenshotCensoringConfigUseCaseTest$(DurationUnit.MINUTES) + ArgumentListWrapping:ObserveScreenshotCensoringConfigUseCaseTest.kt$ObserveScreenshotCensoringConfigUseCaseTest$(TeamSelfDeleteTimer.Enforced(5L.toDuration(DurationUnit.MINUTES))) + ArgumentListWrapping:ObserveSecurityClassificationLabelUseCaseTest.kt$ObserveSecurityClassificationLabelUseCaseTest.Arrangement$( TestUser.OTHER.copy( UserId(uuid4().toString(), domain), expiresAt = expiresAt ), Conversation.Member.Role.Member ) + ArgumentListWrapping:ObserveSecurityClassificationLabelUseCaseTest.kt$ObserveSecurityClassificationLabelUseCaseTest.Arrangement$( observeConversationMembersUseCase, conversationRepository, userConfigRepository ) + ArgumentListWrapping:ObserveSelfDeletingMessagesUseCaseTest.kt$ObserveSelfDeletingMessagesUseCaseTest$(conversationId, SelfDeletionTimer.Enforced.ByGroup(conversationSettingsDuration)) + ArgumentListWrapping:ObserveSelfDeletingMessagesUseCaseTest.kt$ObserveSelfDeletingMessagesUseCaseTest$(conversationSettingsDuration) + ArgumentListWrapping:ObserveSelfDeletionTimerSettingsForConversationUseCase.kt$ObserveSelfDeletionTimerSettingsForConversationUseCaseImpl$(conversationDetailsEither, considerSelfUserSettings) + ArgumentListWrapping:ObserveSelfDeletionTimerSettingsForConversationUseCase.kt$ObserveSelfDeletionTimerSettingsForConversationUseCaseImpl$(it.userMessageTimer) + ArgumentListWrapping:ObserveSyncStateUseCase.kt$ObserveSyncStateUseCaseImpl$(slowSyncRepository.slowSyncStatus, incrementalSyncRepository.incrementalSyncState) + ArgumentListWrapping:ObserveSyncStateUseCaseTest.kt$ObserveSyncStateUseCaseTest$(TestKaliumDispatcher.default) + ArgumentListWrapping:ObserveUserInfoUseCase.kt$ObserveOtherUserResult$("ObserveOtherUserResult.toEither: one of the fields should not be null.") + ArgumentListWrapping:ObserveUserInfoUseCaseTest.kt$ObserveUserInfoUseCaseTest$(TestUser.OTHER.copy(userType = UserType.INTERNAL), (result as GetUserInfoResult.Success).otherUser) + ArgumentListWrapping:ObserveUserInfoUseCaseTest.kt$ObserveUserInfoUseCaseTest$(userType = UserType.INTERNAL) + ArgumentListWrapping:ObserveUsersTypingUseCase.kt$ObserveUsersTypingUseCaseImpl$(dispatcher.io) + ArgumentListWrapping:OnCloseCall.kt$OnCloseCall$("[OnCloseCall] -> ConversationId: ${conversationId.obfuscateId()} | callStatus: $callStatus") + ArgumentListWrapping:OnHttpRequestTest.kt$OnHttpRequestTest$(TestKaliumDispatcher.main) + ArgumentListWrapping:OnIncomingCall.kt$OnIncomingCall$(ConversationType.Conference, ConversationType.ConferenceMls) + ArgumentListWrapping:OnIncomingCall.kt$OnIncomingCall$(mappedConversationType) + ArgumentListWrapping:OnSendOTR.kt$OnSendOTR$(handle, calling, messageSender, callingScope, selfConversationIdProvider) + ArgumentListWrapping:OneOnOneMigrator.kt$OneOnOneMigratorImpl$(user.id, Conversation.Protocol.PROTEUS) + ArgumentListWrapping:OneOnOneProtocolSelectorTest.kt$OneOnOneProtocolSelectorTest$(Either.Right(TestUser.OTHER.copy(supportedProtocols = setOf(SupportedProtocol.PROTEUS)))) + ArgumentListWrapping:OneOnOneProtocolSelectorTest.kt$OneOnOneProtocolSelectorTest$(SupportedProtocol.PROTEUS) + ArgumentListWrapping:OneOnOneProtocolSelectorTest.kt$OneOnOneProtocolSelectorTest$(TestUser.OTHER.copy(supportedProtocols = setOf(SupportedProtocol.PROTEUS))) + ArgumentListWrapping:OneOnOneProtocolSelectorTest.kt$OneOnOneProtocolSelectorTest$(supportedProtocols = setOf(SupportedProtocol.PROTEUS)) + ArgumentListWrapping:OneOnOneResolverTest.kt$OneOnOneResolverTest$(TestUser.OTHER.copy(id = TestUser.OTHER_USER_ID), TestUser.OTHER.copy(id = TestUser.OTHER_USER_ID_2)) + ArgumentListWrapping:OneOnOneResolverTest.kt$OneOnOneResolverTest$(id = TestUser.OTHER_USER_ID) + ArgumentListWrapping:OneOnOneResolverTest.kt$OneOnOneResolverTest$(id = TestUser.OTHER_USER_ID_2) + ArgumentListWrapping:OnlyAffectedTestTask.kt$OnlyAffectedTestTask$(childProject.tasks .filter { it.name.equals(targetTestTask, true) } .map { task -> "${childProject.name}:${task.name}" }.toList() ) + ArgumentListWrapping:OnlyAffectedTestTask.kt$OnlyAffectedTestTask$(hasToRunAllTests, affectedModules.contains(it.name) && !ignoredModules.contains(it.name)) + ArgumentListWrapping:PendingProposalSchedulerTest.kt$PendingProposalSchedulerTest$(Arrangement.PROPOSAL_TIMER.groupID, Arrangement.PROPOSAL_TIMER.timestamp) + ArgumentListWrapping:PendingProposalSchedulerTest.kt$PendingProposalSchedulerTest$(ProposalTimer(TestConversation.GROUP_ID, Arrangement.INSTANT_NEAR_FUTURE)) + ArgumentListWrapping:PendingProposalSchedulerTest.kt$PendingProposalSchedulerTest$(TestConversation.GROUP_ID, Arrangement.INSTANT_NEAR_FUTURE) + ArgumentListWrapping:PendingProposalSchedulerTest.kt$PendingProposalSchedulerTest$(TestKaliumDispatcher.default) + ArgumentListWrapping:PendingProposalSchedulerTest.kt$PendingProposalSchedulerTest$(listOf(ProposalTimer(TestConversation.GROUP_ID, Arrangement.INSTANT_NEAR_FUTURE))) + ArgumentListWrapping:PersistNewSelfDeletionTimerUseCase.kt$PersistNewSelfDeletionTimerUseCaseImpl$(dispatcher.io) + ArgumentListWrapping:PocIntegrationTest.kt$PocIntegrationTest$(NetworkState.ConnectedWithInternet) + ArgumentListWrapping:PocIntegrationTest.kt$PocIntegrationTest$(NetworkState.ConnectedWithoutInternet) + ArgumentListWrapping:PocIntegrationTest.kt$PocIntegrationTest.Companion$( rootPath = "$HOME_DIRECTORY/.kalium/accounts-test", kaliumConfigs = KaliumConfigs( developmentApiEnabled = true, encryptProteusStorage = true, isMLSSupportEnabled = true, wipeOnDeviceRemoval = true, kaliumMockEngine = KaliumMockEngine(mockEngine = mockEngine), mockNetworkStateObserver = TestNetworkStateObserver.DEFAULT_TEST_NETWORK_STATE_OBSERVER ), "Wire Integration Tests" ) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(DATABASE, pgConfig.dbName) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(DRIVER, "postgresql") + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(Event(MonkeyId(event.monkey_index, event.team, event.client_id), Json.decodeFromString(event.event_data))) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(HOST, pgConfig.host) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(MonkeyId(event.monkey_index, event.team, event.client_id), Json.decodeFromString(event.event_data)) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(PASSWORD, pgConfig.password) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(PORT, PG_PORT) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(USER, pgConfig.username) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(event.event_data) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(event.monkey_index, event.team, event.client_id) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(execution.id) + ArgumentListWrapping:PostgresStorage.kt$PostgresStorage$(it.backend_config) + ArgumentListWrapping:PreKeyListMapper.kt$PreKeyListMapper$(listPrekeysResponse.failedToList ?.map { it.toModel() } ?: listOf()) + ArgumentListWrapping:PreKeyListMapperTest.kt$PreKeyListMapperTest$( "domA" to mapOf( "userA" to mapOf( "clientA" to PreKeyDTO(1, "keyA") ), "userB" to mapOf( "clientB" to PreKeyDTO(32, "key") ) ), "domB" to mapOf( "userB" to mapOf( "clientB" to PreKeyDTO(22, "keyC") ) ) ) + ArgumentListWrapping:PrekeyApiV0Test.kt$PrekeyApiV0Test$(VALID_GET_USERS_PREKEY_REQUEST.serializableData) + ArgumentListWrapping:PrekeyApiV4Test.kt$PrekeyApiV4Test$(VALID_GET_USERS_PREKEY_REQUEST.serializableData) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(UShort.MAX_VALUE) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(UShort.MAX_VALUE.toInt(), toByteArray(coreCrypto.proteusNewPrekey(UShort.MAX_VALUE))) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(coreCrypto.proteusLastErrorCode().toInt()) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(coreCrypto.proteusLastResortPrekeyId().toInt(), coreCrypto.proteusLastResortPrekey()) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(coreCrypto.proteusNewPrekey(UShort.MAX_VALUE)) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(coreCrypto.proteusSessionFromMessage(sessionId.value, toUByteList(message))) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(e.message, ProteusException.fromProteusCode(coreCrypto.proteusLastErrorCode().toInt()), e) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(message) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(preKeyCrypto.encodedData.decodeBase64Bytes()) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(sessionId.value, preKeyCrypto.encodedData.decodeBase64Bytes()) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(sessionId.value, toUByteList(message)) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$(sessionId.value, toUByteList(preKeyCrypto.encodedData.decodeBase64Bytes())) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl.Companion$(coreCrypto.proteusLastErrorCode().toInt()) + ArgumentListWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl.Companion$(e.message, ProteusException.fromProteusCode(coreCrypto.proteusLastErrorCode().toInt()), e.cause) + ArgumentListWrapping:ProteusClientCryptoBoxImpl.kt$ProteusClientCryptoBoxImpl$(defaultContext) + ArgumentListWrapping:ProteusClientCryptoBoxImpl.kt$ProteusClientCryptoBoxImpl$(sessionId.value, payload = message.toUint8Array(), preKeyBundle = preKeyBundle.toArrayBuffer()) + ArgumentListWrapping:ProteusClientTest.kt$ProteusClientTest$(aliceSessionId, missingAliceSessionId) + ArgumentListWrapping:ProteusClientTest.kt$ProteusClientTest$(message1.encodeToByteArray(), listOf(aliceSessionId, missingAliceSessionId)) + ArgumentListWrapping:ProteusMessageUnpacker.kt$ProteusMessageUnpackerImpl$("ΠΌΠ°Ρ‚Ρ€Ρ‘ΡˆΠΊΠ°! External message can't contain another external message inside!") + ArgumentListWrapping:ProteusMessageUnpackerTest.kt$ProteusMessageUnpackerTest$(PlainData(protobufExternalContent.encodeToByteArray()), aesKey) + ArgumentListWrapping:ProteusMessageUnpackerTest.kt$ProteusMessageUnpackerTest$(protobufExternalContent.encodeToByteArray()) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$( editMessageId = replacingMessageId, newContent = editContent.value.content, newMentions = mentions ) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$( quotedMessageId = it.quotedMessageId, quotedMessageSha256 = it.quotedMessageSha256?.array, isVerified = false ) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$( type = when (receiptContent.type) { ReceiptType.DELIVERED -> Confirmation.Type.DELIVERED ReceiptType.READ -> Confirmation.Type.READ }, firstMessageId = firstMessage, moreMessageIds = restOfMessageIds ) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$("External content when parsing protobuf. Message UUID = ${genericMessage.messageId.obfuscateId()}") + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$("Null content when parsing protobuf. Message UUID = ${genericMessage.messageId.obfuscateId()}") + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$(ByteArr(protoContent.otrKey), protoContent.sha256?.let { ByteArr(it) }, protoContent.encryptionAlgorithm?.let { encryptionAlgorithmMapper.toProtoBufModel(it) }) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$(Ephemeral(expireAfterMillis = expireAfterMillis, content = ephemeralContent)) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$(MessageDelete(messageId = readableContent.messageId)) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$(expireAfterMillis = expireAfterMillis, content = ephemeralContent) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$(genericMessage.messageId, external.otrKey.array, external.sha256?.array, algorithm) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$(messageId = readableContent.messageId) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$(protoContent.value.qualifiedConversationId, hiddenMessage.conversationId) + ArgumentListWrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$(protoContent.value.qualifiedConversationId, protoContent.value.conversationId) + ArgumentListWrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$( TEST_MESSAGE_UUID, GenericMessage.Content.Asset( Asset( original = Asset.Original( mimeType = "file/binary", size = mockedAsset.size.toLong(), name = assetName, ), status = Asset.Status.NotUploaded(Asset.NotUploaded.CANCELLED), ) ) ) + ArgumentListWrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$( TEST_MESSAGE_UUID, TEST_CONVERSATION_ID ) + ArgumentListWrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$( quotedMessageId = "quotedMessageId", quotedMessageSha256 = null, true ) + ArgumentListWrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$(MessageEdit(replacedMessageId, textContent)) + ArgumentListWrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$(TEST_MESSAGE_UUID, GenericMessage.Content.Edited(MessageEdit(replacedMessageId, textContent))) + ArgumentListWrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$(messageUid, otrKey.data, sha256, encryptionAlgorithm) + ArgumentListWrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$(replacedMessageId, textContent) + ArgumentListWrapping:QualifiedIdMapper.kt$QualifiedIdMapperImpl$(VALUE_DOMAIN_SEPARATOR) + ArgumentListWrapping:QualifiedIdMapper.kt$QualifiedIdMapperImpl$(VALUE_DOMAIN_SEPARATOR.toString()) + ArgumentListWrapping:QualifiedIdMapperTest.kt$QualifiedIdMapperTest$(selfUserId) + ArgumentListWrapping:QualifiedSendMessageRequestJson.kt$QualifiedSendMessageRequestJson$( MessageApi.Parameters.QualifiedDefaultParameters( sender = USER_1_CLIENT_1, externalBlob = "blob-id".toByteArray(), nativePush = true, recipients = mapOf(), transient = false, priority = MessagePriority.HIGH, messageOption = MessageApi.QualifiedMessageOption.IgnoreAll ), defaultParametersProvider ) + ArgumentListWrapping:ReactionDAO.kt$ReactionDAOImpl$( originalMessageId, conversationId, senderUserId, emoji, date ) + ArgumentListWrapping:ReactionDAO.kt$ReactionDAOImpl$(originalMessageId, conversationId, senderUserId) + ArgumentListWrapping:ReactionDAOTest.kt$ReactionDAOTest$(TEST_MESSAGE.id, TEST_MESSAGE.conversationId, SELF_USER_ID, "Date", expectedReactions) + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$( OTHER_USER.id, TEST_CONVERSATION.id, DateTimeUtil.currentInstant(), ReceiptTypeEntity.DELIVERY, listOf("SomeUnknownMessage") ) + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$( OTHER_USER.id, TEST_CONVERSATION.id, DateTimeUtil.currentInstant(), ReceiptTypeEntity.DELIVERY, listOf(TEST_MESSAGE.id) ) + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$( OTHER_USER.id, TEST_CONVERSATION.id, DateTimeUtil.currentInstant(), ReceiptTypeEntity.DELIVERY, listOf(otherMessageId) ) + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$( OTHER_USER.id, TEST_CONVERSATION.id, insertedInstant, ReceiptTypeEntity.DELIVERY, listOf(TEST_MESSAGE.id) ) + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$( SELF_USER_ID, TEST_CONVERSATION.id, DateTimeUtil.currentInstant(), ReceiptTypeEntity.DELIVERY, listOf(TEST_MESSAGE.id) ) + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$( SELF_USER_ID, TEST_CONVERSATION.id, DateTimeUtil.currentInstant(), ReceiptTypeEntity.READ, listOf(TEST_MESSAGE.id) ) + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$("SomeUnknownMessage") + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$(TEST_MESSAGE.id) + ArgumentListWrapping:ReceiptDAOTest.kt$ReceiptDAOTest$(otherMessageId) + ArgumentListWrapping:RegisterAccountRepositoryTest.kt$RegisterAccountRepositoryTest$(RegisterApi.ActivationParam.Email(email, code)) + ArgumentListWrapping:RegisterAccountRepositoryTest.kt$RegisterAccountRepositoryTest$(email, code) + ArgumentListWrapping:RegisterAccountRepositoryTest.kt$RegisterAccountRepositoryTest$(exactly = once) + ArgumentListWrapping:RegisterAccountRepositoryTest.kt$RegisterAccountRepositoryTest$(registerApi) + ArgumentListWrapping:RegisterAccountUseCaseTest.kt$RegisterAccountUseCaseTest$( param.email, param.emailActivationCode, param.name, param.password, param.teamName, param.teamIcon, param.cookieLabel ) + ArgumentListWrapping:RegisterAccountUseCaseTest.kt$RegisterAccountUseCaseTest$(expected.kaliumException, (actual.failure as NetworkFailure.ServerMiscommunication).kaliumException) + ArgumentListWrapping:RegisterAccountUseCaseTest.kt$RegisterAccountUseCaseTest$(param.email, param.emailActivationCode, param.name, param.password, param.cookieLabel) + ArgumentListWrapping:RegisterApi.kt$RegisterApi.ActivationParam.Email$(code = code, dryRun = dryRun, email = email, null, null, null) + ArgumentListWrapping:RegisterClientUseCaseTest.kt$RegisterClientUseCaseTest.Companion$("no internet") + ArgumentListWrapping:RegisterClientUseCaseTest.kt$RegisterClientUseCaseTest.Companion$(IOException("no internet")) + ArgumentListWrapping:RegisterClientUseCaseTest.kt$RegisterClientUseCaseTest.Companion$(KaliumException.GenericError(IOException("no internet"))) + ArgumentListWrapping:RegisterMLSClientUseCaseTest.kt$RegisterMLSClientUseCaseTest.Arrangement.Companion$( true, RANDOM_URL, DateTimeUtil.currentInstant() ) + ArgumentListWrapping:RegisterTokenJson.kt$RegisterTokenJson$( PushTokenBody( "8218398", "123456", "oaisjdoiasjd", "GCM" ), jsonProvider ) + ArgumentListWrapping:RemoteMonkey.kt$RemoteMonkey$( CREATE_CONVERSATION, CreateConversationRequest(name, monkeyList.map { it.monkeyType.userId() }, protocol, isDestroyable) ) + ArgumentListWrapping:RemoteMonkey.kt$RemoteMonkey$(ADD_MONKEY_TO_CONVERSATION, AddMonkeysRequest(conversationId, monkeys.map { it.monkeyType.userId() })) + ArgumentListWrapping:RemoteMonkey.kt$RemoteMonkey$(conversationId, monkeys.map { it.monkeyType.userId() }) + ArgumentListWrapping:RemoteMonkey.kt$RemoteMonkey$(monkeyConfig.wait) + ArgumentListWrapping:RemoteMonkey.kt$RemoteMonkey$(monkeyType, internalId) + ArgumentListWrapping:RemoteMonkey.kt$RemoteMonkey$(monkeyType.userData(), internalId) + ArgumentListWrapping:RemoteMonkey.kt$RemoteMonkey$(name, monkeyList.map { it.monkeyType.userId() }, protocol, isDestroyable) + ArgumentListWrapping:RemoveMemberFromGroupCommand.kt$RemoveMemberFromGroupCommand$(selectedConversation.id, selectedMember.id) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$( "-f", help = "Stop the application if an action fails, otherwise ignore and continue processing next events" ) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$( mustExist = true, mustBeReadable = true, canBeDir = false ) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$("-l", "--log-level", help = "log level") + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$("-s", help = "read from file or postgres") + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$(EventLogType.FILE) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$(FileStorageConfig(eventsLocation!!.absolutePath, teamsLocation!!.absolutePath)) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$(KaliumLogLevel.INFO) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$(PostgresStorageConfig(host, dbName, username, password), executionId) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$(eventsLocation != null && teamsLocation != null) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$(eventsLocation!!.absolutePath, teamsLocation!!.absolutePath) + ArgumentListWrapping:ReplayApplication.kt$ReplayApplication$(host, dbName, username, password) + ArgumentListWrapping:RequestActivationCodeJson.kt$RequestActivationCodeJson$( RegisterApi.RequestActivationCodeParam.Email(email = "user@domain.de"), jsonProvider ) + ArgumentListWrapping:RequestResponseEventAction.kt$RequestResponseEventAction$({}) + ArgumentListWrapping:ResetSessionUseCaseTest.kt$ResetSessionUseCaseTest$(testDispatchers.io) + ArgumentListWrapping:RestoreBackupResult.kt$RestoreBackupResult.BackupRestoreFailure.InvalidUserId$("User id in the backup file does not match the current user id") + ArgumentListWrapping:RestoreBackupUseCase.kt$RestoreBackupUseCaseImpl$("The provided backup version is lower than the minimum supported version") + ArgumentListWrapping:RestoreBackupUseCase.kt$RestoreBackupUseCaseImpl$(acceptedFileNames()) + ArgumentListWrapping:RestoreBackupUseCase.kt$RestoreBackupUseCaseImpl$(inputSource, extractedBackupRootPath, ExtractFilesParam.Only(acceptedFileNames()), kaliumFileSystem) + ArgumentListWrapping:RestoreBackupUseCaseTest.kt$RestoreBackupUseCaseTest.Arrangement$(listOf(source(metadataPath) to metadataPath.name, source(dbPath) to dbPath.name), outputSink) + ArgumentListWrapping:RestoreBackupUseCaseTest.kt$RestoreBackupUseCaseTest.Arrangement$(source(metadataPath) to metadataPath.name, source(dbPath) to dbPath.name) + ArgumentListWrapping:RestoreWebBackupUseCase.kt$RestoreWebBackupUseCaseImpl$(conversationMapper::fromMigrationModel) + ArgumentListWrapping:RestoreWebBackupUseCase.kt$RestoreWebBackupUseCaseImpl$(filePath) + ArgumentListWrapping:RestoreWebBackupUseCase.kt$RestoreWebBackupUseCaseImpl$(migratedConversations.map(conversationMapper::fromMigrationModel)) + ArgumentListWrapping:RetryFailedMessageUseCase.kt$RetryFailedMessageUseCase$(AssetTransferStatus.FAILED_UPLOAD, message.conversationId, message.id) + ArgumentListWrapping:RetryFailedMessageUseCase.kt$RetryFailedMessageUseCase$(AssetTransferStatus.UPLOAD_IN_PROGRESS, message.conversationId, message.id) + ArgumentListWrapping:RetryFailedMessageUseCase.kt$RetryFailedMessageUseCase$(content = MessageContent.Asset(value = uploadedAssetContent)) + ArgumentListWrapping:RetryFailedMessageUseCase.kt$RetryFailedMessageUseCase$(it, message.conversationId, message.id, type) + ArgumentListWrapping:RetryFailedMessageUseCase.kt$RetryFailedMessageUseCase$(value = uploadedAssetContent) + ArgumentListWrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$( matching { it is Message.Signaling // message edits are sent as signaling messages && it.id != message.id // when editing we need to generate and set a new id && it.content is MessageContent.TextEdited && (it.content as MessageContent.TextEdited).editMessageId == message.id // original id in edited content }, anything() ) + ArgumentListWrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$(Either.Left(NetworkFailure.ServerMiscommunication(TestNetworkException.missingAuth))) + ArgumentListWrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$(NetworkFailure.ServerMiscommunication(TestNetworkException.missingAuth)) + ArgumentListWrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$(TEST_DATE_STRING) + ArgumentListWrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$(TestNetworkException.missingAuth) + ArgumentListWrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$(status = Message.Status.Failed, editStatus = Message.EditStatus.Edited(TEST_DATE_STRING)) + ArgumentListWrapping:SSOInitiateLoginUseCase.kt$SSOInitiateLoginUseCaseImpl$( validUuid, redirects.success, redirects.error ) + ArgumentListWrapping:SSOInitiateLoginUseCaseTest.kt$SSOInitiateLoginUseCaseTest$(TEST_UUID, expectedRedirects.success, expectedRedirects.error) + ArgumentListWrapping:SSOInitiateLoginUseCaseTest.kt$SSOInitiateLoginUseCaseTest$(ssoLoginRepository) + ArgumentListWrapping:SSOLoginRepositoryTest.kt$SSOLoginRepositoryTest$( DomainLookupResult( networkResponse.configJsonUrl, networkResponse.webappWelcomeUrl ), actual.value ) + ArgumentListWrapping:SSOLoginScope.kt$SSOLoginScope$(ssoLoginRepository, proxyCredentials) + ArgumentListWrapping:SaveMessageDraftUseCase.kt$SaveMessageDraftUseCaseImpl$(dispatcher.io) + ArgumentListWrapping:ScheduleNewAssetMessageUseCase.kt$ScheduleNewAssetMessageUseCaseImpl$(generatedAssetUuid, tempAssetDomain, assetDataPath, assetDataSize, assetName.fileExtension()) + ArgumentListWrapping:ScheduleNewAssetMessageUseCase.kt$ScheduleNewAssetMessageUseCaseImpl$(it, conversationId, message.id, TYPE) + ArgumentListWrapping:ScheduleNewAssetMessageUseCaseTest.kt$ScheduleNewAssetMessageUseCaseTest$( matching { it == AssetTransferStatus.FAILED_UPLOAD }, any(), any() ) + ArgumentListWrapping:ScheduleNewAssetMessageUseCaseTest.kt$ScheduleNewAssetMessageUseCaseTest$( matching { it == AssetTransferStatus.UPLOADED }, any(), any() ) + ArgumentListWrapping:ScheduleNewAssetMessageUseCaseTest.kt$ScheduleNewAssetMessageUseCaseTest$(testDispatcher.default) + ArgumentListWrapping:ScheduleNewAssetMessageUseCaseTest.kt$ScheduleNewAssetMessageUseCaseTest.Arrangement$(classOf<ObserveSelfDeletionTimerSettingsForConversationUseCase>()) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$( MemberEntity( connectedPartOfConversation1.id, MemberEntity.Role.Member ), conversationToExclude.id ) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$( MemberEntity( connectedPartOfConversation2.id, MemberEntity.Role.Member ), conversationToExclude.id ) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$( MemberEntity( connectedUser1.id, MemberEntity.Role.Member ), conversation.id ) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(connectionStatus = ConnectionEntity.State.ACCEPTED) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(connectionStatus = ConnectionEntity.State.ACCEPTED, deleted = true) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(connectionStatus = ConnectionEntity.State.MISSING_LEGALHOLD_CONSENT) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(connectionStatus = ConnectionEntity.State.NOT_CONNECTED) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(handle = "qwerty", connectionStatus = ConnectionEntity.State.ACCEPTED) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(handle = "searchQuery", connectionStatus = ConnectionEntity.State.ACCEPTED) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(handle = searchQuery, connectionStatus = ConnectionEntity.State.ACCEPTED) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(id = "1") + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(id = "2") + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(id = "connectedUser1") + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(id = "connectedUser2") + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(id = "deletedUser") + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(id = "missingLeaseholdConsentUser") + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(id = "notConnectedUser") + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(name = "qwerty", connectionStatus = ConnectionEntity.State.ACCEPTED) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(name = "searchQuery", connectionStatus = ConnectionEntity.State.ACCEPTED) + ArgumentListWrapping:SearchDAOTest.kt$SearchDAOTest$(name = searchQuery, connectionStatus = ConnectionEntity.State.ACCEPTED) + ArgumentListWrapping:SearchUserRepositoryTest.kt$SearchUserRepositoryTest$(NetworkResponse.Success(USER_RESPONSE.copy(usersFound = emptyList()), mapOf(), 200)) + ArgumentListWrapping:SearchUserRepositoryTest.kt$SearchUserRepositoryTest$(TEST_QUERY, TEST_DOMAIN, null, SearchUsersOptions.Default) + ArgumentListWrapping:SearchUserRepositoryTest.kt$SearchUserRepositoryTest$(TEST_QUERY, selfUser.id.domain, null, SearchUsersOptions.Default) + ArgumentListWrapping:SearchUserRepositoryTest.kt$SearchUserRepositoryTest$(USER_RESPONSE.copy(usersFound = emptyList()), mapOf(), 200) + ArgumentListWrapping:SearchUserRepositoryTest.kt$SearchUserRepositoryTest$(usersFound = emptyList()) + ArgumentListWrapping:SearchUsersUseCase.kt$SearchUsersUseCase$(emptyList()) + ArgumentListWrapping:SearchUsersUseCase.kt$SearchUsersUseCase$(excludingMembersOfConversation) + ArgumentListWrapping:SelfConversationIdProviderTest.kt$SelfConversationIdProviderTest$(Arrangement.PROTEUS_SELF_CONVERSATION_ID, Arrangement.MLS_SELF_CONVERSATION_ID) + ArgumentListWrapping:SelfConversationIdProviderTest.kt$SelfConversationIdProviderTest$(listOf(Arrangement.PROTEUS_SELF_CONVERSATION_ID, Arrangement.MLS_SELF_CONVERSATION_ID), it.value) + ArgumentListWrapping:SendBrokenAssetMessageUseCaseImpl.kt$SendBrokenAssetMessageUseCaseImpl$(AssetTransferStatus.UPLOADED, message.conversationId, message.id) + ArgumentListWrapping:SendBrokenAssetMessageUseCaseImpl.kt$SendBrokenAssetMessageUseCaseImpl$(AssetTransferStatus.UPLOAD_IN_PROGRESS, conversationId, generatedMessageUuid) + ArgumentListWrapping:SendButtonMessageCaseTest.kt$SendButtonMessageCaseTest.Arrangement$(classOf<MessageSendFailureHandler>()) + ArgumentListWrapping:SendButtonMessageCaseTest.kt$SendButtonMessageCaseTest.Arrangement$(mock(classOf<MessageSendFailureHandler>())) + ArgumentListWrapping:SendButtonMessageUseCase.kt$SendButtonMessageUseCase$(it, it, false) + ArgumentListWrapping:SendDirectMessageEventAction.kt$SendDirectMessageEventAction$( UserCount.single(), 1u, 1u ) + ArgumentListWrapping:SendEditTextMessageUseCase.kt$SendEditTextMessageUseCase$(it, conversationId, originalMessageId, TYPE) + ArgumentListWrapping:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest$(TestConversation.ID, originalMessageId, editedMessageText, listOf(), editedMessageId) + ArgumentListWrapping:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest.Arrangement$(classOf<MessageSendFailureHandler>()) + ArgumentListWrapping:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest.Arrangement$(mock(classOf<MessageSendFailureHandler>())) + ArgumentListWrapping:SendKnockUseCase.kt$SendKnockUseCase$(dispatcher.io) + ArgumentListWrapping:SendKnockUseCase.kt$SendKnockUseCase$(it, conversationId, generatedMessageUuid, TYPE) + ArgumentListWrapping:SendKnockUserCaseTest.kt$SendKnockUserCaseTest.Arrangement$(classOf<MessageSendFailureHandler>()) + ArgumentListWrapping:SendKnockUserCaseTest.kt$SendKnockUserCaseTest.Arrangement$(mock(classOf<MessageSendFailureHandler>())) + ArgumentListWrapping:SendLocationUseCase.kt$SendLocationUseCase$(it, conversationId, generatedMessageUuid, TYPE) + ArgumentListWrapping:SendLocationUseCaseTest.kt$SendLocationUseCaseTest.Arrangement$(classOf<MessageSendFailureHandler>()) + ArgumentListWrapping:SendLocationUseCaseTest.kt$SendLocationUseCaseTest.Arrangement$(mock(classOf<MessageSendFailureHandler>())) + ArgumentListWrapping:SendMessageAction.kt$SendMessageAction$(Event(monkeySender.internalId, EventType.SendDirectMessage(monkeyReceiver.internalId))) + ArgumentListWrapping:SendMessageAction.kt$SendMessageAction$(conversationPool.getFromPrefixed(target).map { it to it.randomMonkeys(this.config.userCount) }) + ArgumentListWrapping:SendMessageAction.kt$SendMessageAction$(conversationPool.randomConversations(this.config.countGroups) .map { it to it.randomMonkeys(this.config.userCount) }) + ArgumentListWrapping:SendMessageAction.kt$SendMessageAction$(monkeyPool.randomLoggedInMonkeys(this.config.userCount).map { it to it.randomPeer(monkeyPool) }) + ArgumentListWrapping:SendMessageAction.kt$SendMessageAction$(monkeyReceiver.internalId) + ArgumentListWrapping:SendMessageAction.kt$SendMessageAction$(monkeySender.internalId, EventType.SendDirectMessage(monkeyReceiver.internalId)) + ArgumentListWrapping:SendMessageAction.kt$SendMessageAction$(target) + ArgumentListWrapping:SendMessageAction.kt$SendMessageAction$(this.config.userCount) + ArgumentListWrapping:SendMessageEventAction.kt$SendMessageEventAction$( UserCount.single(), 1u, 1u ) + ArgumentListWrapping:SendMessagePartialFailureMapperTest.kt$SendMessagePartialFailureMapperTest$( MessageSent("2022-04-21T20:56:22.393Z", listOf(TEST_USER_ID, OTHER_USER_ID_2)), mapper.fromDTO(RESULT_DTO) ) + ArgumentListWrapping:SendMessagePartialFailureMapperTest.kt$SendMessagePartialFailureMapperTest$("2022-04-21T20:56:22.393Z", emptyList(), expectedUsersFailedToSend.map { it.toApi() }) + ArgumentListWrapping:SendMessageRequestJson.kt$SendMessageRequestJson$( MessageApi.Parameters.DefaultParameters( sender = "sender-client-it", data = null, nativePush = true, recipients = recipients, transient = false, priority = MessagePriority.LOW ), defaultParametersProvider ) + ArgumentListWrapping:SendRequestAction.kt$SendRequestAction$(Event(it.internalId, EventType.RequestResponse(origin.internalId, this.config.shouldAccept))) + ArgumentListWrapping:SendRequestAction.kt$SendRequestAction$(it.internalId, EventType.RequestResponse(origin.internalId, this.config.shouldAccept)) + ArgumentListWrapping:SendRequestAction.kt$SendRequestAction$(origin.internalId, this.config.shouldAccept) + ArgumentListWrapping:SendTextMessageCaseTest.kt$SendTextMessageCaseTest.Arrangement$(ObserveSelfDeletionTimerSettingsForConversationUseCase::class) + ArgumentListWrapping:SendTextMessageCaseTest.kt$SendTextMessageCaseTest.Arrangement$(classOf<MessageSendFailureHandler>()) + ArgumentListWrapping:SendTextMessageCaseTest.kt$SendTextMessageCaseTest.Arrangement$(mock(classOf<MessageSendFailureHandler>())) + ArgumentListWrapping:SendTypingEventUseCaseTest.kt$SendTypingEventUseCaseTest.Arrangement$(TypingIndicatorOutgoingRepository::class) + ArgumentListWrapping:ServerConfig.kt$ServerConfigMapperImpl$( federation = metaData.federation, apiVersion = metaData.commonApiVersion.version, domain = metaData.domain ) + ArgumentListWrapping:ServerConfig.kt$ServerConfigMapperImpl$( federation = metaData.federation, commonApiVersion = apiVersionMapper.toDTO(metaData.apiVersion), domain = metaData.domain ) + ArgumentListWrapping:ServerConfig.kt$ServerConfigMapperImpl$(metaData.apiVersion) + ArgumentListWrapping:ServerConfig.kt$ServerConfigMapperImpl$(metaData.federation, metaData.apiVersion.toCommonApiVersionType(), metaData.domain) + ArgumentListWrapping:ServerConfig.kt$ServerConfigMapperImpl$(serverConfigEntityLinks) + ArgumentListWrapping:ServerConfigMapperTest.kt$ServerConfigMapperTest$(1) + ArgumentListWrapping:ServerConfigMapperTest.kt$ServerConfigMapperTest$(SERVER_CONFIG_TEST.metaData.commonApiVersion) + ArgumentListWrapping:ServerConfigMapperTest.kt$ServerConfigMapperTest$(versionMapper) + ArgumentListWrapping:ServerConfigRepositoryTest.kt$ServerConfigRepositoryTest$(1) + ArgumentListWrapping:ServerConfigRepositoryTest.kt$ServerConfigRepositoryTest$(false, CommonApiVersionType.Unknown, "domain") + ArgumentListWrapping:ServerConfigRepositoryTest.kt$ServerConfigRepositoryTest$(metaData = ServerConfig.MetaData(false, CommonApiVersionType.Unknown, "domain")) + ArgumentListWrapping:ServerConfigurationDAO.kt$ServerConfigurationDAOImpl$(date, mapper::serverConfigWithAccId) + ArgumentListWrapping:ServerConfigurationDAO.kt$ServerConfigurationDAOImpl$(queriesContext) + ArgumentListWrapping:SessionEstablisher.kt$SessionEstablisherImpl$(client.value) + ArgumentListWrapping:SessionEstablisher.kt$SessionEstablisherImpl$(idMapper.toCryptoQualifiedIDId(recipientUserId), CryptoClientId(client.value)) + ArgumentListWrapping:SessionEstablisher.kt$SessionEstablisherImpl$(recipientUserId) + ArgumentListWrapping:SessionEstablisherTest.kt$SessionEstablisherTest$(CryptoSessionId(CryptoUserID(TEST_USER_ID_1.value, TEST_USER_ID_1.domain), CryptoClientId(TEST_CLIENT_ID_1.value))) + ArgumentListWrapping:SessionEstablisherTest.kt$SessionEstablisherTest$(CryptoUserID(TEST_USER_ID_1.value, TEST_USER_ID_1.domain), CryptoClientId(TEST_CLIENT_ID_1.value)) + ArgumentListWrapping:SessionEstablisherTest.kt$SessionEstablisherTest$(TEST_CLIENT_ID_1.value) + ArgumentListWrapping:SessionEstablisherTest.kt$SessionEstablisherTest$(TEST_USER_ID_1.domain to mapOf(TEST_USER_ID_1.value to mapOf(TEST_CLIENT_ID_1.value to preKey))) + ArgumentListWrapping:SessionEstablisherTest.kt$SessionEstablisherTest$(TEST_USER_ID_1.value, TEST_USER_ID_1.domain) + ArgumentListWrapping:SessionEstablisherTest.kt$SessionEstablisherTest$(eq(CryptoSessionId(CryptoUserID(TEST_USER_ID_1.value, TEST_USER_ID_1.domain), CryptoClientId(TEST_CLIENT_ID_1.value)))) + ArgumentListWrapping:SessionManagerExt.kt$("getProxyCredentials: Proxy has username: ${cred?.username?.isNotBlank()}; has password ${cred?.password?.isNotBlank()}") + ArgumentListWrapping:SessionManagerImpl.kt$SessionManagerImpl$( { logout(LogoutReason.SESSION_EXPIRED) null }, { session -> session } ) + ArgumentListWrapping:SessionResetSenderTest.kt$SessionResetSenderTest$(testDispatchers.io) + ArgumentListWrapping:SetUserHandleUseCase.kt$SetUserHandleUseCase$( { if (it is NetworkFailure.ServerMiscommunication && it.kaliumException is KaliumException.InvalidRequestError) handleSpecificError(it.kaliumException) else SetUserHandleResult.Failure.Generic(it) }, { if (syncManager.isSlowSyncCompleted()) accountRepository.updateLocalSelfUserHandle(handleState.handle) SetUserHandleResult.Success } ) + ArgumentListWrapping:SetUserHandleUseCase.kt$SetUserHandleUseCase$(error) + ArgumentListWrapping:SetUserHandleUseCase.kt$SetUserHandleUseCase$(handleState.handle) + ArgumentListWrapping:ShouldRemoteMuteCheckerTest.kt$ShouldRemoteMuteCheckerTest.Companion$( OTHER_USER_ID, Conversation.Member.Role.Admin ) + ArgumentListWrapping:SlowSyncManager.kt$SlowSyncManager$(MIN_RETRY_DELAY, MAX_RETRY_DELAY) + ArgumentListWrapping:SlowSyncManagerTest.kt$SlowSyncManagerTest$(TestKaliumDispatcher.default) + ArgumentListWrapping:SlowSyncManagerTest.kt$SlowSyncManagerTest.Arrangement$(classOf<SlowSyncRepository>()) + ArgumentListWrapping:SlowSyncManagerTest.kt$SlowSyncManagerTest.Arrangement$(mock(classOf<SlowSyncRepository>())) + ArgumentListWrapping:SlowSyncRepositoryTest.kt$SlowSyncRepositoryTest$(testDispatcher) + ArgumentListWrapping:SlowSyncWorker.kt$SlowSyncWorkerImpl$(SlowSyncStep.RESOLVE_ONE_ON_ONE_PROTOCOLS, oneOnOneResolver::resolveAllOneOnOneConversations) + ArgumentListWrapping:SlowSyncWorkerTest.kt$SlowSyncWorkerTest$(TestKaliumDispatcher.default) + ArgumentListWrapping:SlowSyncWorkerTest.kt$SlowSyncWorkerTest.Arrangement$(UpdateSelfUserSupportedProtocolsUseCase::class) + ArgumentListWrapping:StartCallUseCaseTest.kt$StartCallUseCaseTest.Arrangement$( lazy { callManager }, syncManager, kaliumConfigs, callRepository, answerCall ) + ArgumentListWrapping:StoreServerConfigUseCaseTest.kt$StoreServerConfigUseCaseTest.Arrangement$( customServerConfigRepository::storeConfig, fun2<ServerConfig.Links, ServerConfig.VersionInfo>()) + ArgumentListWrapping:SyncFeatureConfigsUseCaseTest.kt$SyncFeatureConfigsUseCaseTest$(Either.Left(NetworkFailure.ServerMiscommunication(operationDeniedException))) + ArgumentListWrapping:SyncFeatureConfigsUseCaseTest.kt$SyncFeatureConfigsUseCaseTest$(NetworkFailure.ServerMiscommunication(operationDeniedException)) + ArgumentListWrapping:SyncFeatureConfigsUseCaseTest.kt$SyncFeatureConfigsUseCaseTest$(operationDeniedException) + ArgumentListWrapping:SyncFeatureConfigsUseCaseTest.kt$SyncFeatureConfigsUseCaseTest.Arrangement$( status, isStatusChanged ) + ArgumentListWrapping:SyncFeatureConfigsUseCaseTest.kt$SyncFeatureConfigsUseCaseTest.Arrangement$(classOf<UpdateSupportedProtocolsAndResolveOneOnOnesUseCase>()) + ArgumentListWrapping:SyncManager.kt$SyncManagerImpl$("Waiting until or failure. Current status: slowSync: $slowSyncState; incrementalSync: $incrementalSyncState") + ArgumentListWrapping:SyncManagerTest.kt$SyncManagerTest$(CoreFailure.MissingClientRegistration) + ArgumentListWrapping:SyncManagerTest.kt$SyncManagerTest$(IncrementalSyncStatus.FetchingPendingEvents) + ArgumentListWrapping:SyncManagerTest.kt$SyncManagerTest$(SlowSyncStatus.Failed(CoreFailure.MissingClientRegistration)) + ArgumentListWrapping:SyncManagerTest.kt$SyncManagerTest.Arrangement$( slowSyncRepository, incrementalSyncRepository ) + ArgumentListWrapping:TeamEventReceiverTest.kt$TeamEventReceiverTest.Arrangement$( userRepository, persistMessageUseCase, TestUser.USER_ID ) + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$("clientId") + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$("teamId") + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$(1, "key") + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$(500, "error_message", "error_label") + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$(ErrorResponse(500, "error_message", "error_label")) + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$(KaliumException.ServerError(ErrorResponse(500, "error_message", "error_label"))) + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$(LegalHoldStatusDTO.PENDING, ClientIdDTO("clientId"), LastPreKeyDTO(1, "key")) + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$(NetworkResponse.Error(KaliumException.ServerError(ErrorResponse(500, "error_message", "error_label")))) + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest$(teamId = TeamId("teamId"), userDomain = "userDomain", limit, pageSize = pageSize) + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest.Arrangement$(NetworkResponse.Success(value = SERVICE_DETAILS_RESPONSE, headers = mapOf(), httpCode = 200)) + ArgumentListWrapping:TeamRepositoryTest.kt$TeamRepositoryTest.Arrangement$(value = SERVICE_DETAILS_RESPONSE, headers = mapOf(), httpCode = 200) + ArgumentListWrapping:TestConversation.kt$TestConversation$(ConversationEntity.AccessRole.NON_TEAM_MEMBER, ConversationEntity.AccessRole.TEAM_MEMBER) + ArgumentListWrapping:TestDataImporter.kt$( "action" to "login", "email" to email ) + ArgumentListWrapping:TestDataImporter.kt$( "config" to mapOf( "allowedCipherSuites" to listOf(1), "defaultCipherSuite" to 1, "defaultProtocol" to "proteus", "protocolToggleUsers" to listOf<String>(), "supportedProtocols" to listOf("mls", "proteus") ), "status" to "enabled" ) + ArgumentListWrapping:TestDataImporter.kt$( "email" to email, "name" to ownerName, "password" to backendConfig.passwordForUsers, "email_code" to code, "team" to mapOf( "name" to backendConfig.teamName, "icon" to "default", "binding" to true ) ) + ArgumentListWrapping:TestDataImporter.kt$( "email" to email, "name" to userName, "password" to userPassword, "team_code" to invitationCode ) + ArgumentListWrapping:TestDataImporter.kt$( "email" to email, "password" to password, "label" to "", "verification_code" to secondFactor ) + ArgumentListWrapping:TestDataImporter.kt$( "status" to "disabled", "ttl" to "unlimited" ) + ArgumentListWrapping:TestDataImporter.kt$("Owner $email (id $userId) of team ${backendConfig.teamName} (id: $teamId) in backend ${backendConfig.domain}") + ArgumentListWrapping:TestDataImporter.kt$(OkHttp.create()) + ArgumentListWrapping:TestDataImporter.kt$(userData.email, userData.userId) + ArgumentListWrapping:TestDataImporter.kt$TestDataImporter$( user.email, backendConfig.passwordForUsers, UserId(user.unqualifiedId, backendConfig.domain), team, null ) + ArgumentListWrapping:TestDataImporter.kt$TestDataImporter$(it, team, backendConfig.passwordForUsers) + ArgumentListWrapping:TestDataImporter.kt$TestDataImporter$(user.unqualifiedId, backendConfig.domain) + ArgumentListWrapping:TestDatabaseManipulation.kt$("test_db_secret".toByteArray()) + ArgumentListWrapping:TestDatabaseManipulation.kt$(ApplicationProvider.getApplicationContext(), GlobalDatabaseSecret("test_db_secret".toByteArray())) + ArgumentListWrapping:TestEvent.kt$TestEvent$( eventId, TestClient.CLIENT ) + ArgumentListWrapping:ToggleReactionUseCase.kt$ToggleReactionUseCase$(messageId = messageId, emojiSet = currentReactions - removedReaction) + ArgumentListWrapping:ToggleReactionUseCaseTest.kt$ToggleReactionUseCaseTest.Arrangement$(TEST_CURRENT_CLIENT) + ArgumentListWrapping:TriggerBuffer.kt$TriggerBuffer$(extraBufferCapacity = 1, onBufferOverflow = BufferOverflow.DROP_OLDEST) + ArgumentListWrapping:TypingIndicatorHandlerTest.kt$TypingIndicatorHandlerTest.Arrangement$(TypingIndicatorIncomingRepository::class) + ArgumentListWrapping:TypingIndicatorOutgoingRepository.kt$TypingIndicatorOutgoingRepositoryImpl$(conversationId) + ArgumentListWrapping:TypingIndicatorOutgoingRepositoryTest.kt$TypingIndicatorOutgoingRepositoryTest$(conversationOne, Conversation.TypingIndicatorMode.STARTED) + ArgumentListWrapping:TypingIndicatorOutgoingRepositoryTest.kt$TypingIndicatorOutgoingRepositoryTest$(conversationOne, Conversation.TypingIndicatorMode.STOPPED) + ArgumentListWrapping:UnreadEventMapper.kt$UnreadEventMapper$(conversationId = conversationId, unreadEvents = mapOf<UnreadEventTypeEntity, Int>() .plus(UnreadEventTypeEntity.KNOCK to (knocksCount?.toInt() ?: 0)) .plus(UnreadEventTypeEntity.MISSED_CALL to (missedCallsCount?.toInt() ?: 0)) .plus(UnreadEventTypeEntity.MENTION to (mentionsCount?.toInt() ?: 0)) .plus(UnreadEventTypeEntity.REPLY to (repliesCount?.toInt() ?: 0)) .plus(UnreadEventTypeEntity.MESSAGE to (messagesCount?.toInt() ?: 0)) .filterValues { it > 0 } ) + ArgumentListWrapping:UpdateConversationAccessUseCaseTest.kt$UpdateConversationAccessUseCaseTest$( Conversation.AccessRole.TEAM_MEMBER, Conversation.AccessRole.SERVICE, Conversation.AccessRole.GUEST ) + ArgumentListWrapping:UpdateConversationAccessUseCaseTest.kt$UpdateConversationAccessUseCaseTest$(guestAllowed = false, servicesAllowed = true, nonTeamMembersAllowed = true) + ArgumentListWrapping:UpdateConversationAccessUseCaseTest.kt$UpdateConversationAccessUseCaseTest$(guestAllowed = true, servicesAllowed = true, nonTeamMembersAllowed = true) + ArgumentListWrapping:UpdateConversationArchivedStatusUseCase.kt$UpdateConversationArchivedStatusUseCaseImpl$(conversationId, shouldArchiveConversation, archivedStatusTimestamp) + ArgumentListWrapping:UpdateConversationArchivedStatusUseCaseTest.kt$UpdateConversationArchivedStatusUseCaseTest$(conversationId, isConversationArchived, onlyLocally, archivedStatusTimestamp) + ArgumentListWrapping:UpdateConversationMutedStatusUseCase.kt$UpdateConversationMutedStatusUseCaseImpl$("Something went wrong when updating the convId: " + "(${conversationId.toLogString()}) to (${mutedConversationStatus.status}") + ArgumentListWrapping:UpdateConversationMutedStatusUseCase.kt$UpdateConversationMutedStatusUseCaseImpl$(conversationId, mutedConversationStatus, mutedStatusTimestamp) + ArgumentListWrapping:UpdateConversationReceiptModeUseCaseTest.kt$UpdateConversationReceiptModeUseCaseTest.Arrangement$( conversationRepository, persistMessage, selfUserId ) + ArgumentListWrapping:UpdateCurrentSessionUseCaseTest.kt$UpdateCurrentSessionUseCaseTest$(classOf<SessionRepository>()) + ArgumentListWrapping:UpdateCurrentSessionUseCaseTest.kt$UpdateCurrentSessionUseCaseTest$(mock(classOf<SessionRepository>())) + ArgumentListWrapping:UpdateEmailUseCaseTest.kt$UpdateEmailUseCaseTest$(IOException()) + ArgumentListWrapping:UpdateEmailUseCaseTest.kt$UpdateEmailUseCaseTest$(KaliumException.GenericError(IOException())) + ArgumentListWrapping:UpdateEmailUseCaseTest.kt$UpdateEmailUseCaseTest$(NetworkFailure.ServerMiscommunication(KaliumException.GenericError(IOException()))) + ArgumentListWrapping:UpdateSelfUserSupportedProtocolsUseCase.kt$UpdateSelfUserSupportedProtocolsUseCaseImpl$(supportedProtocols, migrationConfiguration, selfClients, currentClientId) + ArgumentListWrapping:UploadUserAvatarUseCaseTest.kt$UploadUserAvatarUseCaseTest.Arrangement$(userRepository, assetRepository) + ArgumentListWrapping:UserConfigRepository.kt$UserConfigDataSource$(duration.inWholeMilliseconds) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( "3", "someDomain" ) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( conversationId, listOf( MemberEntity( user = QualifiedIDEntity( "3", "someDomain" ), role = MemberEntity.Role.Admin ) ) ) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( conversationId, listOf( MemberEntity( user = user1.id, role = MemberEntity.Role.Admin ), MemberEntity( user = user2.id, role = MemberEntity.Role.Member ), ) ) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( memberList = members, conversationID = conversationIDEntity ) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( user = QualifiedIDEntity( "3", "someDomain" ), role = MemberEntity.Role.Admin ) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( user = user1.id, role = MemberEntity.Role.Admin ) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( user = user2.id, role = MemberEntity.Role.Member ) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$("3", "someDomain") + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$(QualifiedIDEntity("3", "someDomain")) + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$(email = "emailMatch") + ArgumentListWrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$(handle = "handleMatch") + ArgumentListWrapping:UserDAOImpl.kt$UserDAOImpl$(listOf(qualifiedID)) + ArgumentListWrapping:UserDAOImpl.kt$UserDAOImpl$(qualifiedID) + ArgumentListWrapping:UserDAOImpl.kt$UserDAOImpl$(queriesContext) + ArgumentListWrapping:UserDAOImpl.kt$UserDAOImpl$(searchQuery, connectionStates) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$("conversationId", "domain") + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$("conversationId1on1", "domain") + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$("newActiveOneOnOneConversationId", "newActiveOneOnOneConversationDomain") + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(ConnectionEntity.State.ACCEPTED) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(commonEmailPrefix, listOf(ConnectionEntity.State.ACCEPTED)) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(commonPrefix, listOf(ConnectionEntity.State.ACCEPTED)) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(dispatcher) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(id = ConversationIDEntity("conversationId", "domain")) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(id = ConversationIDEntity("conversationId1on1", "domain")) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(name = "other name to make sure this one wasn't inserted nor edited") + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(type = ConversationEntity.Type.GROUP) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(type = ConversationEntity.Type.ONE_ON_ONE) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(user1.copy(name = "other name to make sure this one wasn't inserted nor edited"), user2) + ArgumentListWrapping:UserDAOTest.kt$UserDAOTest$(user1.name!!, listOf(ConnectionEntity.State.ACCEPTED)) + ArgumentListWrapping:UserDTOJson.kt$UserDTOJson$( SelfUserDTO( id = UserId("user_id", "domain.com"), name = "user_name_123", accentId = 2, assets = listOf(), deleted = null, email = null, handle = null, service = null, teamId = null, expiresAt = "", nonQualifiedId = "", locale = "", managedByDTO = null, phone = null, ssoID = null, supportedProtocols = null ), jsonProvider ) + ArgumentListWrapping:UserDatabaseDataGenerator.kt$UserDatabaseDataGenerator$(ConversationEntity.Access.values()[index % ConversationEntity.Access.values().size]) + ArgumentListWrapping:UserDatabaseDataGenerator.kt$UserDatabaseDataGenerator$(ConversationEntity.AccessRole.values()[index % ConversationEntity.AccessRole.values().size]) + ArgumentListWrapping:UserDatabaseDataGenerator.kt$UserDatabaseDataGenerator$(MemberEntity(userEntity.id, MemberEntity.Role.Member), conversationId) + ArgumentListWrapping:UserDatabaseDataGenerator.kt$UserDatabaseDataGenerator$(userEntity.id, MemberEntity.Role.Member) + ArgumentListWrapping:UserEventReceiverTest.kt$UserEventReceiverTest$(arrangement.newGroupConversationSystemMessagesCreator::conversationStartedUnverifiedWarning) + ArgumentListWrapping:UserMapper.kt$UserMapperImpl$( name = newName, accentId = newAccent, assets = if (newAssetId != null) { listOf( UserAssetDTO(newAssetId, AssetSizeDTO.COMPLETE, UserAssetTypeDTO.IMAGE), UserAssetDTO(newAssetId, AssetSizeDTO.PREVIEW, UserAssetTypeDTO.IMAGE) ) } else { null } ) + ArgumentListWrapping:UserMapper.kt$UserMapperImpl$(connectionState = userEntity.connectionStatus) + ArgumentListWrapping:UserPrefBuilder.kt$UserPrefBuilder$(SettingOptions.UserSettings(shouldEncryptData, userId), EncryptedSettingsPlatformParam(rootPath)) + ArgumentListWrapping:UserPrefBuilder.kt$UserPrefBuilder$(rootPath) + ArgumentListWrapping:UserPrefBuilder.kt$UserPrefBuilder$(shouldEncryptData, userId) + ArgumentListWrapping:UserRepository.kt$UserDataSource$("User ids contains different domains when federation is not enabled by backend: $domainNames") + ArgumentListWrapping:UserRepository.kt$UserDataSource$(Json.encodeToString(userEntity.id), SELF_USER_ID_KEY) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(mapTeamMemberDTO[userProfileDTO.id.value]?.permissions?.own) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(qualifiedUserIdList.filter { it.domain == selfUserId.domain } .map { userId -> userId.toApi() }) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(selfUserTeamId?.value, selfUserDomain) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(status) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(teamMemberDTO?.permissions?.own) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(userDTO.id.toModel(), idMapper.toSsoId(userDTO.ssoID), userDTO.managedByDTO) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(userDTO.ssoID) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(userEntity.id) + ArgumentListWrapping:UserRepository.kt$UserDataSource$(userId.toDao(), availabilityStatusMapper.fromModelAvailabilityStatusToDao(status)) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$("id-valid", "domain2") + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(ListUsersDTO(usersFailed = emptyList(), listOf(TestUser.USER_PROFILE_DTO))) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(TestUser.DETAILS_ENTITY.copy(id = UserIDEntity(value = "id1", domain = "domain1"))) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(TestUser.USER_PROFILE_DTO) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(id = QualifiedIDEntity("id-valid", "domain2"), hasIncompleteMetadata = false) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(id = UserIDEntity(value = "id1", domain = "domain1")) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(id = userIdWithConsent.toApi(), legalHoldStatus = LegalHoldStatusDTO.DISABLED) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(id = userIdWithoutConsent.toApi(), legalHoldStatus = LegalHoldStatusDTO.NO_CONSENT) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(usersFailed = emptyList(), listOf(TestUser.USER_PROFILE_DTO)) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest$(value = "id1", domain = "domain1") + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest.Arrangement$(NetworkResponse.Success(TestUser.SELF_USER_DTO.copy(teamId = TestTeam.TEAM_ID.value), mapOf(), 200)) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest.Arrangement$(TestUser.SELF_USER_DTO.copy(teamId = TestTeam.TEAM_ID.value), mapOf(), 200) + ArgumentListWrapping:UserRepositoryTest.kt$UserRepositoryTest.Arrangement$(teamId = TestTeam.TEAM_ID.value) + ArgumentListWrapping:UserScope.kt$UserScope$(accountRepository, validateUserHandleUseCase, syncManager) + ArgumentListWrapping:UserSearchApiWrapperTest.kt$UserSearchApiWrapperTest$( ConversationMemberExcludedOptions.ConversationExcluded( ConversationId( "someValue", "someDomain" ) ), selfUserIncluded = false ) + ArgumentListWrapping:UserSearchApiWrapperTest.kt$UserSearchApiWrapperTest$( ConversationMemberExcludedOptions.ConversationExcluded( ConversationId( "someValue", "someDomain" ) ), selfUserIncluded = true ) + ArgumentListWrapping:UserSearchApiWrapperTest.kt$UserSearchApiWrapperTest$( user = QualifiedIDEntity( "value3", "someDomain" ), role = MemberEntity.Role.Member ) + ArgumentListWrapping:UserSearchApiWrapperTest.kt$UserSearchApiWrapperTest$( user = QualifiedIDEntity( selfUser.id.value, selfUser.id.domain ), role = MemberEntity.Role.Member ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( authenticatedNetworkContainer.notificationApi, userStorage.database.metadataDAO, clientIdProvider, userId ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( clientIdProvider, authenticatedNetworkContainer.keyPackageApi, mlsClientProvider, userId ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( clientRepository, notificationTokenRepository, pushTokenRepository ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( conversationRepository, connectionRepository, userRepository, userStorage.database.memberDAO, persistMessage, userId ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( conversations.observeConversationMembers, conversationRepository, userConfigRepository ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( memberJoinHandler, memberLeaveHandler ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( mlsClientProvider, clientRepository, keyPackageRepository, keyPackageLimitsProvider, userConfigRepository ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( proteusClientProvider = proteusClientProvider, selfUserId = userId ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( slowSyncRepository, incrementalSyncRepository ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( userId, platformUserStorageProperties, kaliumConfigs.shouldEncryptData ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( userId, qualifiedIdMapper, globalScope.sessionRepository ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( userRepository, conversationRepository, EphemeralEventsNotificationManagerImpl ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$( userStorage.database.conversationDAO, persistMessage ) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$(clientIdProvider, isAllowedToRegisterMLSClient, incrementalSyncRepository, lazy { slowSyncRepository }, lazy { clientRepository }, lazy { RegisterMLSClientUseCaseImpl( mlsClientProvider, clientRepository, keyPackageRepository, keyPackageLimitsProvider, userConfigRepository ) }) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$(featureSupport, incrementalSyncRepository, lazy { clientRepository }, lazy { client.refillKeyPackages }, lazy { client.mlsKeyPackageCountUseCase }, lazy { users.timestampKeyRepository }) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$(featureSupport, incrementalSyncRepository, lazy { clientRepository }, lazy { conversations.updateMLSGroupsKeyingMaterials }, lazy { users.timestampKeyRepository }) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$(messageRepository, assetRepository, EphemeralEventsNotificationManagerImpl, userId) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$(userId, observeLegalHoldStateForUser, observeLegalHoldRequest) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$(userId, userConfigRepository, observeLegalHoldStateForUser) + ArgumentListWrapping:UserSessionScope.kt$UserSessionScope$(userStorage.database.metadataDAO) + ArgumentListWrapping:Utils.kt$("{{monkeyClientId}}", monkeyId.clientId.toString()) + ArgumentListWrapping:Utils.kt$("{{monkeyIndex}}", monkeyId.index.toString()) + ArgumentListWrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$("A1@3.") + ArgumentListWrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$("a1@3.") + ArgumentListWrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$("aA13") + ArgumentListWrapping:ValidateSSOCodeUseCaseTest.kt$ValidateSSOCodeUseCaseTest$(code) + ArgumentListWrapping:ValidateUserHandleUseCase.kt$ValidateUserHandleResult.Invalid$(handleWithoutInvalidCharacters) + ArgumentListWrapping:ValidateUserHandleUseCase.kt$ValidateUserHandleUseCaseImpl$(handleWithoutInvalidCharacters, invalidCharactersUsed) + ArgumentListWrapping:VerifyBackupUseCase.kt$VerifyBackupUseCaseImpl$(dispatchers.io) + ArgumentListWrapping:WorkSchedulerImpl.kt$GlobalWorkSchedulerImpl$( localDateTimeNow.year, localDateTimeNow.monthNumber, localDateTimeNow.dayOfMonth, scheduledHourOfDayToExecute, 0, 0, 0 ) + ArgumentListWrapping:WorkSchedulerImpl.kt$GlobalWorkSchedulerImpl$(localTimeZone) + ArgumentListWrapping:WorkSchedulerImpl.kt$GlobalWorkSchedulerImpl$(workerClass, repeatIntervalInHours.toLong(), TimeUnit.HOURS) + ArgumentListWrapping:WrapApiRequestTest.kt$WrapApiRequestTest$( 500, "have you tried turning it off and on again?", "server_crash" ) + ArgumentListWrapping:WrapperWorker.kt$(key, Json.encodeToString(value)) + ArgumentListWrapping:WrapperWorker.kt$(value) + ArgumentListWrapping:WrapperWorker.kt$WrapperWorker$(Context.NOTIFICATION_SERVICE) + ArgumentListWrapping:WrapperWorker.kt$WrapperWorkerFactory$("No specialized constructor found for class $innerWorkerClassName. Default constructor will be used") + ArgumentListWrapping:WrapperWorker.kt$WrapperWorkerFactory$(innerWorker as DefaultWorker, appContext, workerParameters, foregroundNotificationDetailsProvider) + ArgumentListWrapping:WrapperWorker.kt$WrapperWorkerFactory$(userId) + ArgumentListWrapping:build.gradle.kts$("main") + ArgumentListWrapping:build.gradle.kts$(libs.coreCryptoAndroid.get().let { "${it.module}:${it.versionConstraint.requiredVersion}" }) + ArgumentListWrapping:homeDirectory.kt$( rootPath, kaliumConfigs = KaliumConfigs( developmentApiEnabled = true, encryptProteusStorage = true, isMLSSupportEnabled = true, wipeOnDeviceRemoval = true, ), userAgent = "Wire Infinite Monkeys", useInMemoryStorage = true ) + ClassNaming:Cryptobox.module_@wireapp_cryptobox.kt$T$0 + ClassNaming:Size_t.kt$Size_t : IntegerType + ClassNaming:Uint32_t.kt$Uint32_t : IntegerType + CommentSpacing:E2EIClientTest.kt$E2EIClientTest$//todo: fix later + CommentSpacing:GetOrRegisterClientUseCaseTest.kt$GetOrRegisterClientUseCaseTest$//todo: fix later + CommentSpacing:MLSClientManagerTest.kt$MLSClientManagerTest.Arrangement$//todo: cover all cases + CommentSpacing:RegisterClientUseCaseTest.kt$RegisterClientUseCaseTest$//finalizing the client registration + CommentSpacing:RegisterClientUseCaseTest.kt$RegisterClientUseCaseTest$//make sure we invoked the team settings fetched + CommentSpacing:RegisterClientUseCaseTest.kt$RegisterClientUseCaseTest$//mls returns e2ei is required + CommentSpacing:SlowSyncCriteriaProviderTest.kt$SlowSyncCriteriaProviderTest$//todo: fix later + CommentSpacing:UserDAOTest.kt$UserDAOTest$//given + EmptyDefaultConstructor:GetUpdatedSelfTeamUseCaseTest.kt$GetUpdatedSelfTeamUseCaseTest.Arrangement$() + EmptyDefaultConstructor:MembersHavingLegalHoldClientUseCaseTest.kt$MembersHavingLegalHoldClientUseCaseTest.Arrangement$() + EmptyDefaultConstructor:ObserveConversationUnderLegalHoldNotifiedUseCaseTest.kt$ObserveConversationUnderLegalHoldNotifiedUseCaseTest.Arrangement$() + EmptyDefaultConstructor:SetNotifiedAboutConversationUnderLegalHoldUseCaseTest.kt$SetNotifiedAboutConversationUnderLegalHoldUseCaseTest.Arrangement$() + EmptyFunctionBlock:FileTestHelper.kt$FileTestHelper${ } + EmptyKtFile:FetchApiVersionUseCaseTest.kt$.FetchApiVersionUseCaseTest.kt + Filename:ConversationStatus.kt$com.wire.kalium.logic.data.conversation.ConversationStatus.kt + Filename:FileUtilTest.kt$com.wire.kalium.util.FileUtilTest.kt + Filename:GetOtherUserClientsUseCaseTest.kt$com.wire.kalium.logic.feature.client.GetOtherUserClientsUseCaseTest.kt + Filename:InputFlow.kt$com.wire.kalium.cli.commands.InputFlow.kt + Filename:LegalHoldSystemMessageHandlerTest.kt$com.wire.kalium.logic.sync.receiver.handler.legalhold.LegalHoldSystemMessageHandlerTest.kt + Filename:SessionResult.kt$com.wire.kalium.logic.feature.session.SessionResult.kt + Filename:Uint32_t.kt$com.wire.kalium.calling.types.Uint32_t.kt + Filename:commonJsConfig.kt$com.wire.kalium.plugins.commonJsConfig.kt + Filename:coreLogic.kt$com.wire.kalium.cli.coreLogic.kt + Filename:defaultHttpEngine.kt$com.wire.kalium.network.defaultHttpEngine.kt + Filename:fileLogger.kt$com.wire.kalium.cli.fileLogger.kt + Filename:fileLogger.kt$com.wire.kalium.monkeys.fileLogger.kt + Filename:homeDirectory.kt$com.wire.kalium.cli.homeDirectory.kt + Filename:homeDirectory.kt$com.wire.kalium.monkeys.homeDirectory.kt + Filename:main.kt$.main.kt + Filename:main.kt$com.wire.kalium.cli.main.kt + Filename:main.kt$com.wire.kalium.monkeys.main.kt + Filename:monkey.kt$com.wire.kalium.monkeys.monkey.kt + Filename:readBinaryResource.kt$com.wire.kalium.cryptography.readBinaryResource.kt + Filename:replayer.kt$com.wire.kalium.monkeys.replayer.kt + Filename:toByteArray.kt$com.wire.kalium.util.int.toByteArray.kt + Filename:toByteArray.kt$com.wire.kalium.util.long.toByteArray.kt + Filename:toUTF16BEByteArray.kt$com.wire.kalium.util.string.toUTF16BEByteArray.kt + FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun get_prekey_bundle(preKeyId: Number = definedExternally): Promise<PreKeyBundle> + FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun get_serialized_last_resort_prekey(): Promise<`T$0`> + FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun get_serialized_standard_prekeys(): Promise<Array<`T$0`>> + FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun new_prekeys(start: Number, size: Number): Promise<Array<PreKey>> + FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun serialize_prekey(prekey: PreKey): `T$0` + FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun session_delete(sessionId: String): Promise<String> + FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun session_from_prekey(sessionId: String, preKeyBundle: ArrayBuffer): Promise<CryptoboxSession> + FunctionNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open fun session_load(sessionId: String): Promise<CryptoboxSession> + FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun delete_all(): Promise<Boolean> + FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun load_identity(): Promise<IdentityKeyPair?> + FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun load_prekeys(): Promise<Array<PreKey>> + FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun save_identity(identity: IdentityKeyPair): Promise<IdentityKeyPair> + FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun save_prekey(preKey: PreKey): Promise<PreKey> + FunctionNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open fun save_prekeys(preKeys: Array<PreKey>): Promise<Array<PreKey>> + FunctionNaming:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession$open fun fingerprint_local(): String + FunctionNaming:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession$open fun fingerprint_remote(): String + FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun array_begin(): Encoder + FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun array_end(): Encoder + FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun get_buffer(): ArrayBuffer + FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun object_begin(): Encoder + FunctionNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open fun object_end(): Encoder + FunctionNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair.Companion$fun construct_private_key(ed25519_key_pair: KeyPair): SecretKey + FunctionNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair.Companion$fun construct_public_key(ed25519_key_pair: KeyPair): PublicKey + FunctionNaming:PreKey.module_@wireapp_proteus.kt$PreKey.Companion$fun generate_prekeys(start: Number, size: Number): Array<PreKey> + FunctionNaming:PreKey.module_@wireapp_proteus.kt$PreKey.Companion$fun last_resort(): PreKey + FunctionNaming:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$open fun serialised_json(): SerialisedJSON + FunctionNaming:PreKeyStore.module_@wireapp_proteus.kt$PreKeyStore$open fun delete_prekey(prekeyId: Number): Promise<Number> + FunctionNaming:PreKeyStore.module_@wireapp_proteus.kt$PreKeyStore$open fun load_prekey(prekeyId: Number): Promise<PreKey?> + FunctionNaming:SecretKey.module_@wireapp_proteus.kt$SecretKey.Companion$fun shared_secret(publicKey: PublicKey, secretKey: SecretKey): Uint8Array + FunctionParameterNaming:Calling.kt$Calling$curr_time: Uint32_t + FunctionParameterNaming:Calling.kt$Calling$msg_time: Uint32_t + FunctionParameterNaming:Calling.kt$Calling$wcall_participant_changed_h: ParticipantChangedHandler + FunctionParameterNaming:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession$pk_store: CryptoboxCRUDStore + FunctionParameterNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair.Companion$ed25519_key_pair: KeyPair + FunctionReturnTypeSpacing:BaseMLSClientTest.kt$BaseMLSClientTest$actual suspend fun createCoreCrypto(clientId: CryptoQualifiedClientId):CoreCryptoCentral + FunctionStartOfBodySpacing:E2EIClientProviderTest.kt$E2EIClientProviderTest$@Test fun givenIsNewClientTrue_whenGettingE2EIClient_newAcmeEnrollmentCalled() + FunctionStartOfBodySpacing:MLSWelcomeEventHandlerTest.kt$MLSWelcomeEventHandlerTest$@Test fun givenWelcomeBundleWithNewDistributionsCRL_whenHandlingEvent_then_CheckRevocationList() + LargeClass:E2EIRepositoryTest.kt$E2EIRepositoryTest + LargeClass:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest + LargeClass:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest + LargeClass:MessageSenderTest.kt$MessageSenderTest + LargeClass:UserDAOTest.kt$UserDAOTest : BaseDatabaseTest + LargeClass:UserRepositoryTest.kt$UserRepositoryTest + LongMethod:ClientRepositoryTest.kt$ClientRepositoryTest$@Test fun whenSelfListOfClientsIsReturnSuccess_thenTheSuccessIsPropagated() + LongMethod:ConversationDAOTest.kt$ConversationDAOTest$private fun ConversationEntity.toViewEntity(userEntity: UserEntity? = null): ConversationViewEntity + LongMethod:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$@Test fun givenCreateNewAccountFails_whenInvokeUseCase_thenReturnFailure() + LongMethod:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$@Test fun givenGetACMENonceFails_whenInvokeUseCase_thenReturnFailure() + LongMethod:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$@Test fun givenLoadACMEDirectoriesFails_whenInvokeUseCase_thenReturnFailure() + LongMethod:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$@Test fun givenUseCase_whenCreateAuthorizationsFailing_thenReturnFailure() + LongMethod:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest$@Test fun givenUseCase_whenCreateNewOrderFailing_thenReturnFailure() + LongMethod:EphemeralMessageDeletionHandlerTest.kt$EphemeralMessageDeletionHandlerTest$@Test fun givenMultipleMessageWithDifferentExpirationAsReceiver_whenEnqueuedForDeletionAndTimeElapsed_thenTheMessagesPastTheTimeShouldBeDeleted() + LongMethod:EphemeralMessageDeletionHandlerTest.kt$EphemeralMessageDeletionHandlerTest$@Test fun givenMultipleMessageWithDifferentExpirationAsSender_whenEnqueuedForDeletionAndTimeElapsed_thenTheMessagesPastTheTimeShouldBeDeleted() + LongMethod:FederationEventReceiverTest.kt$FederationEventReceiverTest$@Test fun givenConversationsWithFederatedUsers_whenReceivingFederationDeleteEvent_thenAllConversationsWithThemShouldBeCleared() + LongMethod:MLSConversationsVerificationStatusesHandlerTest.kt$MLSConversationsVerificationStatusesHandlerTest$@Test fun givenDegradedConversation_whenVerifiedStatusComes_thenStatusUpdated() + LongMethod:MLSConversationsVerificationStatusesHandlerTest.kt$MLSConversationsVerificationStatusesHandlerTest$@Test fun givenVerifiedConversation_whenVerifiedStatusComesAndUserNamesDivergeFromCC_thenStatusUpdatedToDegraded() + LongMethod:MessageDAOTest.kt$MessageDAOTest$@Test fun givenAssetMessageWithMimeType_WhenGettingAssetMessages_ThenListShouldContainAssetMessageWithMimeType() + LongMethod:MessageDAOTest.kt$MessageDAOTest$@Test fun givenMessagesAreInserted_whenGettingMessagesByConversation_thenOnlyRelevantMessagesAreReturned() + LongMethod:MessageMapperTest.kt$MessageMapperTest.Arrangement$@Suppress("LongParameterList") fun toEntityFromView( id: String = "", conversationId: QualifiedIDEntity = QualifiedIDEntity("someValue", "someDomain"), contentType: MessageEntity.ContentType = MessageEntity.ContentType.TEXT, date: Instant = Instant.DISTANT_FUTURE, senderUserId: QualifiedIDEntity = QualifiedIDEntity("someValue", "someDomain"), senderClientId: String? = "someId", status: MessageEntity.Status = MessageEntity.Status.READ, lastEditTimestamp: Instant? = null, visibility: MessageEntity.Visibility = MessageEntity.Visibility.VISIBLE, expectsReadConfirmation: Boolean = false, expireAfterMillis: Long? = null, selfDeletionStartDate: Instant? = null, selfDeletionEndDate: Instant? = null, readCount: Long = 0, senderName: String? = null, senderHandle: String? = null, senderEmail: String? = null, senderPhone: String? = null, senderAccentId: Int = 0, senderTeamId: String? = null, senderConnectionStatus: ConnectionEntity.State = ConnectionEntity.State.ACCEPTED, senderPreviewAssetId: QualifiedIDEntity? = null, senderCompleteAssetId: QualifiedIDEntity? = null, senderAvailabilityStatus: UserAvailabilityStatusEntity = UserAvailabilityStatusEntity.AVAILABLE, senderUserType: UserTypeEntity = UserTypeEntity.STANDARD, senderBotService: BotIdEntity? = null, senderIsDeleted: Boolean = false, senderExpiresAt: Instant? = null, senderDefederated: Boolean = false, senderSupportedProtocols: Set<SupportedProtocolEntity>? = null, senderActiveOneOnOneConversationId: QualifiedIDEntity? = null, senderIsProteusVerified: Long = 0, senderIsUnderLegalHold: Long = 0, isSelfMessage: Boolean = false, text: String? = null, isQuotingSelfUser: Boolean? = null, assetSize: Long? = null, assetName: String? = null, assetMimeType: String? = null, assetOtrKey: ByteArray? = null, assetSha256: ByteArray? = null, assetId: String? = null, assetToken: String? = null, assetDomain: String? = null, assetEncryptionAlgorithm: String? = null, assetWidth: Int? = null, assetHeight: Int? = null, assetDuration: Long? = null, assetNormalizedLoudness: ByteArray? = null, callerId: QualifiedIDEntity? = null, memberChangeList: List<QualifiedIDEntity>? = null, memberChangeType: MessageEntity.MemberChangeType? = null, unknownContentTypeName: String? = null, unknownContentData: ByteArray? = null, restrictedAssetMimeType: String? = null, restrictedAssetSize: Long? = null, restrictedAssetName: String? = null, failedToDecryptData: ByteArray? = null, isDecryptionResolved: Boolean? = null, conversationName: String? = null, allReactionsJson: String = "{}", selfReactionsJson: String = "[]", mentions: String = "[]", quotedMessageId: String? = null, quotedSenderId: QualifiedIDEntity? = null, isQuoteVerified: Boolean? = null, quotedSenderName: String? = null, quotedMessageDateTime: Instant? = null, quotedMessageEditTimestamp: Instant? = null, quotedMessageVisibility: MessageEntity.Visibility? = null, quotedMessageContentType: MessageEntity.ContentType? = null, quotedTextBody: String? = null, quotedAssetMimeType: String? = null, quotedAssetName: String? = null, quotedLocationName: String? = null, newConversationReceiptMode: Boolean? = null, conversationReceiptModeChanged: Boolean? = null, messageTimerChanged: Long? = null, recipientsFailedWithNoClientsList: List<QualifiedIDEntity>? = null, recipientsFailedDeliveryList: List<QualifiedIDEntity>? = null, buttonsJson: String = "[]", federationDomainList: List<String>? = null, federationType: MessageEntity.FederationType? = null, conversationProtocolChanged: ConversationEntity.Protocol? = null, latitude: Float? = null, longitude: Float? = null, locationName: String? = null, locationZoom: Int? = null, legalHoldMemberList: List<QualifiedIDEntity>? = null, legalHoldType: MessageEntity.LegalHoldType? = null, ): MessageEntity + LongMethod:UserDAOTest.kt$UserDAOTest$@Test fun givenExistingUser_whenUpsertingIt_thenAllImportantFieldsAreProperlyUpdated() + LongParameterList:ApiTest.kt$ApiTest$( responseBody: ByteReadChannel, statusCode: HttpStatusCode, assertion: (HttpRequestData.() -> Unit) = {}, headers: Map<String, String>?, developmentApiEnabled: Boolean = false, networkStateObserver: NetworkStateObserver = DEFAULT_TEST_NETWORK_STATE_OBSERVER, ) + LongParameterList:ApiTest.kt$ApiTest$( responseBody: String, statusCode: HttpStatusCode, assertion: (HttpRequestData.() -> Unit) = {}, headers: Map<String, String>? = null, developmentApiEnabled: Boolean = false, networkStateObserver: NetworkStateObserver = DEFAULT_TEST_NETWORK_STATE_OBSERVER, ) + LongParameterList:Calling.kt$Calling$( userId: String, clientId: String, readyHandler: ReadyHandler, sendHandler: SendHandler, sftRequestHandler: SFTRequestHandler, incomingCallHandler: IncomingCallHandler, missedCallHandler: MissedCallHandler, answeredCallHandler: AnsweredCallHandler, establishedCallHandler: EstablishedCallHandler, closeCallHandler: CloseCallHandler, metricsHandler: MetricsHandler, callConfigRequestHandler: CallConfigRequestHandler, constantBitRateStateChangeHandler: ConstantBitRateStateChangeHandler, videoReceiveStateHandler: VideoReceiveStateHandler, arg: Pointer? ) + LongParameterList:DetektConfigurationAccessors.kt$( group: String, name: String, version: String? = null, configuration: String? = null, classifier: String? = null, ext: String? = null, dependencyConfiguration: Action<ExternalModuleDependency>? = null ) + LongParameterList:DetektPluginsConfigurationAccessors.kt$( group: String, name: String, version: String? = null, configuration: String? = null, classifier: String? = null, ext: String? = null, dependencyConfiguration: Action<ExternalModuleDependency>? = null ) + LongParameterList:IncomingCallHandler.kt$IncomingCallHandler$( conversationId: String, messageTime: Uint32_t, userId: String, clientId: String, isVideoCall: Boolean, shouldRing: Boolean, conversationType: Int, arg: Pointer? ) + LongParameterList:Multiplatform.kt$( enableApple: Boolean, enableJs: Boolean, enableJsTests: Boolean, includeNativeInterop: Boolean, enableIntegrationTests: Boolean, androidNamespaceSuffix: String = this.name ) + LongParameterList:ToggleReactionUseCase.kt$ToggleReactionUseCase$( clientId: ClientId, conversationId: ConversationId, date: String, messageId: String, currentReactions: UserReactions, newReaction: String ) + LongParameterList:ToggleReactionUseCase.kt$ToggleReactionUseCase$( clientId: ClientId, conversationId: ConversationId, date: String, messageId: String, removedReaction: String, currentReactions: UserReactions ) + MagicNumber:ConversationStatus.kt$MutedConversationStatus.AllMuted$3 + MagicNumber:GlobalCallManager.kt$LogHandlerImpl$3 + MagicNumber:NetworkUtils.kt$300 + MagicNumber:NetworkUtils.kt$399 + MagicNumber:NetworkUtils.kt$400 + MagicNumber:NetworkUtils.kt$499 + MagicNumber:NetworkUtils.kt$500 + MagicNumber:NetworkUtils.kt$599 + MagicNumber:RegisterClientRequestJson.kt$RegisterClientRequestJson$999 + MatchingDeclarationName:ConversationStatus.kt$MutedConversationStatus + MatchingDeclarationName:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore : PreKeyStore + MatchingDeclarationName:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession + MatchingDeclarationName:Encoder.module_@wireapp_cbor.kt$Encoder + MatchingDeclarationName:FileUtilTest.kt$FileTestHelper + MatchingDeclarationName:GetOtherUserClientsUseCaseTest.kt$ObserveClientsByUserIdUseCaseTest + MatchingDeclarationName:IdentityKey.module_@wireapp_proteus.kt$IdentityKey + MatchingDeclarationName:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair + MatchingDeclarationName:KeyPair.module_@wireapp_proteus.kt$KeyPair + MatchingDeclarationName:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest + MatchingDeclarationName:MemoryEngine.module_@wireapp_store-engine.kt$MemoryEngine : CRUDEngine + MatchingDeclarationName:PreKey.module_@wireapp_proteus.kt$PreKey + MatchingDeclarationName:PreKeyStore.module_@wireapp_proteus.kt$PreKeyStore + MatchingDeclarationName:PublicKey.module_@wireapp_proteus.kt$PublicKey + MatchingDeclarationName:SecretKey.module_@wireapp_proteus.kt$SecretKey + MatchingDeclarationName:SessionResult.kt$GetAllSessionsResult + MatchingDeclarationName:Widgets.kt$CustomScrollRegion : Widget + MaxLineLength:BaseDatabaseTest.kt$BaseDatabaseTest$actual fun platformDBData(userId: UserIDEntity): PlatformDatabaseData + MaxLineLength:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Arrangement$fun + MaxLineLength:ConversationRepositoryTest.kt$ConversationRepositoryTest$keyingMaterialLastUpdate = (entity.protocolInfo as ConversationEntity.ProtocolInfo.MLS).keyingMaterialLastUpdate + MaxLineLength:E2EIClientTest.kt$E2EIClientTest.Companion$"eyJhbGciOiJSUzI1NiIsImtpZCI6ImM5YWZkYTM2ODJlYmYwOWViMzA1NWMxYzRiZDM5Yjc1MWZiZjgxOTUiLCJ0eXAiOiJKV1QifQ.eyJpc3MiOiJodHRwczovL2FjY291bnRzLmdvb2dsZS5jb20iLCJhenAiOiIzMzg4ODgxNTMwNzItNGZlcDZ0bjZrMTZ0bWNiaGc0bnQ0bHI2NXB2M2F2Z2kuYXBwcy5nb29nbGV1c2VyY29udGVudC5jb20iLCJhdWQiOiIzMzg4ODgxNTMwNzItNGZlcDZ0bjZrMTZ0bWNiaGc0bnQ0bHI2NXB2M2F2Z2kuYXBwcy5nb29nbGV1c2VyY29udGVudC5jb20iLCJzdWIiOiIxMTU0OTM2MTQ1MjMzNjgyNjc2OTAiLCJoZCI6IndpcmUuY29tIiwiZW1haWwiOiJtb2p0YWJhLmNoZW5hbmlAd2lyZS5jb20iLCJlbWFpbF92ZXJpZmllZCI6dHJ1ZSwiYXRfaGFzaCI6IkRtZDhJQXdnWmVKX1QtUjBpRlpseGciLCJub25jZSI6IjEta2FZb1hRODdadEVlRGpVYTVQSVEiLCJuYW1lIjoiTW9qdGFiYSBDaGVuYW5pIiwicGljdHVyZSI6Imh0dHBzOi8vbGgzLmdvb2dsZXVzZXJjb250ZW50LmNvbS9hL0FHTm15eGFhaWFKa1Y4VDNmMW91d0RWVjNQck52UFBaVUpIZGdnMlJ4N0s0PXM5Ni1jIiwiZ2l2ZW5fbmFtZSI6Ik1vanRhYmEiLCJmYW1pbHlfbmFtZSI6IkNoZW5hbmkiLCJsb2NhbGUiOiJlbiIsImlhdCI6MTY4MzQ4MjIyOSwiZXhwIjoxNjgzNDg1ODI5fQ.r0hh1CtVUXncdWHoXsfAvhf0VuWGDooSRQnNqq0GrzAbYVENGwg0dm8P10Cq_UmCjjh56nC5laMQUcBu-sKW9mRbdKnHwdXXregTSgelQJFoIlusb_3VyHcWDY8Yf9xyuyZbu3wcduL8IndTvy8Sq7mIzGKhsHnLIy1UgHbCGMrzfY2LYCi9Df1ADqA8romigo8fdEAVUi9TAIC8SgHOcqLJt8mxlhKSPPwkJw5yZ3CRvF2NMNsVkYpE9hVYbHcZd6EAmJnljKPJ-NQLXUdjaU3ail80YQko4rcgF2QMZ3LBSMGJpI5LM2UhDxnktqBTpE2nLdwCFg64INS48DPDXQ" + MaxLineLength:EphemeralMessageDeletionHandlerTest.kt$EphemeralMessageDeletionHandlerTest$fun + MaxLineLength:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$external open + MaxLineLength:MemoryEngine.module_@wireapp_store-engine.kt$MemoryEngine$override fun <PrimaryKey, ChangesType> updateOrCreate(tableName: String, primaryKey: PrimaryKey, changes: ChangesType): Promise<PrimaryKey> + MaxLineLength:MessageSenderTest.kt$MessageSenderTest$fun + MaxLineLength:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$sysMessageCreator.conversationReadReceiptStatus(TestConversation.CONVERSATION_RESPONSE.copy(type = ConversationResponse.Type.ONE_TO_ONE)) + MaxLineLength:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$constructor(publicIdentityKey: IdentityKey, preKeyId: Number, publicKey: PublicKey, signature: Uint8Array? = definedExternally, version: Number = definedExternally) + MaxLineLength:SelfClientsUseCaseTest.kt$SelfClientsUseCaseTest$fetchSelfClientsFromRemoteUseCase = FetchSelfClientsFromRemoteUseCaseImpl(clientRepository, provideClientId = currentClientIdProvider) + MaxLineLength:SendKnockUserCaseTest.kt$SendKnockUserCaseTest.Arrangement$ObserveSelfDeletionTimerSettingsForConversationUseCaseArrangement by ObserveSelfDeletionTimerSettingsForConversationUseCaseArrangementImpl() + MaxLineLength:SendLocationUseCaseTest.kt$SendLocationUseCaseTest.Arrangement$ObserveSelfDeletionTimerSettingsForConversationUseCaseArrangement by ObserveSelfDeletionTimerSettingsForConversationUseCaseArrangementImpl() + MaxLineLength:SyncSelfTeamUseCaseTest.kt$SyncSelfTeamUseCaseTest$fun + MaximumLineLength:BaseDatabaseTest.kt$BaseDatabaseTest$ + MaximumLineLength:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Arrangement$ + MaximumLineLength:ConversationRepositoryTest.kt$ConversationRepositoryTest$ + MaximumLineLength:E2EIClientTest.kt$E2EIClientTest.Companion$ + MaximumLineLength:EphemeralMessageDeletionHandlerTest.kt$EphemeralMessageDeletionHandlerTest$ + MaximumLineLength:MessageSenderTest.kt$MessageSenderTest$ + MaximumLineLength:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$ + MaximumLineLength:SelfClientsUseCaseTest.kt$SelfClientsUseCaseTest$ + MaximumLineLength:SendKnockUserCaseTest.kt$SendKnockUserCaseTest.Arrangement$ + MaximumLineLength:SendLocationUseCaseTest.kt$SendLocationUseCaseTest.Arrangement$ + MaximumLineLength:SyncSelfTeamUseCaseTest.kt$SyncSelfTeamUseCaseTest$ + MayBeConst:ACMEActions.kt$ACMEActions$/** * URL Paths */ private val ACME_BASE_URL = "https://balderdash.hogwash.work:9000/acme/google-android/" + MayBeConst:CommonDokkaConfig.kt$private val DOKKA_CACHE_DIR = ".cache/dokka" + MayBeConst:ConversationDAOTest.kt$ConversationDAOTest.Companion$val messageTimer = 5000L + MayBeConst:E2EIClientTest.kt$E2EIClientTest.Companion$val ACCESS_TOKEN_RESPONSE = """ { "expires_in":"300", "token":"eyJhbGciOiJFZERTQSIsInR5cCI6ImF0K2p3dCIsImp3ayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJFZDI1NTE5IiwieCI6ImdxTk8wZ1FzRndfUUNQNm5xeV9BUWxNVDFQSTAtZ3lRMWZTMGhJZklyTWcifX0.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.kFoRHJotAJQTgLXXrH4m9ySutFJb2cc4Raa1nbOyRxNTFZyQuwbJT1jGAlIbziQmVEIZ5vneOg0TqBAyEtw3BQ", "type":"DPoP" }""" + MayBeConst:E2EIClientTest.kt$E2EIClientTest.Companion$val AUTHZ_URL = "https://balderdash.hogwash.work:9000/acme/wire/authz/CSGJUN9BQ0mhELCBbvBJI7AlxcAH9ypD" + MayBeConst:E2EIClientTest.kt$E2EIClientTest.Companion$val FINALIZE_ORDER_URL = "https://balderdash.hogwash.work:9000/acme/wire/order/Q4LJjBnX7rA8dwxVreikzmVJBfCvrVs0/finalize" + MayBeConst:E2EIClientTest.kt$E2EIClientTest.Companion$val NONCE = "TGR6Rk45RlR2WDlzanMxWEpYd21YaFR0SkZBYTNzUWk" + MayBeConst:E2EIClientTest.kt$E2EIClientTest.Companion$val OAUTH_ID_TOKEN = "eyJhbGciOiJSUzI1NiIsImtpZCI6ImM5YWZkYTM2ODJlYmYwOWViMzA1NWMxYzRiZDM5Yjc1MWZiZjgxOTUiLCJ0eXAiOiJKV1QifQ.eyJpc3MiOiJodHRwczovL2FjY291bnRzLmdvb2dsZS5jb20iLCJhenAiOiIzMzg4ODgxNTMwNzItNGZlcDZ0bjZrMTZ0bWNiaGc0bnQ0bHI2NXB2M2F2Z2kuYXBwcy5nb29nbGV1c2VyY29udGVudC5jb20iLCJhdWQiOiIzMzg4ODgxNTMwNzItNGZlcDZ0bjZrMTZ0bWNiaGc0bnQ0bHI2NXB2M2F2Z2kuYXBwcy5nb29nbGV1c2VyY29udGVudC5jb20iLCJzdWIiOiIxMTU0OTM2MTQ1MjMzNjgyNjc2OTAiLCJoZCI6IndpcmUuY29tIiwiZW1haWwiOiJtb2p0YWJhLmNoZW5hbmlAd2lyZS5jb20iLCJlbWFpbF92ZXJpZmllZCI6dHJ1ZSwiYXRfaGFzaCI6IkRtZDhJQXdnWmVKX1QtUjBpRlpseGciLCJub25jZSI6IjEta2FZb1hRODdadEVlRGpVYTVQSVEiLCJuYW1lIjoiTW9qdGFiYSBDaGVuYW5pIiwicGljdHVyZSI6Imh0dHBzOi8vbGgzLmdvb2dsZXVzZXJjb250ZW50LmNvbS9hL0FHTm15eGFhaWFKa1Y4VDNmMW91d0RWVjNQck52UFBaVUpIZGdnMlJ4N0s0PXM5Ni1jIiwiZ2l2ZW5fbmFtZSI6Ik1vanRhYmEiLCJmYW1pbHlfbmFtZSI6IkNoZW5hbmkiLCJsb2NhbGUiOiJlbiIsImlhdCI6MTY4MzQ4MjIyOSwiZXhwIjoxNjgzNDg1ODI5fQ.r0hh1CtVUXncdWHoXsfAvhf0VuWGDooSRQnNqq0GrzAbYVENGwg0dm8P10Cq_UmCjjh56nC5laMQUcBu-sKW9mRbdKnHwdXXregTSgelQJFoIlusb_3VyHcWDY8Yf9xyuyZbu3wcduL8IndTvy8Sq7mIzGKhsHnLIy1UgHbCGMrzfY2LYCi9Df1ADqA8romigo8fdEAVUi9TAIC8SgHOcqLJt8mxlhKSPPwkJw5yZ3CRvF2NMNsVkYpE9hVYbHcZd6EAmJnljKPJ-NQLXUdjaU3ail80YQko4rcgF2QMZ3LBSMGJpI5LM2UhDxnktqBTpE2nLdwCFg64INS48DPDXQ" + MayBeConst:E2EIClientTest.kt$E2EIClientTest.Companion$val REFRESH_TOKEN = "YRjxLpsjRqL7zYuKstXogqioA_P3Z4fiEuga0NCVRcDSc8cy_9msxg" + MayBeConst:E2EIRepositoryTest.kt$E2EIRepositoryTest.Arrangement.Companion$val ACME_BASE_URL = "https://balderdash.hogwash.work:9000" + MayBeConst:E2EIRepositoryTest.kt$E2EIRepositoryTest.Arrangement.Companion$val RANDOM_ACCESS_TOKEN = "xxxxx" + MayBeConst:E2EIRepositoryTest.kt$E2EIRepositoryTest.Arrangement.Companion$val RANDOM_ID_TOKEN = "xxxxx" + MayBeConst:E2EIRepositoryTest.kt$E2EIRepositoryTest.Arrangement.Companion$val RANDOM_URL = "https://random.rn" + MayBeConst:E2EIRepositoryTest.kt$E2EIRepositoryTest.Arrangement.Companion$val REFRESH_TOKEN = "YRjxLpsjRqL7zYuKstXogqioA_P3Z4fiEuga0NCVRcDSc8cy_9msxg" + MayBeConst:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$val ACME_BASE_URL = "https://balderdash.hogwash.work:9000" + MayBeConst:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$val RANDOM_DPoP_TOKEN = "dpopToken" + MayBeConst:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$val RANDOM_ID_TOKEN = "idToken" + MayBeConst:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$val RANDOM_LOCATION = "https://balderdash.hogwash.work:9000" + MayBeConst:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$val REFRESH_TOKEN = "YRjxLpsjRqL7zYuKstXogqioA_P3Z4fiEuga0NCVRcDSc8cy_9msxg" + MayBeConst:PocIntegrationTest.kt$PocIntegrationTest.Companion$private val USER_EMAIL = "user@domain.com" + MayBeConst:PocIntegrationTest.kt$PocIntegrationTest.Companion$private val USER_PASSWORD = "password" + MayBeConst:RegisterMLSClientUseCaseTest.kt$RegisterMLSClientUseCaseTest.Arrangement.Companion$val RANDOM_URL = "https://random.rn" + MayBeConst:TestStubs.kt$TestStubs$val messageTimer = 5000L + ModifierOrder:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$external open + ModifierOrder:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$external open + ModifierOrder:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$override open + ModifierOrder:CryptoboxSession.module_@wireapp_cryptobox.kt$CryptoboxSession$external open + ModifierOrder:Decoder.module_@wireapp_cbor.kt$Decoder$external open + ModifierOrder:Encoder.module_@wireapp_cbor.kt$Encoder$external open + ModifierOrder:IdentityKey.module_@wireapp_proteus.kt$IdentityKey$external open + ModifierOrder:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$external open + ModifierOrder:KeyPair.module_@wireapp_proteus.kt$KeyPair$external open + ModifierOrder:MemoryEngine.module_@wireapp_store-engine.kt$MemoryEngine$external open + ModifierOrder:PreKey.module_@wireapp_proteus.kt$PreKey$external open + ModifierOrder:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$external open + ModifierOrder:PreKeyStore.module_@wireapp_proteus.kt$PreKeyStore$external open + ModifierOrder:PublicKey.module_@wireapp_proteus.kt$PublicKey$external open + ModifierOrder:SecretKey.module_@wireapp_proteus.kt$SecretKey$external open + NestedBlockDepth:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest.Arrangement$fun changeNetworkBlocked(networkType: NetworkType, isBlocked: Boolean) + NestedBlockDepth:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest.Arrangement$fun changeNetworkCapabilities(networkType: NetworkType, withInternetValidated: Boolean) + NestedBlockDepth:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest.Arrangement$fun disconnectNetwork(networkType: NetworkType) + NestedBlockDepth:NetworkStateObserverImplTest.kt$NetworkStateObserverImplTest.Arrangement$private fun changeDefaultNetwork(network: Network) + NestedBlockDepth:ValidateSSOCodeUseCase.kt$ValidateSSOCodeUseCaseImpl$override fun invoke(ssoCode: String): ValidateSSOCodeResult + NewLineAtEndOfFile:detekt.gradle.kts$scripts.detekt.gradle.kts + NoBlankLinesInChainedMethodCalls:ClearConversationContentUseCaseTest.kt$ClearConversationContentUseCaseTest$ + NoConsecutiveBlankLines:ACMEApiResponseJsonSample.kt$ACMEApiResponseJsonSample$ + NoConsecutiveBlankLines:AccountRepositoryTest.kt$AccountRepositoryTest$ + NoConsecutiveBlankLines:AddAuthenticatedUserUseCaseTest.kt$AddAuthenticatedUserUseCaseTest$ + NoConsecutiveBlankLines:Android.kt$ + NoConsecutiveBlankLines:AnswerCallUseCaseTest.kt$AnswerCallUseCaseTest$ + NoConsecutiveBlankLines:BaseProteusClientTest.kt$BaseProteusClientTest$ + NoConsecutiveBlankLines:ButtonActionConfirmationHandlerTest.kt$ButtonActionConfirmationHandlerTest$ + NoConsecutiveBlankLines:ClientDAOTest.kt$ClientDAOTest$ + NoConsecutiveBlankLines:ClientFingerprintUseCaseTest.kt$ClientFingerprintUseCaseTest$ + NoConsecutiveBlankLines:ClientFingerprintUseCaseTest.kt$ClientFingerprintUseCaseTest.Arrangement$ + NoConsecutiveBlankLines:CommonDokkaConfig.kt$ + NoConsecutiveBlankLines:ConnectionMapperTest.kt$ + NoConsecutiveBlankLines:ConnectionMapperTest.kt$ConnectionMapperTest$ + NoConsecutiveBlankLines:ConversationDAOTest.kt$ConversationDAOTest$ + NoConsecutiveBlankLines:ConversationEventReceiverTest.kt$ConversationEventReceiverTest$ + NoConsecutiveBlankLines:ConversationGroupRepositoryArrangement.kt$ + NoConsecutiveBlankLines:CurrentClientIdProviderArrangement.kt$ + NoConsecutiveBlankLines:CustomServerConfigRepositoryTest.kt$CustomServerConfigRepositoryTest.Arrangement$ + NoConsecutiveBlankLines:DatabaseImporterTest.kt$DatabaseImporterTest$ + NoConsecutiveBlankLines:DomainLookupUseCaseTest.kt$DomainLookupUseCaseTest$ + NoConsecutiveBlankLines:E2EIClientProviderArrangement.kt$E2EIClientProviderArrangementImpl$ + NoConsecutiveBlankLines:EndCallUseCaseTest.kt$EndCallUseCaseTest$ + NoConsecutiveBlankLines:EphemeralMessageDeletionHandlerTest.kt$EphemeralMessageDeletionHandlerTest$ + NoConsecutiveBlankLines:FetchSSOSettingsUseCaseTest.kt$FetchSSOSettingsUseCaseTest$ + NoConsecutiveBlankLines:FlowTest.kt$FlowTest$ + NoConsecutiveBlankLines:GetOrRegisterClientUseCaseTest.kt$ + NoConsecutiveBlankLines:GetPublicAssetUseCaseTest.kt$GetPublicAssetUseCaseTest$ + NoConsecutiveBlankLines:GetUpdatedSelfTeamUseCaseTest.kt$GetUpdatedSelfTeamUseCaseTest$ + NoConsecutiveBlankLines:GetUserInfoUseCaseTest.kt$ + NoConsecutiveBlankLines:IgnoreJvm.kt$ + NoConsecutiveBlankLines:IsE2EIEnabledUseCaseArrangement.kt$ + NoConsecutiveBlankLines:JoinExistingMLSConversationsUseCaseTest.kt$JoinExistingMLSConversationsUseCaseTest.Arrangement$ + NoConsecutiveBlankLines:KaliumBuild.kt$ + NoConsecutiveBlankLines:KaliumPreferencesTest.kt$KaliumPreferencesTest$ + NoConsecutiveBlankLines:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest.Arrangement$ + NoConsecutiveBlankLines:LoginRepositoryTest.kt$LoginRepositoryTest$ + NoConsecutiveBlankLines:LogoutUseCaseTest.kt$ + NoConsecutiveBlankLines:MLSConversationRepositoryArrangement.kt$MLSConversationRepositoryArrangement$ + NoConsecutiveBlankLines:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$ + NoConsecutiveBlankLines:MLSConversationsVerificationStatusesHandlerTest.kt$MLSConversationsVerificationStatusesHandlerTest.Arrangement$ + NoConsecutiveBlankLines:MLSMessageCreatorTest.kt$MLSMessageCreatorTest$ + NoConsecutiveBlankLines:MLSMigrationConfigHandlerTest.kt$ + NoConsecutiveBlankLines:MemberDAOArrangement.kt$ + NoConsecutiveBlankLines:MemberDAOArrangement.kt$MemberDAOArrangementImpl$ + NoConsecutiveBlankLines:MemberDAOTest.kt$MemberDAOTest$ + NoConsecutiveBlankLines:MessageDAOBenchmarkTest.kt$MessageDAOBenchmarkTest$ + NoConsecutiveBlankLines:MessageMetadataDAOTest.kt$MessageMetadataDAOTest$ + NoConsecutiveBlankLines:MessageMetadataRepositoryTest.kt$MessageMetadataRepositoryTest$ + NoConsecutiveBlankLines:NeedsToRegisterClientUseCaseTest.kt$NeedsToRegisterClientUseCaseTest$ + NoConsecutiveBlankLines:NewConversationEventHandlerTest.kt$NewConversationEventHandlerTest.Arrangement$ + NoConsecutiveBlankLines:ObserveAllServicesUseCaseTest.kt$ObserveAllServicesUseCaseTest$ + NoConsecutiveBlankLines:ObserveSelfDeletingMessagesUseCaseTest.kt$ObserveSelfDeletingMessagesUseCaseTest$ + NoConsecutiveBlankLines:OneOnOneResolverArrangement.kt$ + NoConsecutiveBlankLines:PersistReactionUseCaseTest.kt$PersistReactionUseCaseTest$ + NoConsecutiveBlankLines:ProteusPreKeyRefillerTest.kt$ProteusPreKeyRefillerTest$ + NoConsecutiveBlankLines:RecipientDeliveryFailureMapperTest.kt$ + NoConsecutiveBlankLines:RegisterMLSClientUseCaseTest.kt$RegisterMLSClientUseCaseTest$ + NoConsecutiveBlankLines:RequestActivationCodeUseCaseTest.kt$RequestActivationCodeUseCaseTest$ + NoConsecutiveBlankLines:RestartSlowSyncProcessForRecoveryUseCaseTest.kt$RestartSlowSyncProcessForRecoveryUseCaseTest$ + NoConsecutiveBlankLines:RestoreBackupUseCaseTest.kt$RestoreBackupUseCaseTest.Arrangement$ + NoConsecutiveBlankLines:RevokeGuestRoomLinkUseCaseTest.kt$RevokeGuestRoomLinkUseCaseTest$ + NoConsecutiveBlankLines:ScheduleNewAssetMessageUseCaseTest.kt$ScheduleNewAssetMessageUseCaseTest.Arrangement$ + NoConsecutiveBlankLines:SearchByHandleUseCaseTest.kt$SearchByHandleUseCaseTest$ + NoConsecutiveBlankLines:SelfTeamIdProviderArrangement.kt$ + NoConsecutiveBlankLines:SendKnockUserCaseTest.kt$SendKnockUserCaseTest$ + NoConsecutiveBlankLines:SendKnockUserCaseTest.kt$SendKnockUserCaseTest.Arrangement$ + NoConsecutiveBlankLines:SendLocationUseCaseTest.kt$SendLocationUseCaseTest$ + NoConsecutiveBlankLines:SendLocationUseCaseTest.kt$SendLocationUseCaseTest.Arrangement$ + NoConsecutiveBlankLines:ServiceRepositoryTest.kt$ServiceRepositoryTest$ + NoConsecutiveBlankLines:SessionEstablisherTest.kt$SessionEstablisherTest.Arrangement$ + NoConsecutiveBlankLines:SessionRepositoryArrangement.kt$ + NoConsecutiveBlankLines:SetTestPreviewActiveUseCaseTest.kt$ + NoConsecutiveBlankLines:SetTestRemoteVideoStatesUseCaseTest.kt$ + NoConsecutiveBlankLines:SetTestVideoTypeUseCaseTest.kt$ + NoConsecutiveBlankLines:SlowSyncWorkerTest.kt$SlowSyncWorkerTest$ + NoConsecutiveBlankLines:StaleEpochVerifierTest.kt$StaleEpochVerifierTest$ + NoConsecutiveBlankLines:SupportedApiVersionTest.kt$SupportedApiVersionTest$ + NoConsecutiveBlankLines:SyncFeatureConfigsUseCaseTest.kt$SyncFeatureConfigsUseCaseTest$ + NoConsecutiveBlankLines:SyncManagerArrangement.kt$SyncManagerArrangementImpl$ + NoConsecutiveBlankLines:TeamRepositoryTest.kt$TeamRepositoryTest$ + NoConsecutiveBlankLines:UpdateApiVersionUseCaseTest.kt$UpdateApiVersionUseCaseTest$ + NoConsecutiveBlankLines:UpdateEmailUseCaseTest.kt$UpdateEmailUseCaseTest$ + NoConsecutiveBlankLines:VerifyActivationCodeUseCaseTest.kt$ + NoConsecutiveBlankLines:VerifyActivationCodeUseCaseTest.kt$VerifyActivationCodeUseCaseTest$ + NoConsecutiveBlankLines:VerifyExistingClientUseCaseTest.kt$ + NoMultipleSpaces:CheckRevocationListUseCaseTest.kt$CheckRevocationListUseCaseTest.Arrangement$ + NoMultipleSpaces:CommonDokkaConfig.kt$ + NoMultipleSpaces:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$ + NoMultipleSpaces:GetOrCreateOneToOneConversationUseCaseTest.kt$GetOrCreateOneToOneConversationUseCaseTest$ + NoMultipleSpaces:GlobalDBBaseTest.kt$GlobalDBBaseTest$ + NoMultipleSpaces:HttpClientConnectionSpecsTest.kt$HttpClientConnectionSpecsTest$ + NoMultipleSpaces:IgnoreIOS.kt$IgnoreIOS$ + NoMultipleSpaces:LeaveSubconversationUseCaseTest.kt$LeaveSubconversationUseCaseTest$ + NoMultipleSpaces:MessageMetadataRepositoryTest.kt$MessageMetadataRepositoryTest$ + NoMultipleSpaces:ServerConfigTest.kt$ServerConfigTest$ + NoMultipleSpaces:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest.Companion$ + NoMultipleSpaces:readBinaryResource.kt$ + NoSemicolons:ClientDAO.kt$ClientTypeEntity.LegalHold$; + NoSemicolons:ClientDAO.kt$DeviceTypeEntity.Unknown$; + NoSemicolons:ClientModel.kt$ClientCapability.LegalHoldImplicitConsent$; + NoSemicolons:ClientModel.kt$ClientType.LegalHold$; + NoSemicolons:ClientModel.kt$DeviceType.Unknown$; + NoSemicolons:ClientRequest.kt$MLSPublicKeyTypeDTO.ED25519$; + NoSemicolons:Conversation.kt$Conversation.Access.CODE$; + NoSemicolons:Conversation.kt$Conversation.AccessRole.EXTERNAL$; + NoSemicolons:FeatureConfigResponse.kt$FeatureFlagStatusDTO.DISABLED$; + NoSemicolons:GetAssetSizeLimitUseCaseTest.kt$; + NoSemicolons:IDs.kt$CryptoCertificateStatus.REVOKED$; + NoSemicolons:LogoutReason.kt$LogoutReason.SESSION_EXPIRED$; + NoSemicolons:MLSClient.kt$E2EIConversationState.NOT_ENABLED$; + NoSemicolons:MessageEntity.kt$MessageEntity.MemberChangeType.REMOVED_FROM_TEAM$; + NoSemicolons:NetworkErrorLabel.kt$AuthenticationCodeFailure.INVALID_OR_EXPIRED_AUTHENTICATION_CODE$; + NoSemicolons:ProteusException.kt$ProteusException.Code.LOCAL_FILES_NOT_FOUND$; + NoSemicolons:TeamPermission.kt$TeamPermission.SET_MEMBER_PERMISSIONS$; + NoSemicolons:UserDAO.kt$UserTypeEntity.NONE$; + NoSemicolons:UserType.kt$UserType.NONE$; + NoTrailingSpaces:CallRepositoryTest.kt$CallRepositoryTest$ + NoTrailingSpaces:ConversationRepositoryTest.kt$ConversationRepositoryTest$ + NoTrailingSpaces:CustomServerConfigRepositoryTest.kt$CustomServerConfigRepositoryTest.Arrangement$ + NoUnusedImports:ACMEActions.kt$action.ACMEActions.kt + NoUnusedImports:AddServiceToConversationUseCaseTest.kt$com.wire.kalium.logic.feature.conversation.AddServiceToConversationUseCaseTest.kt + NoUnusedImports:AppLockTeamFeatureConfigObserverTest.kt$com.wire.kalium.logic.feature.applock.AppLockTeamFeatureConfigObserverTest.kt + NoUnusedImports:CheckCrlRevocationListUseCaseTest.kt$com.wire.kalium.logic.feature.e2ei.CheckCrlRevocationListUseCaseTest.kt + NoUnusedImports:ClientRemoteRepositoryTest.kt$com.wire.kalium.logic.data.client.ClientRemoteRepositoryTest.kt + NoUnusedImports:ClientRepositoryTest.kt$com.wire.kalium.logic.data.client.ClientRepositoryTest.kt + NoUnusedImports:CommonUtilsTest.kt$com.wire.kalium.logic.util.CommonUtilsTest.kt + NoUnusedImports:ConversationApiV0Test.kt$com.wire.kalium.api.v0.conversation.ConversationApiV0Test.kt + NoUnusedImports:ConversationApiV5Test.kt$com.wire.kalium.api.v5.ConversationApiV5Test.kt + NoUnusedImports:ConversationDetailsResponse.kt$com.wire.kalium.model.conversation.ConversationDetailsResponse.kt + NoUnusedImports:DomainLookupUseCaseTest.kt$com.wire.kalium.logic.feature.auth.DomainLookupUseCaseTest.kt + NoUnusedImports:E2EIClientProviderTest.kt$com.wire.kalium.logic.client.E2EIClientProviderTest.kt + NoUnusedImports:EncryptedSettingsBuilderTest.kt$com.wire.kalium.persistence.kmmSettings.EncryptedSettingsBuilderTest.kt + NoUnusedImports:EnvelopeProtoMapperTest.kt$com.wire.kalium.api.v0.message.EnvelopeProtoMapperTest.kt + NoUnusedImports:FeatureConfigJson.kt$com.wire.kalium.model.FeatureConfigJson.kt + NoUnusedImports:FeatureConfigMapperTest.kt$com.wire.kalium.logic.data.event.FeatureConfigMapperTest.kt + NoUnusedImports:GetOtherUserClientsUseCaseTest.kt$com.wire.kalium.logic.feature.client.GetOtherUserClientsUseCaseTest.kt + NoUnusedImports:GetUserE2eiAllCertificateStatusesUseCaseTest.kt$com.wire.kalium.logic.feature.e2ei.GetUserE2eiAllCertificateStatusesUseCaseTest.kt + NoUnusedImports:MLSConversationRepositoryTest.kt$com.wire.kalium.logic.data.conversation.MLSConversationRepositoryTest.kt + NoUnusedImports:MarkMessagesAsNotifiedUseCaseTest.kt$com.wire.kalium.logic.feature.message.MarkMessagesAsNotifiedUseCaseTest.kt + NoUnusedImports:MessageRepositoryTest.kt$com.wire.kalium.logic.data.message.MessageRepositoryTest.kt + NoUnusedImports:NewClientDAOTest.kt$com.wire.kalium.persistence.dao.newclient.NewClientDAOTest.kt + NoUnusedImports:ObserveGuestRoomLinkUseCaseTest.kt$com.wire.kalium.logic.feature.conversation.guestroomlink.ObserveGuestRoomLinkUseCaseTest.kt + NoUnusedImports:ObserveIsServiceMemberUseCaseTest.kt$com.wire.kalium.logic.feature.service.ObserveIsServiceMemberUseCaseTest.kt + NoUnusedImports:ObserveScreenshotCensoringConfigUseCaseTest.kt$com.wire.kalium.logic.feature.user.screeenshotCensoring.ObserveScreenshotCensoringConfigUseCaseTest.kt + NoUnusedImports:QualifiedSendMessageRequestJson.kt$com.wire.kalium.model.QualifiedSendMessageRequestJson.kt + NoUnusedImports:ReceiptsMapperTest.kt$com.wire.kalium.logic.data.message.receipt.ReceiptsMapperTest.kt + NoUnusedImports:RegisterClientUseCaseTest.kt$com.wire.kalium.logic.feature.client.RegisterClientUseCaseTest.kt + NoUnusedImports:RequestSecondFactorVerificationCodeUseCaseTest.kt$com.wire.kalium.logic.feature.auth.verification.RequestSecondFactorVerificationCodeUseCaseTest.kt + NoUnusedImports:RestoreBackupUseCaseTest.kt$com.wire.kalium.logic.feature.backup.RestoreBackupUseCaseTest.kt + NoUnusedImports:SendButtonMessageCaseTest.kt$com.wire.kalium.logic.feature.message.composite.SendButtonMessageCaseTest.kt + NoUnusedImports:SendKnockUserCaseTest.kt$com.wire.kalium.logic.feature.message.SendKnockUserCaseTest.kt + NoUnusedImports:ServerConfigDTOJson.kt$util.ServerConfigDTOJson.kt + NoUnusedImports:SlowSyncRepositoryTest.kt$com.wire.kalium.logic.data.sync.SlowSyncRepositoryTest.kt + NoUnusedImports:StaleEpochVerifierTest.kt$com.wire.kalium.logic.feature.message.StaleEpochVerifierTest.kt + NoUnusedImports:SyncMigrationStepsProviderArrangement.kt$com.wire.kalium.logic.util.arrangement.provider.SyncMigrationStepsProviderArrangement.kt + NoUnusedImports:SyncSelfTeamUseCaseTest.kt$com.wire.kalium.logic.feature.team.SyncSelfTeamUseCaseTest.kt + NoUnusedImports:TestNetworkStateObserver.kt$.TestNetworkStateObserver.kt + NoUnusedImports:UpdateClientVerificationStatusUseCaseTest.kt$com.wire.kalium.logic.feature.client.UpdateClientVerificationStatusUseCaseTest.kt + NoUnusedImports:UpdateConversationArchivedStatusUseCaseTest.kt$com.wire.kalium.logic.feature.conversation.UpdateConversationArchivedStatusUseCaseTest.kt + NoUnusedImports:UserConfigRepositoryArrangement.kt$com.wire.kalium.logic.util.arrangement.repository.UserConfigRepositoryArrangement.kt + NoUnusedImports:UserConfigStorageTest.kt$com.wire.kalium.persistence.config.UserConfigStorageTest.kt + NoUnusedImports:UserDetailsApiV4Test.kt$com.wire.kalium.api.v4.UserDetailsApiV4Test.kt + NoUnusedImports:ValidateSSOCodeUseCaseTest.kt$com.wire.kalium.logic.feature.auth.sso.ValidateSSOCodeUseCaseTest.kt + NoWildcardImports:ACMEApiTest.kt$import com.wire.kalium.network.api.base.unbound.acme.* + NoWildcardImports:ACMEApiTest.kt$import io.ktor.http.* + NoWildcardImports:ACMEApiTest.kt$import kotlin.test.* + NoWildcardImports:ConversionDAOArrangement.kt$import io.mockative.* + NoWildcardImports:UpdateAssetMessageTransferStatusUseCaseTest.kt$import io.mockative.* + ObjectPropertyNaming:Decoder.module_@wireapp_cbor.kt$Decoder.Companion$var _check_overflow: Any + PackageName:TestKaliumDispatcher.kt$package com.wire.kalium.logic.test_util + PackageName:TestNetworkException.kt$package com.wire.kalium.logic.test_util + PackageName:TimeUtils.kt$package com.wire.kalium.logic.test_util + ParameterListWrapping:ACMEApi.kt$ACMEApi$(url: String, body: ByteArray? = null) + ParameterListWrapping:AccessTokenApiV0.kt$AccessTokenApiV0$(refreshToken: String, clientId: String?) + ParameterListWrapping:AccessTokenApiV3.kt$AccessTokenApiV3$(refreshToken: String, clientId: String?) + ParameterListWrapping:AccountsDAO.kt$AccountsDAO$(userIDEntity: UserIDEntity, ssoIdEntity: SsoIdEntity?, managedBy: ManagedByEntity?) + ParameterListWrapping:AddMemberToConversationUseCase.kt$AddMemberToConversationUseCaseImpl$(conversationId: ConversationId, userIdList: List<UserId>) + ParameterListWrapping:ApiTest.kt$ApiTest$(expectedHost: String) + ParameterListWrapping:ApiTest.kt$ApiTest$(name: String, hasValue: String) + ParameterListWrapping:ApiTest.kt$ApiTest$(pathAndQuery: String) + ParameterListWrapping:AssetApi.kt$AssetApi$(assetId: String, assetDomain: String?, assetToken: String?, tempFileSink: Sink) + ParameterListWrapping:AssetApiV0.kt$AssetApiV0$(assetId: String, assetDomain: String?) + ParameterListWrapping:AssetMapper.kt$AssetMapper$(uploadAssetMetadata: UploadAssetData, kaliumFileSystem: KaliumFileSystem) + ParameterListWrapping:AssetMapper.kt$AssetMapperImpl$(uploadAssetMetadata: UploadAssetData, kaliumFileSystem: KaliumFileSystem) + ParameterListWrapping:BaseDatabaseTest.kt$BaseDatabaseTest$( userId: UserIDEntity, passphrase: UserDBSecret?, enableWAL: Boolean) + ParameterListWrapping:ClientApiV2.kt$ClientApiV2$(userIds: List<UserId>) + ParameterListWrapping:ClientDAO.kt$ClientDAO$(redundantClientsOfUsers: Map<UserIDEntity, List<String>>) + ParameterListWrapping:ClientRegistrationStorageImpl.kt$ClientRegistrationStorageImpl$(retainedClientId: String) + ParameterListWrapping:ClientRepository.kt$ClientDataSource$(token: String) + ParameterListWrapping:ClientRepository.kt$ClientRepository$(clients: List<InsertClientParam>) + ParameterListWrapping:ClientRepository.kt$ClientRepository$(conversationId: ConversationId) + ParameterListWrapping:ClientRepository.kt$ClientRepository$(userId: UserId, clientId: ClientId) + ParameterListWrapping:CommitBundleEventReceiver.kt$CommitBundleEventReceiverImpl$(event: Event.Conversation, deliveryInfo: EventDeliveryInfo) + ParameterListWrapping:CompositeMessageDAO.kt$CompositeMessageDAOImpl$(messageId: String, conversationId: QualifiedIDEntity, buttonId: String) + ParameterListWrapping:ConnectionRepository.kt$ConnectionRepository$(userId: UserId, connectionState: ConnectionState) + ParameterListWrapping:ConversationDAO.kt$ConversationDAO$(conversationID: QualifiedIDEntity, receiptMode: ConversationEntity.ReceiptMode) + ParameterListWrapping:ConversationDAO.kt$ConversationDAO$(conversationId: QualifiedIDEntity, legalHoldStatus: ConversationEntity.LegalHoldStatus) + ParameterListWrapping:ConversationDAO.kt$ConversationDAO$(conversationId: QualifiedIDEntity, protocol: ConversationEntity.Protocol) + ParameterListWrapping:ConversationDAO.kt$ConversationDAO$(verificationStatus: ConversationEntity.VerificationStatus, conversationId: QualifiedIDEntity) + ParameterListWrapping:ConversationEventReceiver.kt$ConversationEventReceiverImpl$(event: Event.Conversation, deliveryInfo: EventDeliveryInfo) + ParameterListWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Arrangement$(result: Array<NetworkResponse<ConversationResponse>>) + ParameterListWrapping:ConversationMapper.kt$ConversationMapper$(apiModel: ConversationResponse, mlsGroupState: GroupState?, selfUserTeamId: TeamId?) + ParameterListWrapping:ConversationMapper.kt$ConversationMapper$(name: String?, members: List<UserId>, teamId: String?, options: ConversationOptions) + ParameterListWrapping:ConversationMapper.kt$ConversationMapper$(verificationStatus: Conversation.VerificationStatus) + ParameterListWrapping:ConversationMapper.kt$ConversationMapper$(verificationStatus: ConversationEntity.VerificationStatus) + ParameterListWrapping:ConversationMapper.kt$ConversationMapperImpl$(conversationId: NetworkQualifiedId) + ParameterListWrapping:ConversationRepository.kt$ConversationDataSource$(conversationID: ConversationId) + ParameterListWrapping:ConversationRepository.kt$ConversationDataSource$(conversationId: ConversationId) + ParameterListWrapping:ConversationRepository.kt$ConversationDataSource$(qualifiedID: QualifiedID, date: Instant) + ParameterListWrapping:ConversationRepository.kt$ConversationRepository$(conversationID: ConversationId) + ParameterListWrapping:ConversationRepository.kt$ConversationRepository$(conversationId: ConversationId) + ParameterListWrapping:ConversationRepository.kt$ConversationRepository$(conversationId: ConversationId, protocol: Conversation.Protocol) + ParameterListWrapping:ConversationRepository.kt$ConversationRepository$(conversationId: ConversationId, selfDeletionTimer: SelfDeletionTimer) + ParameterListWrapping:ConversationRepository.kt$ConversationRepository$(conversationId: ConversationId, userIDList: List<UserId>) + ParameterListWrapping:ConversationRepository.kt$ConversationRepository$(teamId: TeamId) + ParameterListWrapping:ConversationRepositoryArrangement.kt$ConversationRepositoryArrangement$(isInformed: Either<StorageFailure, Boolean>) + ParameterListWrapping:ConversationRepositoryArrangement.kt$ConversationRepositoryArrangement$(result: Either<StorageFailure, Conversation.ProtocolInfo>) + ParameterListWrapping:ConversationRepositoryArrangement.kt$ConversationRepositoryArrangement$(result: Either<StorageFailure, ConversationDetails>) + ParameterListWrapping:ConversationResources.kt$ConversationResources$(@PathParam("id") id: String, @Valid request: SendButtonActionConfirmationRequest) + ParameterListWrapping:ConversationStatusMapper.kt$ConversationStatusMapperImpl$(mutedStatus: MutedConversationStatus, mutedStatusTimestamp: Long) + ParameterListWrapping:CreateBackupUseCase.kt$CreateBackupResult.Success$(val backupFilePath: Path, val backupFileSize: Long, val backupFileName: String) + ParameterListWrapping:CustomServerConfigRepository.kt$CustomServerConfigRepository$(date: String) + ParameterListWrapping:CustomServerConfigRepository.kt$CustomServerConfigRepository$(links: ServerConfig.Links, metadata: ServerConfig.MetaData) + ParameterListWrapping:DeleteMessageUseCase.kt$DeleteMessageUseCase$(conversationId: ConversationId, messageId: String, deleteForEveryone: Boolean) + ParameterListWrapping:E2EIApiV0.kt$E2EIApiV0$(clientId: String) + ParameterListWrapping:E2EIClientTest.kt$E2EIClientTest.SampleUser$( val id: CryptoQualifiedID, val clientId: CryptoClientId, val name: String, val handle: String, val teamId: String? = "" ) + ParameterListWrapping:E2EIRepository.kt$E2EIRepository$(certificateChain: String, isNewClient: Boolean = false) + ParameterListWrapping:E2EIRepository.kt$E2EIRepository$(prevNonce: Nonce, createOrderEndpoint: String) + ParameterListWrapping:E2eiCertificate.kt$E2eiCertificate.Companion$(identity: WireIdentity, certificateStatusMapper: CertificateStatusMapper) + ParameterListWrapping:Either.kt$(initialValue: R, fn: (item: T, accumulated: R) -> Either<L, R>) + ParameterListWrapping:Either.kt$(item: T, accumulated: R) + ParameterListWrapping:EnrollE2EIUseCase.kt$EnrollE2EIUseCase$(isNewClientRegistration: Boolean = false) + ParameterListWrapping:EnrollE2EIUseCase.kt$EnrollE2EIUseCaseImpl$(isNewClientRegistration: Boolean) + ParameterListWrapping:EphemeralEventsNotificationManagerImpl.kt$EphemeralEventsNotificationManager$(ephemeralConversationNotification: EphemeralConversationNotification) + ParameterListWrapping:FakeSecondFactorVerificationRepository.kt$FakeSecondFactorVerificationRepository$(email: String, verifiableAction: VerifiableAction) + ParameterListWrapping:FederationEventReceiverTest.kt$FederationEventReceiverTest$(conversationId: ConversationId, otherUserId: UserId) + ParameterListWrapping:GetMembersE2EICertificateStatusesUseCase.kt$GetMembersE2EICertificateStatusesUseCaseImpl$(conversationId: ConversationId, userIds: List<UserId>) + ParameterListWrapping:GetServerConfigUseCase.kt$GetServerConfigUseCase$(url: String) + ParameterListWrapping:ImportClientUseCase.kt$ImportClientUseCase$(clientId: ClientId, registerClientParam: RegisterClientUseCase.RegisterClientParam) + ParameterListWrapping:IsEligibleToStartCallUseCase.kt$IsEligibleToStartCallUseCase$(conversationId: ConversationId, conversationType: Conversation.Type) + ParameterListWrapping:JoinSubconversationUseCase.kt$JoinSubconversationUseCase$(conversationId: ConversationId, subconversationId: SubconversationId) + ParameterListWrapping:KaliumFileSystemImpl.kt$KaliumFileSystemImpl$(assetName: String) + ParameterListWrapping:LeaveConversationEventAction.kt$LeaveConversationEventAction$(monkeyPool: MonkeyPool, conversationPool: ConversationPool) + ParameterListWrapping:LeaveSubconversationUseCase.kt$LeaveSubconversationUseCase$(conversationId: ConversationId, subconversationId: SubconversationId) + ParameterListWrapping:LeaveSubconversationUseCase.kt$LeaveSubconversationUseCaseImpl$(conversationId: ConversationId, subconversationId: SubconversationId) + ParameterListWrapping:LegalHoldHandler.kt$LegalHoldHandler$(message: MessageUnpackResult.ApplicationMessage, isLive: Boolean) + ParameterListWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest.Companion$(legalHoldStatus: Conversation.LegalHoldStatus) + ParameterListWrapping:LocalNotificationMessageMapper.kt$LocalNotificationMessageMapper$(message: Message, messageContent: MessageContent.TextEdited) + ParameterListWrapping:MLSConversationRepository.kt$MLSConversationRepository$(groupID: GroupID, clientIdList: List<QualifiedClientID>) + ParameterListWrapping:MLSConversationsVerificationStatusesHandler.kt$MLSConversationsVerificationStatusesHandlerImpl$(newStatusFromCC: VerificationStatus, currentStatus: VerificationStatus) + ParameterListWrapping:MLSMessageUnpacker.kt$MLSMessageUnpacker$(bundle: DecryptedMessageBundle, conversationId: ConversationId, timestamp: Instant) + ParameterListWrapping:MLSMessageUnpacker.kt$MLSMessageUnpacker$(event: Event.Conversation.NewMLSMessage) + ParameterListWrapping:MemberDAO.kt$MemberDAO$(conversationId: QualifiedIDEntity, userId: UserIDEntity, role: MemberEntity.Role) + ParameterListWrapping:MembersToMentionUseCase.kt$MembersToMentionUseCase$(conversationId: ConversationId, searchQuery: String) + ParameterListWrapping:MessageDAO.kt$MessageDAO$(conversationId: QualifiedIDEntity, messageId: String, newMembers: List<QualifiedIDEntity>) + ParameterListWrapping:MessageDAO.kt$MessageDAO$(messageId: String, conversationId: QualifiedIDEntity) + ParameterListWrapping:MessageDAO.kt$MessageDAO$(transferStatus: AssetTransferStatusEntity, id: String, conversationId: QualifiedIDEntity) + ParameterListWrapping:MessageDraftRepository.kt$MessageDraftRepository$(conversationId: ConversationId, messageDraft: MessageDraft) + ParameterListWrapping:MessageEntity.kt$MessageEntityContent.LegalHold$(val memberUserIdList: List<QualifiedIDEntity>, val type: MessageEntity.LegalHoldType) + ParameterListWrapping:MessageMapper.kt$MessageMapperImpl$(regularMessage: MessageContent.Regular) + ParameterListWrapping:MessageMetadataRepository.kt$MessageMetadataSource$(conversationId: ConversationId, messageId: MessageId) + ParameterListWrapping:MessageSender.kt$MessageSenderImpl$(envelope: MessageEnvelope, message: Message, messageSent: MessageSent) + ParameterListWrapping:NewGroupConversationSystemMessagesCreator.kt$NewGroupConversationSystemMessagesCreator$(conversationId: ConversationIDEntity, validUsers: List<UserId>) + ParameterListWrapping:NotificationApiV0.kt$NotificationApiV0$(querySize: Int, queryClient: String) + ParameterListWrapping:ObserveConversationInteractionAvailabilityUseCase.kt$ObserveConversationInteractionAvailabilityUseCase$(conversationId: ConversationId) + ParameterListWrapping:ObserveMessageReactionsUseCaseTest.kt$ObserveMessageReactionsUseCaseTest.<no name provided>$(conversationId: ConversationId, messageId: String) + ParameterListWrapping:ObserveSelfDeletionTimerSettingsForConversationUseCase.kt$ObserveSelfDeletionTimerSettingsForConversationUseCase$(conversationId: ConversationId, considerSelfUserSettings: Boolean) + ParameterListWrapping:ObserveUsersTypingUseCase.kt$ObserveUsersTypingUseCaseImpl$(conversationId: ConversationId) + ParameterListWrapping:OnMissedCall.kt$OnMissedCall$(conversationId: String, messageTime: Uint32_t, userId: String, isVideoCall: Boolean, arg: Pointer?) + ParameterListWrapping:OnParticipantsVideoStateChanged.kt$OnParticipantsVideoStateChanged$(conversationId: String, userId: String, clientId: String, state: Int, arg: Pointer?) + ParameterListWrapping:PersistMigratedMessagesUseCase.kt$PersistMigratedMessagesUseCaseImpl$(messages: List<MigratedMessage>, coroutineScope: CoroutineScope) + ParameterListWrapping:PersistNewSelfDeletionTimerUseCase.kt$PersistNewSelfDeletionTimerUseCaseImpl$(conversationId: ConversationId, newSelfDeletionTimer: SelfDeletionTimer) + ParameterListWrapping:PlatformUserStorageProvider.kt$PlatformUserStorageProvider$(userId: UserId, shouldEncryptData: Boolean, platformProperties: PlatformUserStorageProperties) + ParameterListWrapping:ProteusClientCryptoBoxImpl.kt$ProteusClientCryptoBoxImpl.Companion$(localIdentityKey: IdentityKey, preKey: com.wire.kalium.cryptography.externals.PreKey) + ParameterListWrapping:RemoteMonkey.kt$RemoteMonkey$(monkeyConfig: MonkeyConfig.Remote, monkeyType: MonkeyType, internalId: MonkeyId) + ParameterListWrapping:RemoveMemberFromConversationUseCase.kt$RemoveMemberFromConversationUseCaseImpl$(conversationId: ConversationId, userIdToRemove: UserId) + ParameterListWrapping:RestoreWebBackupUseCase.kt$RestoreWebBackupUseCaseImpl$(filePath: Path, coroutineScope: CoroutineScope) + ParameterListWrapping:SaveMessageDraftUseCase.kt$SaveMessageDraftUseCaseImpl$(conversationId: ConversationId, messageDraft: MessageDraft) + ParameterListWrapping:SearchDAO.kt$SearchDAO$(conversationId: ConversationIDEntity, query: String) + ParameterListWrapping:SendKnockUseCase.kt$SendKnockUseCase$(conversationId: ConversationId, hotKnock: Boolean) + ParameterListWrapping:ServerConfigRepository.kt$ServerConfigRepository$(links: ServerConfig.Links, metadata: ServerConfig.MetaData) + ParameterListWrapping:SessionRepository.kt$SessionRepository$(userId: UserId, isPersistentWebSocketEnabled: Boolean) + ParameterListWrapping:SessionRepository.kt$SessionRepository$(userId: UserId, ssoId: SsoId?, managedBy: ManagedByDTO?) + ParameterListWrapping:SessionResetSender.kt$SessionResetSender$(conversationId: ConversationId, userId: UserId, clientId: ClientId) + ParameterListWrapping:StoreServerConfigUseCase.kt$StoreServerConfigUseCase$(links: ServerConfig.Links, versionInfo: ServerConfig.VersionInfo) + ParameterListWrapping:TeamsApi.kt$TeamsApi$(teamId: TeamId, limitTo: Int?, pagingState: String? = null) + ParameterListWrapping:TeamsApi.kt$TeamsApi$(teamId: TeamId, size: Int = DEFAULT_SERVICES_SIZE) + ParameterListWrapping:TeamsApi.kt$TeamsApi$(teamId: TeamId, teamMemberIdList: TeamMemberIdList) + ParameterListWrapping:TeamsApi.kt$TeamsApi$(teamId: TeamId, userId: NonQualifiedUserId) + ParameterListWrapping:TeamsApi.kt$TeamsApi$(teamId: TeamId, userId: NonQualifiedUserId, password: String?) + ParameterListWrapping:UpdateApiVersionsUseCase.kt$UpdateApiVersionsUseCaseImpl$(serverConfig: ServerConfig, proxyCredentials: ProxyCredentials?) + ParameterListWrapping:UpdateConversationProtocolResponse.kt$UpdateConversationProtocolResponse.ProtocolUpdated$(val event: EventContentDTO.Conversation.ProtocolUpdate) + ParameterListWrapping:UpdateConversationReceiptModeResponse.kt$UpdateConversationReceiptModeResponse.ReceiptModeUpdated$(val event: EventContentDTO.Conversation.ReceiptModeUpdate) + ParameterListWrapping:UserDAO.kt$UserDAO$(connectionState: ConnectionEntity.State) + ParameterListWrapping:UserDAO.kt$UserDAO$(qualifiedID: QualifiedIDEntity) + ParameterListWrapping:UserDatabaseDataGenerator.kt$UserDatabaseDataGenerator$(conversationAmount: Int) + ParameterListWrapping:UserRepository.kt$UserDataSource$(newName: String?, newAccent: Int?, newAssetId: String?) + ParameterListWrapping:UserRepository.kt$UserRepository$(conversationId: ConversationId) + ParameterListWrapping:UserRepository.kt$UserRepository$(newName: String? = null, newAccent: Int? = null, newAssetId: String? = null) + ParameterListWrapping:UserRepository.kt$UserRepository$(userId: UserId) + ParameterListWrapping:ValidateUserHandleUseCase.kt$ValidateUserHandleResult.Invalid$(handleWithoutInvalidCharacters: String) + ParameterWrapping:ConversationResponse.kt$ConversationMemberDTO.Self$@SerialName("otr_muted_status") @Serializable(with = MutedStatusSerializer::class) val otrMutedStatus: MutedStatus? = null + ParameterWrapping:EventContentDTO.kt$EventContentDTO.Conversation.MemberJoinDTO$@Deprecated("use qualifiedFrom", replaceWith = ReplaceWith("this.qualifiedFrom")) @SerialName("from") val from: String + ParameterWrapping:MemberUpdateDTO.kt$MemberUpdateDTO$@SerialName("otr_muted_status") @Serializable(with = MutedStatusSerializer::class) val otrMutedStatus: MutedStatus? = null + ParameterWrapping:SlowSyncManager.kt$SlowSyncManager$private val exponentialDurationHelper: ExponentialDurationHelper = ExponentialDurationHelperImpl(MIN_RETRY_DELAY, MAX_RETRY_DELAY) + ParameterWrapping:UpdateApiVersionsUseCase.kt$UpdateApiVersionsUseCaseImpl$private val serverConfigRepoProvider: (serverConfig: ServerConfig, proxyCredentials: ProxyCredentials?) -> ServerConfigRepository + PropertyWrapping:AccessTokenRefresherTest.kt$AccessTokenRefresherTest$val expected = AccountTokens(userId = TestUser.USER_ID, TEST_REFRESH_RESULT.accessToken, TEST_REFRESH_RESULT.refreshToken, null) + PropertyWrapping:AssetRepository.kt$AssetDataSource$val uploadAssetData = UploadAssetData(tempEncryptedDataPath, encryptedDataSize, mimeType, false, RetentionType.PERSISTENT) + PropertyWrapping:BackupCoder.kt$BackupCoder$val expectedHashedUserId = hashUserId(userId, decodedHeader.salt, decodedHeader.opslimit, decodedHeader.memlimit) + PropertyWrapping:ClearUsersTypingEventsUseCaseTest.kt$ClearUsersTypingEventsUseCaseTest.Arrangement$@Mock val typingIndicatorIncomingRepository: TypingIndicatorIncomingRepository = mock(TypingIndicatorIncomingRepository::class) + PropertyWrapping:CommitBundleEventReceiver.kt$CommitBundleEventReceiverImpl$val exception = IllegalArgumentException("Unexpected event received by commit bundle: ${event.toLogString()}") + PropertyWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$val expectedInitialUsers = listOf(TestConversation.USER_1, TestUser.OTHER_FEDERATED_USER_ID_2, TestUser.OTHER_FEDERATED_USER_ID) + PropertyWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$val expectedInitialUsers = listOf(TestConversation.USER_1.copy(domain = failedDomain), TestUser.OTHER_FEDERATED_USER_ID) + PropertyWrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest.Arrangement$@Mock val joinExistingMLSConversation: JoinExistingMLSConversationUseCase = mock(JoinExistingMLSConversationUseCase::class) + PropertyWrapping:ConversationMessageTimerEventHandlerTest.kt$ConversationMessageTimerEventHandlerTest.Arrangement$private val conversationMessageTimerEventHandler: ConversationMessageTimerEventHandler = ConversationMessageTimerEventHandlerImpl( conversationDAO, persistMessageUseCase ) + PropertyWrapping:CreateGroupConversationUseCaseTest.kt$CreateGroupConversationUseCaseTest$val conversationOptions = ConversationOptions(protocol = ConversationOptions.Protocol.MLS, creatorClientId = creatorClientId) + PropertyWrapping:DeleteClientUseCaseTest.kt$DeleteClientUseCaseTest.Arrangement$@Mock val updateSupportedProtocolsAndResolveOneOnOnes = mock(classOf<UpdateSupportedProtocolsAndResolveOneOnOnesUseCase>()) + PropertyWrapping:EphemeralMessageDeletionHandlerTest.kt$EphemeralMessageDeletionHandlerTest.Arrangement$@Mock val deleteEphemeralMessageForSelfUserAsSender = mock(classOf<DeleteEphemeralMessageForSelfUserAsSenderUseCase>()) + PropertyWrapping:EventRepositoryTest.kt$EventRepositoryTest.Arrangement$private val eventRepository: EventRepository = EventDataSource(notificationApi, metaDAO, clientIdProvider, TestUser.SELF.id) + PropertyWrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest.Arrangement$@Mock val updateSupportedProtocolsAndResolveOneOnOnes = mock(classOf<UpdateSupportedProtocolsAndResolveOneOnOnesUseCase>()) + PropertyWrapping:FederationEventReceiverTest.kt$FederationEventReceiverTest$val defederatedUserIdList = List(defederatedUsersCount) { UserId(value = "defId$it", domain = defederatedDomain) } + PropertyWrapping:FederationEventReceiverTest.kt$FederationEventReceiverTest$val defederatedUserIdListTwo = List(defederatedUsersCountTwo) { UserId(value = "defIdTwo$it", domain = defederatedDomainTwo) } + PropertyWrapping:IncrementalSyncManagerTest.kt$IncrementalSyncManagerTest.Arrangement$@Mock val incrementalSyncRepository = configure(mock(classOf<IncrementalSyncRepository>())) { stubsUnitByDefault = true } + PropertyWrapping:LegalHoldHandler.kt$LegalHoldHandlerImpl$val isStatusChangedForConversation = handleForConversation(conversationId, newStatus, systemMessageTimestampIso) + PropertyWrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest.Arrangement$@Mock val legalHoldSystemMessagesHandler = configure(mock(LegalHoldSystemMessagesHandler::class)) { stubsUnitByDefault = true } + PropertyWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$val legalHoldMessage = testLegalHoldSystemMessage(MessageContent.LegalHold.ForMembers.Disabled(listOf(TestUser.OTHER_USER_ID_2))) + PropertyWrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$val legalHoldMessage = testLegalHoldSystemMessage(MessageContent.LegalHold.ForMembers.Enabled(listOf(TestUser.OTHER_USER_ID_2))) + PropertyWrapping:LoginUseCaseTest.kt$LoginUseCaseTest$val loginUserCaseResult = loginUseCase(TEST_EMAIL, TEST_PASSWORD, TEST_PERSIST_CLIENT, TEST_LABEL, TEST_2FA_CODE) + PropertyWrapping:LoginUseCaseTest.kt$LoginUseCaseTest$val loginUserCaseResult = loginUseCase(dirtyEmail, TEST_PASSWORD, TEST_PERSIST_CLIENT, TEST_LABEL, TEST_2FA_CODE) + PropertyWrapping:LoginUseCaseTest.kt$LoginUseCaseTest$val loginUserCaseResult = loginUseCase(dirtyHandle, TEST_PASSWORD, TEST_PERSIST_CLIENT, TEST_LABEL, TEST_2FA_CODE) + PropertyWrapping:LoginUseCaseTest.kt$LoginUseCaseTest.Arrangement$val secondFactorVerificationRepository: SecondFactorVerificationRepository = FakeSecondFactorVerificationRepository() + PropertyWrapping:LogoutUseCaseTest.kt$LogoutUseCaseTest.Arrangement$@Mock val userSessionScopeProvider = configure(mock(classOf<UserSessionScopeProvider>())) { stubsUnitByDefault = true } + PropertyWrapping:LogoutUseCaseTest.kt$LogoutUseCaseTest.Arrangement$@Mock val userSessionWorkScheduler = configure(mock(classOf<UserSessionWorkScheduler>())) { stubsUnitByDefault = true } + PropertyWrapping:MLSClientImpl.kt$MLSClientImpl$private val defaultGroupConfiguration = CustomConfiguration(keyRotationDuration.toJavaDuration(), MlsWirePolicy.PLAINTEXT) + PropertyWrapping:MLSWelcomeEventHandlerTest.kt$MLSWelcomeEventHandlerTest.Arrangement$@Mock val certificateRevocationListRepository: CertificateRevocationListRepository = mock(classOf<CertificateRevocationListRepository>()) + PropertyWrapping:MarkLegalHoldChangeAsNotifiedForSelfUseCaseTest.kt$MarkLegalHoldChangeAsNotifiedForSelfUseCaseTest.Arrangement$val useCase: MarkLegalHoldChangeAsNotifiedForSelfUseCase = MarkLegalHoldChangeAsNotifiedForSelfUseCaseImpl(userConfigRepository) + PropertyWrapping:MemberChangeEventHandlerTest.kt$MemberChangeEventHandlerTest.Arrangement$private val memberChangeEventHandler: MemberChangeEventHandler = MemberChangeEventHandlerImpl(conversationRepository) + PropertyWrapping:MessageDAOImpl.kt$MessageDAOImpl$override val platformExtensions: MessageExtensions = MessageExtensionsImpl(queries, assetViewQueries, mapper, coroutineContext) + PropertyWrapping:MessageLegalHoldTest.kt$MessageLegalHoldTest.Companion$val ORIGINAL_MESSAGE = newSystemMessageEntity(ORIGINAL_MESSAGE_ID, ORIGINAL_CONTENT, CONVERSATION_ID, OTHER_USER.id) + PropertyWrapping:MessageScope.kt$MessageScope$val deleteEphemeralMessageEndDate: DeleteEphemeralMessagesAfterEndDateUseCase = DeleteEphemeralMessagesAfterEndDateUseCaseImpl( ephemeralMessageDeletionHandler = ephemeralMessageDeletionHandler ) + PropertyWrapping:MessageSendFailureHandlerTest.kt$MessageSendFailureHandlerTest$val failureData = ProteusSendMessageFailure(mapOf(arrangement.userOne, arrangement.userTwo), mapOf(), mapOf(), null) + PropertyWrapping:MimeTypeUtil.kt$private val mimeTypeToExtensionMap: Map<String, String> = // TODO: remove after all platforms have their own proper implementations mapOf( "image/jpg" to "jpg", "image/jpeg" to "jpeg", "image/png" to "png", "image/heic" to "heic", "image/gif" to "gif", "image/webp" to "webp", "audio/mpeg" to "mp3", "audio/ogg" to "ogg", "audio/wav" to "wav", "audio/x-wav" to "wav", "audio/x-pn-wav" to "wav", "video/mp4" to "mp4", "video/webm" to "webm", "video/3gpp" to "3gpp", "video/mkv" to "mkv" ) + PropertyWrapping:MimeTypeUtil.kt$private val mimeTypeToExtensionMap: Map<String, String> = // TODO: remove after all platforms have their own proper implementations mapOf( "image/jpg" to "jpg", "image/jpeg" to "jpeg", "image/png" to "png", "image/heic" to "heic", "image/gif" to "gif", "image/webp" to "webp", "audio/mpeg" to "mp3", "audio/ogg" to "ogg", "audio/wav" to "wav", "audio/x-wav" to "wav", "audio/x-pn-wav" to "wav", "video/mp4" to "mp4", "video/webm" to "webm", "video/3gpp" to "3gpp", "video/mkv" to "mkv", "application/zip" to "zip", "application/pdf" to "pdf" ) + PropertyWrapping:ObserveNewClientsUseCaseTest.kt$ObserveNewClientsUseCaseTest.Arrangement$@Mock val userClientRepositoryProvider = configure(mock(classOf<UserClientRepositoryProvider>())) { stubsUnitByDefault = true } + PropertyWrapping:ObserveSelfDeletionTimerSettingsForConversationUseCaseArrangement.kt$ObserveSelfDeletionTimerSettingsForConversationUseCaseArrangementImpl$@Mock override val observeSelfDeletionTimerSettingsForConversation: ObserveSelfDeletionTimerSettingsForConversationUseCase = mock(ObserveSelfDeletionTimerSettingsForConversationUseCase::class) + PropertyWrapping:OneOnOneResolverTest.kt$OneOnOneResolverTest$val oneOnOneUsers = listOf(TestUser.OTHER.copy(id = TestUser.OTHER_USER_ID), TestUser.OTHER.copy(id = TestUser.OTHER_USER_ID_2)) + PropertyWrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$val decryptedMessage = toByteArray(coreCrypto.proteusSessionFromMessage(sessionId.value, toUByteList(message))) + PropertyWrapping:ProteusMessageUnpacker.kt$ProteusMessageUnpackerImpl$val rootCause = IllegalArgumentException("Null external content when processing external message instructions.") + PropertyWrapping:ProteusMessageUnpacker.kt$ProteusMessageUnpackerImpl$val rootCause = IllegalArgumentException("ΠΌΠ°Ρ‚Ρ€Ρ‘ΡˆΠΊΠ°! External message can't contain another external message inside!") + PropertyWrapping:ProteusMessageUnpackerTest.kt$ProteusMessageUnpackerTest$val encryptedProtobufExternalContent = encryptDataWithAES256(PlainData(protobufExternalContent.encodeToByteArray()), aesKey) + PropertyWrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$val genericMessage = GenericMessage(TEST_MESSAGE_UUID, GenericMessage.Content.Edited(MessageEdit(replacedMessageId, textContent))) + PropertyWrapping:RegisterClientUseCaseTest.kt$RegisterClientUseCaseTest.Arrangement$val secondFactorVerificationRepository: SecondFactorVerificationRepository = FakeSecondFactorVerificationRepository() + PropertyWrapping:RenamedConversationEventHandlerTest.kt$RenamedConversationEventHandlerTest.Arrangement$private val renamedConversationEventHandler: RenamedConversationEventHandler = RenamedConversationEventHandlerImpl( conversationDao, persistMessage ) + PropertyWrapping:ScheduleNewAssetMessageUseCaseTest.kt$ScheduleNewAssetMessageUseCaseTest.Arrangement$@Mock val observeSelfDeletionTimerSettingsForConversation = mock(classOf<ObserveSelfDeletionTimerSettingsForConversationUseCase>()) + PropertyWrapping:SendButtonMessageCaseTest.kt$SendButtonMessageCaseTest.Arrangement$@Mock val messageSendFailureHandler = configure(mock(classOf<MessageSendFailureHandler>())) { stubsUnitByDefault = true } + PropertyWrapping:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest$val result = sendEditTextMessage(TestConversation.ID, originalMessageId, editedMessageText, listOf(), editedMessageId) + PropertyWrapping:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest.Arrangement$@Mock val messageSendFailureHandler = configure(mock(classOf<MessageSendFailureHandler>())) { stubsUnitByDefault = true } + PropertyWrapping:SendKnockUserCaseTest.kt$SendKnockUserCaseTest.Arrangement$@Mock val messageSendFailureHandler = configure(mock(classOf<MessageSendFailureHandler>())) { stubsUnitByDefault = true } + PropertyWrapping:SendLocationUseCaseTest.kt$SendLocationUseCaseTest.Arrangement$@Mock val messageSendFailureHandler = configure(mock(classOf<MessageSendFailureHandler>())) { stubsUnitByDefault = true } + PropertyWrapping:SendTextMessageCaseTest.kt$SendTextMessageCaseTest.Arrangement$@Mock val messageSendFailureHandler = configure(mock(classOf<MessageSendFailureHandler>())) { stubsUnitByDefault = true } + PropertyWrapping:SendTextMessageCaseTest.kt$SendTextMessageCaseTest.Arrangement$@Mock val observeSelfDeletionTimerSettingsForConversation = mock(ObserveSelfDeletionTimerSettingsForConversationUseCase::class) + PropertyWrapping:SendTypingEventUseCaseTest.kt$SendTypingEventUseCaseTest.Arrangement$@Mock val typingIndicatorRepository: TypingIndicatorOutgoingRepository = mock(TypingIndicatorOutgoingRepository::class) + PropertyWrapping:SessionEstablisher.kt$SessionEstablisherImpl$val cryptoSessionID = CryptoSessionId(idMapper.toCryptoQualifiedIDId(recipientUserId), CryptoClientId(client.value)) + PropertyWrapping:SessionEstablisherTest.kt$SessionEstablisherTest$val userPreKeysResult = mapOf(TEST_USER_ID_1.domain to mapOf(TEST_USER_ID_1.value to mapOf(TEST_CLIENT_ID_1.value to preKey))) + PropertyWrapping:SlowSyncManagerTest.kt$SlowSyncManagerTest.Arrangement$@Mock val slowSyncRepository: SlowSyncRepository = configure(mock(classOf<SlowSyncRepository>())) { stubsUnitByDefault = true } + PropertyWrapping:SlowSyncWorkerTest.kt$SlowSyncWorkerTest.Arrangement$@Mock val updateSupportedProtocols: UpdateSelfUserSupportedProtocolsUseCase = mock(UpdateSelfUserSupportedProtocolsUseCase::class) + PropertyWrapping:SyncFeatureConfigsUseCaseTest.kt$SyncFeatureConfigsUseCaseTest.Arrangement$@Mock val updateSupportedProtocolsAndResolveOneOnOnes = mock(classOf<UpdateSupportedProtocolsAndResolveOneOnOnesUseCase>()) + PropertyWrapping:ToggleReactionUseCaseTest.kt$ToggleReactionUseCaseTest.Arrangement$val currentClientIdProvider: CurrentClientIdProvider = CurrentClientIdProvider { Either.Right(TEST_CURRENT_CLIENT) } + PropertyWrapping:TriggerBuffer.kt$TriggerBuffer$private val newItemFlow = MutableSharedFlow<Unit>(extraBufferCapacity = 1, onBufferOverflow = BufferOverflow.DROP_OLDEST) + PropertyWrapping:TypingIndicatorHandlerTest.kt$TypingIndicatorHandlerTest.Arrangement$@Mock val typingIndicatorIncomingRepository: TypingIndicatorIncomingRepository = mock(TypingIndicatorIncomingRepository::class) + PropertyWrapping:UpdateConversationArchivedStatusUseCaseTest.kt$UpdateConversationArchivedStatusUseCaseTest$val result = updateConversationArchivedStatus(conversationId, isConversationArchived, onlyLocally, archivedStatusTimestamp) + PropertyWrapping:UpdateCurrentSessionUseCaseTest.kt$UpdateCurrentSessionUseCaseTest$@Mock val sessionRepository: SessionRepository = configure(mock(classOf<SessionRepository>())) { stubsUnitByDefault = true } + PropertyWrapping:UploadUserAvatarUseCaseTest.kt$UploadUserAvatarUseCaseTest.Arrangement$private val uploadUserAvatarUseCase: UploadUserAvatarUseCase = UploadUserAvatarUseCaseImpl(userRepository, assetRepository) + PropertyWrapping:UserDAOTest.kt$UserDAOTest$val usersToInsert = listOf(user1.copy(name = "other name to make sure this one wasn't inserted nor edited"), user2) + PropertyWrapping:UserRepositoryTest.kt$UserRepositoryTest$val knownUserEntities = listOf(TestUser.DETAILS_ENTITY.copy(id = UserIDEntity(value = "id1", domain = "domain1"))) + ReturnCount:NetworkUtils.kt$internal fun String.splitSetCookieHeader(): List<String> + SpacingAroundColon:BaseMLSClientTest.kt$BaseMLSClientTest$: + SpacingAroundColon:CompositeMessageRepositoryArrangement.kt$CompositeMessageRepositoryArrangementImpl$: + SpacingAroundColon:DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest.kt$DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest.Arrangement$: + SpacingAroundColon:FeatureFlagSyncWorkerTest.kt$FeatureFlagSyncWorkerTest.<no name provided>$: + SpacingAroundColon:FederatedSearchParserTest.kt$FederatedSearchParserTest.Arrangement$: + SpacingAroundColon:IncrementalSyncRepositoryArrangement.kt$IncrementalSyncRepositoryArrangementImpl$: + SpacingAroundColon:LastMessageListTest.kt$LastMessageListTest$: + SpacingAroundColon:MessageMapperTest.kt$MessageMapperTest.Arrangement$: + SpacingAroundColon:MessageSenderTest.kt$MessageSenderTest.Arrangement$: + SpacingAroundColon:SlowSyncManagerTest.kt$SlowSyncManagerTest.Arrangement$: + SpacingAroundColon:SyncMigrationStub.kt$FailureSyncMigration$: + SpacingAroundColon:SyncMigrationStub.kt$MigrationCrashStep$: + SpacingAroundColon:SyncMigrationStub.kt$SuccessSyncMigration$: + SpacingAroundColon:SystemMessageInserterArrangement.kt$SystemMessageInserterArrangementImpl$: + SpacingAroundColon:UpdateSupportedProtocolsAndResolveOneOnOnesArrangement.kt$UpdateSupportedProtocolsAndResolveOneOnOnesArrangementImpl$: + SpacingAroundComma:BaseProteusClientTest.kt$BaseProteusClientTest$, + SpacingAroundComma:E2EIClientProviderTest.kt$E2EIClientProviderTest$, + SpacingAroundComma:E2EIClientTest.kt$E2EIClientTest$, + SpacingAroundComma:ObserveConversationListDetailsUseCaseTest.kt$ObserveConversationListDetailsUseCaseTest$, + SpacingAroundCurly:DeleteClientUseCaseTest.kt$DeleteClientUseCaseTest.Arrangement${ + SpacingAroundCurly:DeleteMessageUseCaseTest.kt$DeleteMessageUseCaseTest.Arrangement${ + SpacingAroundCurly:MLSConfigHandlerTest.kt$MLSConfigHandlerTest.Arrangement${ + SpacingAroundCurly:MLSMigrationConfigHandlerTest.kt$MLSMigrationConfigHandlerTest.Arrangement${ + SpacingAroundCurly:MessageSenderTest.kt$MessageSenderTest.Arrangement${ + SpacingAroundCurly:OneOnOneMigratorTest.kt$OneOnOneMigratorTest.Arrangement${ + SpacingAroundCurly:ProtocolUpdateEventHandlerTest.kt$ProtocolUpdateEventHandlerTest.Arrangement${ + SpacingAroundCurly:RejectCallUseCaseTest.kt$RejectCallUseCaseTest${ + SpacingAroundCurly:SlowSyncManagerTest.kt$SlowSyncManagerTest${ + SpacingAroundCurly:StaleEpochVerifierTest.kt$StaleEpochVerifierTest.Arrangement${ + SpacingAroundKeyword:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$if + SpacingAroundOperators:E2EIClientProviderTest.kt$E2EIClientProviderTest$= + SpacingAroundOperators:MLSWelcomeEventHandlerTest.kt$MLSWelcomeEventHandlerTest$= + SpacingAroundOperators:ServerConfigDTOJson.kt$ServerConfigDTOJson$-> + SpacingAroundOperators:UserDAOTest.kt$UserDAOTest$= + SpacingAroundParens:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Arrangement$) + SpacingAroundParens:MLSClientTest.kt$MLSClientTest$( + SpacingAroundParens:MessageTextEditHandlerTest.kt$MessageTextEditHandlerTest$) + SpacingBetweenDeclarationsWithAnnotations:ApiMigrationManagerTest.kt$ApiMigrationManagerTest.Arrangement$@Mock val metadataDAO = mock(MetadataDAO::class) + SpacingBetweenDeclarationsWithAnnotations:ApproveLegalHoldRequestUseCaseTest.kt$ApproveLegalHoldRequestUseCaseTest.Arrangement$@Mock val selfTeamIdProvider: SelfTeamIdProvider = mock(SelfTeamIdProvider::class) + SpacingBetweenDeclarationsWithAnnotations:ClearConversationContentUseCaseTest.kt$ClearConversationContentUseCaseTest.Arrangement$@Mock val currentClientIdProvider = mock(classOf<CurrentClientIdProvider>()) + SpacingBetweenDeclarationsWithAnnotations:ClientApiV0Test.kt$ClientApiV0Test$@Test fun givenAValidUpdateClientCapabilitiesRequest_whenCallingTheUpdateClientEndpoint_theRequestShouldBeConfiguredCorrectly() + SpacingBetweenDeclarationsWithAnnotations:CommonUtilsTest.kt$CommonUtilsTest$@Test fun givenAFileNameWithMultipleDotsAndStartingWithADot_whenGettingItsFileExtension_itReturnsItCorrectly() + SpacingBetweenDeclarationsWithAnnotations:ConversationAccessDTO.kt$ConversationAccessDTO$CODE + SpacingBetweenDeclarationsWithAnnotations:ConversationAccessDTO.kt$ConversationAccessDTO$INVITE + SpacingBetweenDeclarationsWithAnnotations:ConversationAccessDTO.kt$ConversationAccessDTO$LINK + SpacingBetweenDeclarationsWithAnnotations:ConversationAccessDTO.kt$ConversationAccessDTO$SELF_INVITE + SpacingBetweenDeclarationsWithAnnotations:ConversationAccessRoleDTO.kt$ConversationAccessRoleDTO$EXTERNAL + SpacingBetweenDeclarationsWithAnnotations:ConversationAccessRoleDTO.kt$ConversationAccessRoleDTO$GUEST + SpacingBetweenDeclarationsWithAnnotations:ConversationAccessRoleDTO.kt$ConversationAccessRoleDTO$NON_TEAM_MEMBER + SpacingBetweenDeclarationsWithAnnotations:ConversationAccessRoleDTO.kt$ConversationAccessRoleDTO$SERVICE + SpacingBetweenDeclarationsWithAnnotations:CurrentSessionFlowUseCaseTest.kt$CurrentSessionFlowUseCaseTest$@Test fun givenAUserID_whenCurrentSessionFlowEmitsSameDataAgain_thenDoPropagateTheSameDataAgain() + SpacingBetweenDeclarationsWithAnnotations:FetchLegalHoldForSelfUserFromRemoteUseCaseTest.kt$FetchLegalHoldForSelfUserFromRemoteUseCaseTest.Arrangement$@Mock val selfTeamIdProvider: SelfTeamIdProvider = mock(SelfTeamIdProvider::class) + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@OptIn(ExperimentalCoroutinesApi::class) @Test fun givenNewMessageWithChangedLegalHoldStateAndSyncing_whenHandlingNewMessage_thenBufferAndHandleItWhenSyncStateIsLive() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenConversationLegalHoldAlreadyDisabled_whenHandlingDisable_thenDoNotHandleDisabledForConversation() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenConversationLegalHoldAlreadyEnabled_whenHandlingEnable_thenDoNotHandleEnabledForConversation() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenConversationWithLegalHoldDisabled_whenNewMessageWithLegalHoldEnabled_thenHandleEnabledForConversation() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenConversationWithLegalHoldEnabled_whenNewMessageWithLegalHoldDisabled_thenHandleDisabledForConversation() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenConversationWithLegalHoldEnabled_whenNewMessageWithLegalHoldEnabled_thenDoNotHandleDisabledForConversation() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenConversationWithStillUsersUnderLegalHold_whenHandlingDisable_thenDoNotHandleDisabledForConversation() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenConversation_whenHandlingNewMessageWithChangedLegalHold_thenUseTimestampOfMessageMinus1msToCreateSystemMessage() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenFirstUserUnderLegalHoldAppeared_whenHandlingEnable_thenHandleEnabledForConversation() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenLegalHoldChangedForConversation_whenHandlingMessageSendFailure_thenUseTimestampOfMessageMinus1msForSystemMessage() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenNewConnectionAcceptedAndUserNotUnderLegalHold_whenHandling_thenUpdateConversationLegalHoldStatusToDisabled() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenNewConnectionAcceptedAndUserUnderLegalHold_whenHandling_thenUpdateConversationLegalHoldStatusToEnabled() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$@Test fun givenNextUsersUnderLegalHoldAppeared_whenHandlingEnable_thenDoNotHandleEnabledForConversation() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldStatusResponse.kt$LegalHoldStatusDTO$DISABLED + SpacingBetweenDeclarationsWithAnnotations:LegalHoldStatusResponse.kt$LegalHoldStatusDTO$NO_CONSENT + SpacingBetweenDeclarationsWithAnnotations:LegalHoldStatusResponse.kt$LegalHoldStatusDTO$PENDING + SpacingBetweenDeclarationsWithAnnotations:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$@Test fun givenConversationId_whenHandlingDisableForConversation_thenCreateNewSystemMessage() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$@Test fun givenConversationId_whenHandlingEnableForConversation_thenCreateNewSystemMessage() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$@Test fun givenLastLegalHoldDisabledMessageForConversation_whenHandlingDisableForUser_thenUpdateExistingSystemMessage() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$@Test fun givenLastLegalHoldEnabledMessageForConversation_whenHandlingEnableForUser_thenUpdateExistingSystemMessage() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$@Test fun givenNoLastLegalHoldDisabledMessageForConversation_whenHandlingDisableForUser_thenCreateNewSystemMessage() + SpacingBetweenDeclarationsWithAnnotations:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$@Test fun givenNoLastLegalHoldEnabledMessageForConversation_whenHandlingEnableForUser_thenCreateNewSystemMessage() + SpacingBetweenDeclarationsWithAnnotations:MLSMigrator.kt$MLSMigratorImpl : MLSMigrator + SpacingBetweenDeclarationsWithAnnotations:MarkLegalHoldChangeAsNotifiedForSelfUseCaseTest.kt$MarkLegalHoldChangeAsNotifiedForSelfUseCaseTest$@Test fun givenAFailure_whenSettingLegalHoldChangeAsNotified_thenReturnSuccess() + SpacingBetweenDeclarationsWithAnnotations:MembersHavingLegalHoldClientUseCaseTest.kt$MembersHavingLegalHoldClientUseCaseTest$@Test fun givenConversationMemberDoesNotHaveLegalHoldClient_whenCheckingMembersHavingLegalHoldClient_thenReturnEmptyList() + SpacingBetweenDeclarationsWithAnnotations:MembersHavingLegalHoldClientUseCaseTest.kt$MembersHavingLegalHoldClientUseCaseTest$@Test fun givenFailure_whenCheckingMembersHavingLegalHoldClient_thenReturnFailure() + SpacingBetweenDeclarationsWithAnnotations:MessageEnvelopeCreatorTest.kt$MessageEnvelopeCreatorTest$@Test fun givenRecipients_whenCreatingBroadcastEnvelope_thenProteusClientShouldBeUsedToEncryptForEachClient() + SpacingBetweenDeclarationsWithAnnotations:MessageMapperTest.kt$MessageMapperTest$@Test fun givenLegalHoldContentWithTypeDisabledForConversation_whenMappingToMessageContent_thenResultShouldHaveExpectedData() + SpacingBetweenDeclarationsWithAnnotations:MessageMapperTest.kt$MessageMapperTest$@Test fun givenLegalHoldContentWithTypeDisabledForMembers_whenMappingToMessageContent_thenResultShouldHaveExpectedData() + SpacingBetweenDeclarationsWithAnnotations:MessageMapperTest.kt$MessageMapperTest$@Test fun givenLegalHoldContentWithTypeEnabledForConversation_whenMappingToMessageContent_thenResultShouldHaveExpectedData() + SpacingBetweenDeclarationsWithAnnotations:MessageMapperTest.kt$MessageMapperTest$@Test fun givenLegalHoldContentWithTypeEnabledForMembers_whenMappingToMessageContent_thenResultShouldHaveExpectedData() + SpacingBetweenDeclarationsWithAnnotations:MessageMapperTest.kt$MessageMapperTest$@Test fun givenLegalHoldForConversationDisabled_whenMappingToMessageEntityContent_thenResultShouldHaveExpectedData() + SpacingBetweenDeclarationsWithAnnotations:MessageMapperTest.kt$MessageMapperTest$@Test fun givenLegalHoldForConversationEnabled_whenMappingToMessageEntityContent_thenResultShouldHaveExpectedData() + SpacingBetweenDeclarationsWithAnnotations:MessageMapperTest.kt$MessageMapperTest$@Test fun givenLegalHoldForMembersDisabled_whenMappingToMessageEntityContent_thenResultShouldHaveExpectedData() + SpacingBetweenDeclarationsWithAnnotations:MessageRepositoryTest.kt$MessageRepositoryTest$@Test fun givenConversationIds_whenGettingLastMessagesForConversationIds_thenTheDAOShouldBeCalledWithProperValues() + SpacingBetweenDeclarationsWithAnnotations:MessageRepositoryTest.kt$MessageRepositoryTest$@Test fun givenLegalHoldForMembersMessage_whenUpdatingMembers_thenTheDAOShouldBeCalledWithProperValues() + SpacingBetweenDeclarationsWithAnnotations:MonkeyApplication.kt$MonkeyApplication$@Suppress("MagicNumber") private val delayPool by option( "-d", "--delay-pool", help = "Time in milliseconds it will wait for a conversation to be added to the pool." ).long().default(1000L) + SpacingBetweenDeclarationsWithAnnotations:ObserveConversationInteractionAvailabilityUseCaseTest.kt$ObserveConversationInteractionAvailabilityUseCaseTest$@Test fun givenConversationLegalHoldIsDegraded_whenInvokingInteractionForConversation_thenInteractionShouldBeLegalHold() + SpacingBetweenDeclarationsWithAnnotations:ObserveConversationListDetailsUseCaseTest.kt$ObserveConversationListDetailsUseCaseTest$@Test fun givenSomeConversationsWithArchivedValues_whenFetchingOnlyNonArchived_thenTheseConversationsShouldNotBeReturned() + SpacingBetweenDeclarationsWithAnnotations:ObserveConversationUnderLegalHoldNotifiedUseCaseTest.kt$ObserveConversationUnderLegalHoldNotifiedUseCaseTest$@Test fun givenLegalHoldDisabledAndNotNotified_whenObserving_thenReturnFalse() + SpacingBetweenDeclarationsWithAnnotations:ObserveConversationUnderLegalHoldNotifiedUseCaseTest.kt$ObserveConversationUnderLegalHoldNotifiedUseCaseTest$@Test fun givenLegalHoldDisabledAndNotified_whenObserving_thenReturnTrue() + SpacingBetweenDeclarationsWithAnnotations:ObserveConversationUnderLegalHoldNotifiedUseCaseTest.kt$ObserveConversationUnderLegalHoldNotifiedUseCaseTest$@Test fun givenLegalHoldEnabledAndNotNotified_whenObserving_thenReturnFalse() + SpacingBetweenDeclarationsWithAnnotations:ObserveConversationUnderLegalHoldNotifiedUseCaseTest.kt$ObserveConversationUnderLegalHoldNotifiedUseCaseTest$@Test fun givenLegalHoldEnabledAndNotified_whenObserving_thenReturnTrue() + SpacingBetweenDeclarationsWithAnnotations:ObserveIsAppLockEditableUseCaseTest.kt$ObserveIsAppLockEditableUseCaseTest.Arrangement$@Mock val sessionRepository = mock(classOf<SessionRepository>()) + SpacingBetweenDeclarationsWithAnnotations:ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.kt$ObserveLegalHoldChangeNotifiedForSelfUseCaseTest$@Test fun givenLegalHoldForSelfDisabledAndAlreadyNotified_whenObserving_thenEmitAlreadyNotified() + SpacingBetweenDeclarationsWithAnnotations:ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.kt$ObserveLegalHoldChangeNotifiedForSelfUseCaseTest$@Test fun givenLegalHoldForSelfDisabledAndNotYetNotified_whenObserving_thenEmitShouldNotifyWithLegalHoldDisabledState() + SpacingBetweenDeclarationsWithAnnotations:ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.kt$ObserveLegalHoldChangeNotifiedForSelfUseCaseTest$@Test fun givenLegalHoldForSelfEnabledAndAlreadyNotified_whenObserving_thenEmitAlreadyNotified() + SpacingBetweenDeclarationsWithAnnotations:ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.kt$ObserveLegalHoldChangeNotifiedForSelfUseCaseTest$@Test fun givenLegalHoldForSelfEnabledAndNotYetNotified_whenObserving_thenEmitShouldNotifyWithLegalHoldEnabledState() + SpacingBetweenDeclarationsWithAnnotations:ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.kt$ObserveLegalHoldChangeNotifiedForSelfUseCaseTest$@Test fun givenStorageError_whenObserving_thenEmitFailure() + SpacingBetweenDeclarationsWithAnnotations:ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.kt$ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.Arrangement$@Mock val observeLegalHoldForUser = mock(ObserveLegalHoldStateForUserUseCase::class) + SpacingBetweenDeclarationsWithAnnotations:ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.kt$ObserveLegalHoldChangeNotifiedForSelfUseCaseTest.Arrangement$@Mock val userConfigRepository = mock(UserConfigRepository::class) + SpacingBetweenDeclarationsWithAnnotations:ObserveNewClientsUseCaseTest.kt$ObserveNewClientsUseCaseTest$@Test fun givenNewClientForCurrentUser_whenUserIsBeingLoggedOut_thenChangeToEmptyResult() + SpacingBetweenDeclarationsWithAnnotations:ReplayApplication.kt$ReplayApplication$@Suppress("MagicNumber") private val delayPool by option( "-d", "--delay-pool", help = "Time in milliseconds it will wait for a conversation to be added to the pool." ).long().default(1000L) + SpacingBetweenDeclarationsWithAnnotations:SelfClientsUseCaseTest.kt$SelfClientsUseCaseTest$@Mock private val currentClientIdProvider = mock(classOf<CurrentClientIdProvider>()) + SpacingBetweenDeclarationsWithAnnotations:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest.Arrangement$@Mock val currentClientIdProvider = mock(classOf<CurrentClientIdProvider>()) + SpacingBetweenDeclarationsWithAnnotations:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest.Arrangement$@Mock val messageSendFailureHandler = configure(mock(classOf<MessageSendFailureHandler>())) { stubsUnitByDefault = true } + SpacingBetweenDeclarationsWithAnnotations:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest.Arrangement$@Mock val messageSender = mock(classOf<MessageSender>()) + SpacingBetweenDeclarationsWithAnnotations:SendEditTextMessageUseCaseTest.kt$SendEditTextMessageUseCaseTest.Arrangement$@Mock val slowSyncRepository = mock(classOf<SlowSyncRepository>()) + SpacingBetweenDeclarationsWithAnnotations:ServerModel.kt$ConversationIdRequest + SpacingBetweenDeclarationsWithAnnotations:ServerModel.kt$CreateConversationRequest + SpacingBetweenDeclarationsWithAnnotations:ServerModel.kt$RemoveMonkeyRequest + SpacingBetweenDeclarationsWithAnnotations:ServerModel.kt$SendDMRequest + SpacingBetweenDeclarationsWithAnnotations:ServerModel.kt$SendMessageRequest + SpacingBetweenDeclarationsWithAnnotations:SimpleClientResponseTest.kt$SimpleClientResponseTest$@Test fun givenAJsonWithGibberishClass_whenDeserializingIt_thenHandleItByPuttingUnknownClass() + SpacingBetweenDeclarationsWithAnnotations:TeamsApi.kt$TeamsApi$PasswordRequest + SpacingBetweenDeclarationsWithAnnotations:UserDAO.kt$SupportedProtocolEntity$MLS + SpacingBetweenDeclarationsWithAnnotations:UserEventReceiverTest.kt$UserEventReceiverTest$@Test fun givenNewConnectionEventWithStatusAcceptedAndPreviousStatusWasNotMissingConsent_thenCreateUnverifiedWarningMessage() + SpacingBetweenDeclarationsWithComments:AcmeAuthorization.kt$AuthorizationChallengeType.OIDC$/** * OpenID Connect */ + SpacingBetweenDeclarationsWithComments:ClientModel.kt$/** * True if the client is considered to be in active use. * * A client is considered active if it has connected to the backend within * the `INACTIVE_DURATION`. */ + SpacingBetweenDeclarationsWithComments:EventGatherer.kt$EventGathererImpl$// TODO: Refactor so currentSource is emitted through the gatherEvents flow, instead of having two separated flows + SpacingBetweenDeclarationsWithComments:LogoutReason.kt$LogoutReason.REMOVED_CLIENT$/** * User deleted this client from another client. */ + SpacingBetweenDeclarationsWithComments:TypingIndicatorSyncManager.kt$TypingIndicatorSyncManager$/** * Periodically clears and drop orphaned typing indicators, so we don't keep them forever. */ + TooGenericExceptionCaught:CoreFailure.kt$e: Exception + TooGenericExceptionCaught:NetworkUtils.kt$e: Exception + TooManyFunctions:Calling.kt$Calling : Library + TooManyFunctions:ConversationDAO.kt$ConversationDAO + TooManyFunctions:ConversationRepository.kt$ConversationRepository + TooManyFunctions:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox + TooManyFunctions:Decoder.module_@wireapp_cbor.kt$Decoder + TooManyFunctions:Encoder.module_@wireapp_cbor.kt$Encoder + TopLevelPropertyNaming:Uint32_t.kt$private const val integerSize = 4 + UnnecessaryParenthesesBeforeTrailingLambda:BackupConstantsTest.kt$BackupConstantsTest$() + UnnecessaryParenthesesBeforeTrailingLambda:EncryptedSettingsBuilderTest.kt$EncryptedSettingsBuilderTest$() + UnnecessaryParenthesesBeforeTrailingLambda:FetchLegalHoldForSelfUserFromRemoteUseCaseTest.kt$FetchLegalHoldForSelfUserFromRemoteUseCaseTest$() + UnnecessaryParenthesesBeforeTrailingLambda:LegalHoldHandlerTest.kt$LegalHoldHandlerTest$() + UnnecessaryParenthesesBeforeTrailingLambda:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest$() + UnnecessaryParenthesesBeforeTrailingLambda:MessageSenderTest.kt$MessageSenderTest$() + UnnecessaryParenthesesBeforeTrailingLambda:OnIncomingCallTest.kt$OnIncomingCallTest$() + UnnecessaryParenthesesBeforeTrailingLambda:PendingProposalScheduler.kt$PendingProposalSchedulerImpl$() + UnnecessaryParenthesesBeforeTrailingLambda:RegisterMLSClientUseCaseTest.kt$RegisterMLSClientUseCaseTest$() + UnnecessaryParenthesesBeforeTrailingLambda:ServerConfigRepositoryTest.kt$ServerConfigRepositoryTest$() + UnnecessaryParenthesesBeforeTrailingLambda:TeamRepositoryTest.kt$TeamRepositoryTest$() + UnusedParameter:ClientResources.kt$ClientResources$@Valid request: SendSessionResetRequest + UnusedParameter:ConsoleCommand.kt$ConsoleCommand$context: ConsoleContext + UnusedParameter:ConsoleCommand.kt$ConsoleCommand$userSession: UserSessionScope + UnusedParameter:ConversationMapper.kt$ConversationMapper$mlsProposalTimer: String? + UnusedParameter:ConversationResources.kt$ConversationResources$@PathParam("id") id: String + UnusedParameter:MessageExtensionsTest.kt$MessageExtensionsTest$prefix: String = "" + UnusedParameter:MessageMapper.kt$MessageMapper$assetMimeType: String? + UnusedParameter:MessageMapper.kt$MessageMapper$contentType: MessageEntity.ContentType + UnusedParameter:MessageMapper.kt$MessageMapper$isEphemeral: Boolean + UnusedParameter:MessageMapper.kt$MessageMapper$selfUserId: QualifiedIDEntity? + UnusedParameter:MessageMapper.kt$MessageMapper$senderUserId: QualifiedIDEntity + UnusedParameter:MessageMapper.kt$MessageMapper$visibility: MessageEntity.Visibility + UnusedParameter:RestoreBackupUseCaseTest.kt$RestoreBackupUseCaseTest.Arrangement$userDBSecret: UserDBSecret? = null + UnusedParameter:SelfServerConfigUseCaseTest.kt$SelfServerConfigUseCaseTest.Arrangement$serverConfig: ServerConfig + UnusedParameter:TestEvent.kt$TestEvent$clientId: ClientId = ClientId("client") + UnusedParameter:TestEvent.kt$TestEvent$members: List<Member> = listOf() + UnusedParameter:TestMessage.kt$TestMessage$assetId: String = TEST_MESSAGE_ID + UnusedParameter:UserDAOImpl.kt$UserMapper$id: String? + UnusedPrivateProperty:BaseProteusClientTest.kt$BaseProteusClientTest$private val testCoroutineScheduler = TestCoroutineScheduler() + UnusedPrivateProperty:ClientResources.kt$ClientResources$private val log = LoggerFactory.getLogger(ClientResources::class.java.name) + UnusedPrivateProperty:ConversationRepositoryTest.kt$ConversationRepositoryTest.Companion$private val TEST_QUALIFIED_ID_ENTITY = PersistenceQualifiedId("value", "domain") + UnusedPrivateProperty:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$engine: CRUDEngineBaseCollection + UnusedPrivateProperty:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$minimumAmountOfPreKeys: Number = definedExternally + UnusedPrivateProperty:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$engine: CRUDEngineBaseCollection + UnusedPrivateProperty:Decoder.module_@wireapp_cbor.kt$Decoder$buffer: ArrayBuffer + UnusedPrivateProperty:Decoder.module_@wireapp_cbor.kt$Decoder$config: DecoderConfig = definedExternally + UnusedPrivateProperty:FlowManagerServiceImpl.kt$FlowManagerServiceImpl$appContext: PlatformContext + UnusedPrivateProperty:GetNotificationsUseCaseTest.kt$GetNotificationsUseCaseTest.Companion$private const val TIME_EARLIER = "2000-01-23T01:23:30.678+09:00" + UnusedPrivateProperty:GetNotificationsUseCaseTest.kt$GetNotificationsUseCaseTest.Companion$private val MY_ID = TestUser.USER_ID + UnusedPrivateProperty:IdentityKey.module_@wireapp_proteus.kt$IdentityKey$publicKey: PublicKey + UnusedPrivateProperty:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$publicKey: IdentityKey = definedExternally + UnusedPrivateProperty:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$secretKey: SecretKey = definedExternally + UnusedPrivateProperty:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$version: Number = definedExternally + UnusedPrivateProperty:JoinSubconversationUseCase.kt$JoinSubconversationUseCaseImpl$private val mlsMessageUnpacker: MLSMessageUnpacker + UnusedPrivateProperty:KeyPair.module_@wireapp_proteus.kt$KeyPair$publicKey: PublicKey + UnusedPrivateProperty:KeyPair.module_@wireapp_proteus.kt$KeyPair$secretKey: SecretKey + UnusedPrivateProperty:ListUsersRequestJson.kt$ListUsersRequestJson$private val qualifiedHandlesProvider = { serializable: QualifiedHandleListRequest -> val handlesArrayContent = serializable.qualifiedHandles.joinToString(",") { """{"domain": "${it.domain}", "handle":"${it.handle}"""" } """{"qualified_ids": [$handlesArrayContent]}""" } + UnusedPrivateProperty:LogResources.kt$LogResources$private val configuration: TestserviceConfiguration + UnusedPrivateProperty:MLSConversationRepository.kt$MLSConversationDataSource$private val serverConfigLinks: ServerConfig.Links + UnusedPrivateProperty:MarkAsReadCommand.kt$MarkAsReadCommand$val result = userSession.conversations.updateConversationReadDateUseCase( selectedConversation.id, DateTimeUtil.currentInstant() ) + UnusedPrivateProperty:MediaManagerServiceImpl.kt$MediaManagerServiceImpl$platformContext: PlatformContext + UnusedPrivateProperty:NukeDBTest.kt$NukeDBTest$private val backupUserId = UserIDEntity("backup-selfValue", "selfDomain") + UnusedPrivateProperty:PreKey.module_@wireapp_proteus.kt$PreKey$keyId: Number = definedExternally + UnusedPrivateProperty:PreKey.module_@wireapp_proteus.kt$PreKey$keyPair: KeyPair = definedExternally + UnusedPrivateProperty:PreKey.module_@wireapp_proteus.kt$PreKey$version: Number = definedExternally + UnusedPrivateProperty:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$preKey: PreKey + UnusedPrivateProperty:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$preKeyId: Number + UnusedPrivateProperty:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$publicIdentityKey: IdentityKey + UnusedPrivateProperty:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$publicKey: PublicKey + UnusedPrivateProperty:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$signature: Uint8Array? = definedExternally + UnusedPrivateProperty:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$version: Number = definedExternally + UnusedPrivateProperty:ProteusClient.kt$ProteusClient$val payload: ByteArray = proteusClient.encrypt( messageData, CryptoSessionId(cryptoUserId, cryptoClientId) ) + UnusedPrivateProperty:ProteusClientSamples.kt$val proteusClient = ProteusClientCryptoBoxImpl( "rootDirectory" ) + UnusedPrivateProperty:PublicKey.module_@wireapp_proteus.kt$PublicKey$pubCurve: Uint8Array + UnusedPrivateProperty:PublicKey.module_@wireapp_proteus.kt$PublicKey$pubEdward: Uint8Array + UnusedPrivateProperty:ReceiptModeUpdateEventHandler.kt$ReceiptModeUpdateEventHandlerImpl$private val logger by lazy { kaliumLogger.withFeatureId(KaliumLogger.Companion.ApplicationFlow.EVENT_RECEIVER) } + UnusedPrivateProperty:RegisterApiV0Test.kt$RegisterApiV0Test$val networkClient = mockUnauthenticatedNetworkClient( "", statusCode = HttpStatusCode.OK, assertion = { assertPost() assertJson() assertNoQueryParams() assertPathEqual("/activate") assertHttps() assertHostEqual(TEST_HOST) assertJsonBodyContent(VALID_ACTIVATE_EMAIL.rawJson) } ) + UnusedPrivateProperty:RegisterApiV0Test.kt$RegisterApiV0Test$val networkClient = mockUnauthenticatedNetworkClient( "", statusCode = HttpStatusCode.OK, assertion = { assertPost() assertJson() assertNoQueryParams() assertPathEqual("/activate/send") assertHttps() assertHostEqual(TEST_HOST) assertJsonBodyContent(VALID_PERSONAL_ACCOUNT_REQUEST.rawJson) } ) + UnusedPrivateProperty:RegisterApiV0Test.kt$RegisterApiV0Test$val networkClient = mockUnauthenticatedNetworkClient( ERROR_RESPONSE.rawJson, statusCode = HttpStatusCode.BadRequest, assertion = { assertPost() assertJson() assertNoQueryParams() assertPathEqual("/activate") assertHttps() assertHostEqual(TEST_HOST) assertJsonBodyContent(VALID_PERSONAL_ACCOUNT_REQUEST.rawJson) } ) + UnusedPrivateProperty:RegisterApiV0Test.kt$RegisterApiV0Test$val networkClient = mockUnauthenticatedNetworkClient( ERROR_RESPONSE.rawJson, statusCode = HttpStatusCode.BadRequest, assertion = { assertPost() assertJson() assertNoQueryParams() assertPathEqual("/activate/send") assertHttps() assertHostEqual(TEST_HOST) assertJsonBodyContent(VALID_PERSONAL_ACCOUNT_REQUEST.rawJson) } ) + UnusedPrivateProperty:RegisterApiV0Test.kt$RegisterApiV0Test$val networkClient = mockUnauthenticatedNetworkClient( ERROR_RESPONSE.rawJson, statusCode = HttpStatusCode.BadRequest, assertion = { assertPost() assertJson() assertNoQueryParams() assertPathEqual("/register") assertHttps() assertHostEqual(TEST_HOST) assertJsonBodyContent(VALID_PERSONAL_ACCOUNT_REQUEST.rawJson) } ) + UnusedPrivateProperty:RegisterApiV0Test.kt$RegisterApiV0Test$val networkClient = mockUnauthenticatedNetworkClient( VALID_REGISTER_RESPONSE.rawJson, statusCode = HttpStatusCode.OK, assertion = { assertPost() assertJson() assertNoQueryParams() assertPathEqual("/register") assertHttps() assertHostEqual(TEST_HOST) assertJsonBodyContent(VALID_PERSONAL_ACCOUNT_REQUEST.rawJson) } ) + UnusedPrivateProperty:SecretKey.module_@wireapp_proteus.kt$SecretKey$secCurve: Uint8Array + UnusedPrivateProperty:SecretKey.module_@wireapp_proteus.kt$SecretKey$secEdward: Uint8Array + UnusedPrivateProperty:SessionEstablisherTest.kt$SessionEstablisherTest$val userPreKeysResult = mapOf(TEST_USER_ID_1.domain to mapOf(TEST_USER_ID_1.value to mapOf(TEST_CLIENT_ID_1.value to preKey))) + UnusedPrivateProperty:TestGlobalDatabase.kt$TestGlobalDatabase$private val dispatcher: TestDispatcher = StandardTestDispatcher() + UnusedPrivateProperty:UpdateClientVerificationStatusUseCaseTest.kt$UpdateClientVerificationStatusUseCaseTest.Companion$private val OTHER_USER_CLIENT = OtherUserClient( deviceType = DeviceType.Phone, id = "some_id", isValid = true, isProteusVerified = true ) + UnusedPrivateProperty:UploadUserAvatarUseCaseTest.kt$UploadUserAvatarUseCaseTest.Arrangement$private val dummySelfUser = SelfUser( id = UserId("some_id", "some_domain"), name = "some_name", handle = "some_handle", email = "some_email", phone = null, accentId = 1, teamId = null, connectionStatus = ConnectionState.ACCEPTED, previewPicture = UserAssetId("value1", "domain"), completePicture = UserAssetId("value2", "domain"), userType = UserType.INTERNAL, availabilityStatus = UserAvailabilityStatus.NONE, expiresAt = null, supportedProtocols = setOf(SupportedProtocol.PROTEUS) ) + UnusedPrivateProperty:UserConfigStorage.kt$UserConfigStorageImpl$private val legalHoldRequestFlow = MutableSharedFlow<Unit>( extraBufferCapacity = 1, onBufferOverflow = BufferOverflow.DROP_OLDEST ) + UnusedPrivateProperty:build.gradle.kts$val androidMain by getting { addCommonKotlinJvmSourceDir() dependencies { api(libs.avs) api(libs.jna.map { project.dependencies.create(it, closureOf<ExternalModuleDependency> { artifact { type = "aar" } }) }) } } + UnusedPrivateProperty:build.gradle.kts$val androidMain by getting { addCommonKotlinJvmSourceDir() dependencies { implementation(libs.cryptoboxAndroid) implementation(libs.androidCrypto) implementation(libs.coreCryptoAndroid.get().let { "${it.module}:${it.versionConstraint.requiredVersion}" }) { exclude("androidx.core") exclude("androidx.appcompat") } } } + UnusedPrivateProperty:build.gradle.kts$val androidMain by getting { addCommonKotlinJvmSourceDir() dependencies { implementation(libs.ktor.okHttp) } } + UnusedPrivateProperty:build.gradle.kts$val androidMain by getting { addCommonKotlinJvmSourceDir() dependencies { implementation(libs.work) implementation(libs.coreCryptoAndroid.get().let { "${it.module}:${it.versionConstraint.requiredVersion}" }) { exclude("androidx.core") exclude("androidx.appcompat") } } } + UnusedPrivateProperty:build.gradle.kts$val androidMain by getting { dependencies { implementation(libs.androidCrypto) implementation(libs.sqldelight.androidDriver) implementation(libs.sqlite.androidx) implementation(libs.sql.android.cipher) } } + UnusedPrivateProperty:build.gradle.kts$val androidMain by getting { dependencies { implementation(libs.androidtest.runner) implementation(libs.androidtest.rules) implementation(libs.androidtest.core) } } + UnusedPrivateProperty:build.gradle.kts$val androidMain by getting { dependencies { implementation(libs.annotation) } } + UnusedPrivateProperty:build.gradle.kts$val androidMain by getting { dependencies { implementation(project(":logic")) implementation(project(":calling")) } } + UnusedPrivateProperty:build.gradle.kts$val androidUnitTest by getting { dependencies { implementation(libs.androidtest.runner) implementation(libs.androidtest.rules) } } + UnusedPrivateProperty:build.gradle.kts$val androidUnitTest by getting { dependencies { implementation(libs.robolectric) implementation(libs.core.ktx) } } + UnusedPrivateProperty:build.gradle.kts$val appleMain by getting { dependencies { implementation(libs.coreCrypto) } } + UnusedPrivateProperty:build.gradle.kts$val appleMain by getting { dependencies { implementation(libs.ktor.iosHttp) } } + UnusedPrivateProperty:build.gradle.kts$val appleMain by getting { dependencies { implementation(libs.sqldelight.nativeDriver) } } + UnusedPrivateProperty:build.gradle.kts$val appleMain by getting { dependencies { implementation(project(":logic")) implementation(project(":calling")) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { // coroutines implementation(libs.coroutines.core) implementation(libs.sqldelight.runtime) implementation(libs.sqldelight.coroutinesExtension) implementation(libs.sqldelight.primitiveAdapters) implementation(libs.ktxSerialization) implementation(libs.settings.kmp) implementation(libs.ktxDateTime) implementation(libs.sqldelight.androidxPaging) implementation(project(":util")) api(project(":logger")) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { api(libs.kermit) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { api(project(":logger")) // coroutines implementation(libs.coroutines.core) api(libs.ktor.core) // KTX implementation(libs.ktxDateTime) // Okio implementation(libs.okio.core) // Libsodium implementation(libs.libsodiumBindingsMP) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { api(project(":logger")) implementation(libs.coroutines.core) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { implementation(libs.ktxSerialization) // coroutines implementation(libs.coroutines.core) implementation(libs.ktxDateTime) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { implementation(project(":network")) api(project(":network-util")) implementation(project(":cryptography")) implementation(project(":persistence")) implementation(project(":protobuf")) api(project(":logger")) api(project(":calling")) implementation(project(":util")) // coroutines implementation(libs.coroutines.core) implementation(libs.ktxSerialization) implementation(libs.ktxDateTime) implementation(libs.benAsherUUID) // the Dependency is duplicated between here and persistence build.gradle.kts implementation(libs.settings.kmp) // Okio implementation(libs.okio.core) implementation(libs.sqldelight.androidxPaging) // Concurrent collections implementation(libs.concurrentCollections) implementation(libs.statelyCommons) configurations.all { exclude(group = "co.touchlab", module = "stately-strict-jvm") } } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { implementation(project(":network")) implementation(project(":cryptography")) implementation(project(":persistence")) implementation(project(":protobuf")) implementation(project(":logger")) implementation(libs.coroutines.core) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { implementation(project(":persistence")) implementation(libs.kotlin.test) // coroutines implementation(libs.coroutines.core) implementation(libs.coroutines.test) implementation(libs.settings.kmp) implementation(libs.settings.kmpTest) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { dependencies { implementation(project(":protobuf")) implementation(project(":util")) implementation(project(":network-util")) api(project(":logger")) // coroutines implementation(libs.coroutines.core) // ktor api(libs.ktor.core) implementation(libs.ktor.utils) implementation(libs.ktor.json) implementation(libs.ktor.serialization) implementation(libs.ktor.logging) implementation(libs.ktor.authClient) implementation(libs.ktor.webSocket) implementation(libs.ktor.contentNegotiation) implementation(libs.ktor.encoding) // KTX implementation(libs.ktxDateTime) implementation(libs.ktx.atomicfu) // Okio implementation(libs.okio.core) implementation(libs.okio.test) // UUIDs implementation(libs.benAsherUUID) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by getting { kotlin.srcDir(generatedFilesBaseDir) dependencies { api(libs.pbandk.runtime.common) } } + UnusedPrivateProperty:build.gradle.kts$val commonMain by sourceSets.getting { dependencies { implementation(project(":network")) implementation(project(":cryptography")) implementation(project(":logic")) implementation(project(":util")) implementation(libs.cliKt) implementation(libs.ktor.utils) implementation(libs.coroutines.core) implementation(libs.ktxDateTime) implementation(libs.mordant) } } + UnusedPrivateProperty:build.gradle.kts$val commonTest by getting { dependencies { // coroutines implementation(libs.coroutines.test) // ktor test implementation(libs.ktor.mock) } } + UnusedPrivateProperty:build.gradle.kts$val commonTest by getting { dependencies { // coroutines implementation(libs.coroutines.test) implementation(libs.turbine) // MultiplatformSettings implementation(libs.settings.kmpTest) } } + UnusedPrivateProperty:build.gradle.kts$val commonTest by getting { dependencies { implementation(libs.coroutines.test) implementation(libs.okio.test) } } + UnusedPrivateProperty:build.gradle.kts$val commonTest by getting { dependencies { implementation(libs.coroutines.test) } } + UnusedPrivateProperty:build.gradle.kts$val commonTest by getting { dependencies { implementation(project(":persistence-test")) // coroutines implementation(libs.coroutines.test) implementation(libs.turbine) // mocking implementation(libs.mockative.runtime) implementation(libs.okio.test) implementation(libs.settings.kmpTest) } } + UnusedPrivateProperty:build.gradle.kts$val commonTest by getting { dependencies { } } + UnusedPrivateProperty:build.gradle.kts$val iosArm64Main by getting { dependencies { api(libs.pbandk.runtime.iosArm64) } } + UnusedPrivateProperty:build.gradle.kts$val iosSimulatorArm64Main by getting { dependencies { api(libs.pbandk.runtime.iosSimulatorArm64) } } + UnusedPrivateProperty:build.gradle.kts$val iosX64Main by getting { dependencies { api(libs.pbandk.runtime.iosX64) } } + UnusedPrivateProperty:build.gradle.kts$val jsMain by getting { dependencies { implementation(libs.sqldelight.jsDriver) implementation(npm("sql.js", "1.6.2")) implementation(devNpm("copy-webpack-plugin", "9.1.0")) } } + UnusedPrivateProperty:build.gradle.kts$val jsMain by getting { dependencies { implementation(npm("@wireapp/cryptobox", "12.7.2", generateExternals = false)) implementation(npm("@wireapp/store-engine", "4.9.9", generateExternals = false)) } } + UnusedPrivateProperty:build.gradle.kts$val jsTest by getting + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { addCommonKotlinJvmSourceDir() dependencies { implementation(libs.cryptobox4j) implementation(libs.coreCryptoJvm) } } + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { addCommonKotlinJvmSourceDir() dependencies { implementation(libs.jna) implementation(libs.coreCryptoJvm) } } + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { addCommonKotlinJvmSourceDir() dependencies { implementation(libs.jna) } } + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { addCommonKotlinJvmSourceDir() dependencies { implementation(libs.ktor.okHttp) } } + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { dependencies { implementation(libs.apacheTika) } } + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { dependencies { implementation(libs.coroutines.core) } } + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { dependencies { implementation(libs.ktor.okHttp) implementation(libs.okhttp.loggingInterceptor) } } + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { dependencies { implementation(libs.sqldelight.jvmDriver) } } + UnusedPrivateProperty:build.gradle.kts$val jvmMain by getting { dependencies { implementation(project(":logic")) implementation(project(":calling")) } } + UnusedPrivateProperty:build.gradle.kts$val jvmTest by getting + UnusedPrivateProperty:build.gradle.kts$val jvmTest by getting { dependencies { implementation(libs.konsist) } } + UnusedPrivateProperty:build.gradle.kts$val macosArm64Main by getting { dependencies { api(libs.pbandk.runtime.macArm64) } } + UnusedPrivateProperty:build.gradle.kts$val macosMain by getting { dependencies { implementation(libs.ktor.iosHttp) } } + UnusedPrivateProperty:build.gradle.kts$val macosX64Main by getting { dependencies { api(libs.pbandk.runtime.macX64) } } + UnusedPrivateProperty:build.gradle.kts$val main by getting { dependencies { implementation(project(":network")) implementation(project(":cryptography")) implementation(project(":logic")) implementation(project(":util")) implementation(libs.cliKt) implementation(libs.ktor.utils) implementation(libs.coroutines.core) implementation(libs.ktxDateTime) implementation(libs.ktxReactive) implementation(libs.ktxSerialization) implementation(libs.ktor.serialization) implementation(libs.ktor.okHttp) implementation(libs.ktor.contentNegotiation) implementation(libs.ktor.json) implementation(libs.ktor.authClient) implementation(libs.ktor.server) implementation(libs.ktor.serverNetty) implementation(libs.ktor.serverLogging) implementation(libs.ktor.serverCallId) implementation(libs.ktor.serverMetrics) implementation(libs.ktor.serverContentNegotiation) implementation(libs.ktor.statusPages) implementation(libs.okhttp.loggingInterceptor) implementation(libs.micrometer) implementation(libs.slf4js) implementation(libs.faker) implementation(libs.concurrentCollections) implementation(libs.statelyCommons) implementation(libs.sqldelight.r2dbc) implementation(libs.sqldelight.async) implementation(libs.r2dbc.postgres) implementation(libs.r2dbc.spi) } } + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var create_last_resort_prekey: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var create_new_identity: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var get_prekey: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var get_session_queue: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var load_session_from_cache: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var publish_event: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var publish_prekeys: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var publish_session_id: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var refill_prekeys: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var remove_session_from_cache: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var save_identity: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var save_session_in_cache: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var session_from_message: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var session_save: Any + VariableNaming:Cryptobox.module_@wireapp_cryptobox.kt$Cryptobox$open var session_update: Any + VariableNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open var from_store: Any + VariableNaming:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$CryptoboxCRUDStore$open var to_store: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _advance: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _bytes: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _f32: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _f64: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read_length: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read_signed: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read_type_info: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _read_unsigned: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _skip_until_break: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _skip_value: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _type_info_with_assert: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _u16: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _u32: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _u64: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$Decoder$open var _u8: Any + VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_array_length: Number + VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_bytes_length: Number + VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_nesting: Number + VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_object_size: Number + VariableNaming:Decoder.module_@wireapp_cbor.kt$DecoderConfig$var max_text_length: Number + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _advance: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _bytes: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _ensure: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _f32: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _f64: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _grow_buffer: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _new_buffer_length: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _u16: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _u32: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _u64: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _u8: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _write: Any + VariableNaming:Encoder.module_@wireapp_cbor.kt$Encoder$open var _write_type_and_len: Any + VariableNaming:IdentityKey.module_@wireapp_proteus.kt$IdentityKey$open var public_key: PublicKey + VariableNaming:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$open var public_key: IdentityKey + VariableNaming:IdentityKeyPair.module_@wireapp_proteus.kt$IdentityKeyPair$open var secret_key: SecretKey + VariableNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair$open var public_key: PublicKey + VariableNaming:KeyPair.module_@wireapp_proteus.kt$KeyPair$open var secret_key: SecretKey + VariableNaming:PreKey.module_@wireapp_proteus.kt$PreKey$open var key_id: Number + VariableNaming:PreKey.module_@wireapp_proteus.kt$PreKey$open var key_pair: KeyPair + VariableNaming:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$open var identity_key: IdentityKey + VariableNaming:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$open var prekey_id: Number + VariableNaming:PreKeyBundle.module_@wireapp_proteus.kt$PreKeyBundle$open var public_key: PublicKey + VariableNaming:PublicKey.module_@wireapp_proteus.kt$PublicKey$open var pub_curve: Uint8Array + VariableNaming:PublicKey.module_@wireapp_proteus.kt$PublicKey$open var pub_edward: Uint8Array + VariableNaming:SecretKey.module_@wireapp_proteus.kt$SecretKey$open var sec_curve: Uint8Array + VariableNaming:SecretKey.module_@wireapp_proteus.kt$SecretKey$open var sec_edward: Uint8Array + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import kotlin.js.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.khronos.webgl.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.events.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.parsing.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.svg.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.url.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.fetch.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.files.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.notifications.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.performance.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.workers.* + WildcardImport:CRUDEngine.module_@wireapp_store-engine.kt$import org.w3c.xhr.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import kotlin.js.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.khronos.webgl.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.events.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.parsing.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.svg.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.dom.url.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.fetch.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.files.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.notifications.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.performance.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.workers.* + WildcardImport:Cryptobox.module_@wireapp_cryptobox.kt$import org.w3c.xhr.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import kotlin.js.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.khronos.webgl.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.events.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.parsing.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.svg.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.dom.url.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.fetch.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.files.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.notifications.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.performance.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.workers.* + WildcardImport:CryptoboxCRUDStore.module_@wireapp_cryptobox.kt$import org.w3c.xhr.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import kotlin.js.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.khronos.webgl.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.events.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.parsing.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.svg.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.dom.url.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.fetch.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.files.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.notifications.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.performance.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.workers.* + WildcardImport:CryptoboxSession.module_@wireapp_cryptobox.kt$import org.w3c.xhr.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import kotlin.js.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.khronos.webgl.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.events.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.parsing.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.svg.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.dom.url.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.fetch.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.files.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.notifications.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.performance.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.workers.* + WildcardImport:Decoder.module_@wireapp_cbor.kt$import org.w3c.xhr.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import kotlin.js.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.khronos.webgl.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.events.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.parsing.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.svg.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.dom.url.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.fetch.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.files.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.notifications.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.performance.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.workers.* + WildcardImport:Encoder.module_@wireapp_cbor.kt$import org.w3c.xhr.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import kotlin.js.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.khronos.webgl.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.events.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.dom.url.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.fetch.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.files.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.notifications.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.performance.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.workers.* + WildcardImport:IdentityKey.module_@wireapp_proteus.kt$import org.w3c.xhr.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import kotlin.js.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.khronos.webgl.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.events.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.url.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.fetch.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.files.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.notifications.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.performance.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.workers.* + WildcardImport:IdentityKeyPair.module_@wireapp_proteus.kt$import org.w3c.xhr.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import kotlin.js.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.khronos.webgl.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.events.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.dom.url.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.fetch.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.files.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.notifications.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.performance.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.workers.* + WildcardImport:KeyPair.module_@wireapp_proteus.kt$import org.w3c.xhr.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import kotlin.js.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.khronos.webgl.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.events.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.parsing.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.svg.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.dom.url.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.fetch.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.files.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.notifications.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.performance.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.workers.* + WildcardImport:MemoryEngine.module_@wireapp_store-engine.kt$import org.w3c.xhr.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import kotlin.js.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.khronos.webgl.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.events.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.dom.url.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.fetch.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.files.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.notifications.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.performance.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.workers.* + WildcardImport:PreKey.module_@wireapp_proteus.kt$import org.w3c.xhr.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import kotlin.js.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.khronos.webgl.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.events.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.dom.url.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.fetch.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.files.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.notifications.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.performance.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.workers.* + WildcardImport:PreKeyBundle.module_@wireapp_proteus.kt$import org.w3c.xhr.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import kotlin.js.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.khronos.webgl.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.events.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.dom.url.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.fetch.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.files.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.notifications.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.performance.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.workers.* + WildcardImport:PreKeyStore.module_@wireapp_proteus.kt$import org.w3c.xhr.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import kotlin.js.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.khronos.webgl.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.events.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.dom.url.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.fetch.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.files.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.notifications.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.performance.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.workers.* + WildcardImport:PublicKey.module_@wireapp_proteus.kt$import org.w3c.xhr.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import kotlin.js.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.khronos.webgl.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.events.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.parsing.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.svg.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.dom.url.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.fetch.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.files.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.notifications.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.performance.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.workers.* + WildcardImport:SecretKey.module_@wireapp_proteus.kt$import org.w3c.xhr.* + Wrapping:ACMEApi.kt$ACMEApiImpl$( ACMEAuthorizationResponse( nonce = nonce, location = challengeResponse.headers[LOCATION_HEADER_KEY], response = challengeResponse.value.encodeToByteArray(), challengeType = type ), challengeResponse.headers, challengeResponse.httpCode ) + Wrapping:ACMEApi.kt$ACMEApiImpl$( ACMEResponse( nonce, response = httpResponse.body(), location = httpResponse.headers[LOCATION_HEADER_KEY].toString() ), httpResponse ) + Wrapping:ACMEApi.kt$ACMEApiImpl$( ChallengeResponse( type = challengeResponse.value.type, url = challengeResponse.value.url, status = challengeResponse.value.status, token = challengeResponse.value.token, target = challengeResponse.value.target, nonce = nonce ), challengeResponse.headers, challengeResponse.httpCode ) + Wrapping:AccessTokenDTOJson.kt$AccessTokenDTOJson$( AccessTokenDTO( userId = "user_id", value = "Nlrhltkj-NgJUjEVevHz8Ilgy_pyWCT2b0kQb-GlnamyswanghN9DcC3an5RUuA7sh1_nC3hv2ZzMRlIhPM7Ag==.v=1.k=1.d=1637254939." + "t=a.l=.u=75ebeb16-a860-4be4-84a7-157654b492cf.c=18401233206926541098", expiresIn = 900, tokenType = "Bearer" ), jsonProvider ) + Wrapping:AddAuthenticatedUserUseCaseTest.kt$AddAuthenticatedUserUseCaseTest.Arrangement$result + Wrapping:AddAuthenticatedUserUseCaseTest.kt$AddAuthenticatedUserUseCaseTest.Arrangement$storeSession(serverConfigId, ssoId, accountTokens, proxyCredentials) + Wrapping:AddUserToConversationEventAction.kt$AddUserToConversationEventAction$ + Wrapping:ApiTest.kt$ApiTest$( + Wrapping:ApproveLegalHoldRequestUseCaseTest.kt$ApproveLegalHoldRequestUseCaseTest.Arrangement$ApproveLegalHoldRequestUseCaseImpl(teamRepository, selfTeamIdProvider) + Wrapping:AssetMessageHandlerTest.kt$AssetMessageHandlerTest$( + Wrapping:AssetMessageHandlerTest.kt$AssetMessageHandlerTest.Arrangement$( + Wrapping:AssetRepository.kt$AssetDataSource$( assetId, assetName.fileExtension() ?: getExtensionFromMimeType(mimeType) ) + Wrapping:AssetRepositoryTest.kt$AssetRepositoryTest$( + Wrapping:AssetRepositoryTest.kt$AssetRepositoryTest.Arrangement$( + Wrapping:AssetRepositoryTest.kt$AssetRepositoryTest.Arrangement$(any(), any(), any(), matching { val buffer = Buffer() buffer.write(assetData) it.write(buffer, assetData.size.toLong()) true }) + Wrapping:AssetRepositoryTest.kt$AssetRepositoryTest.Arrangement$(any(), anything(), eq(null), matching { val buffer = Buffer() buffer.write(assetData) it.write(buffer, assetData.size.toLong()) true }) + Wrapping:AuthenticationScope.kt$AuthenticationScopeProvider$<Pair<ServerConfig, ProxyCredentials?>, AuthenticationScope> + Wrapping:BaseDatabaseTest.kt$BaseDatabaseTest$( + Wrapping:CodeDeletedHandlerTest.kt$CodeDeletedHandlerTest$( + Wrapping:CodeUpdateHandlerTest.kt$CodeUpdateHandlerTest$( + Wrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$( + Wrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(anything(), matching { it.containsAll(expectedInitialUsers) }) + Wrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(anything(), matching { it.containsAll(expectedInitialUsersNotFromUnreachableInformed) }) + Wrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(anything(), matching { it.size == expectedFullUserIdsForRequestCount }) + Wrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(anything(), matching { it.size == expectedValidUsersWithKeyPackagesCount && it.first() == TestConversation.USER_1 }) + Wrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(anything(), matching { it.size == initialCountUsers - 1 // removed 1 failed users with key packages }) + Wrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(anything(), matching { it.size == initialCountUsers - 2 // removed 1 failed user with commit bundle federated error }) + Wrapping:ConversationGroupRepositoryTest.kt$ConversationGroupRepositoryTest$(anything(), matching { it.size == initialCountUsers }) + Wrapping:ConversationMessageTimerEventHandlerTest.kt$ConversationMessageTimerEventHandlerTest$( + Wrapping:ConversationRepository.kt$ConversationDataSource$( + Wrapping:ConversationRepository.kt$ConversationRepository.Companion$( + Wrapping:ConversationRepository.kt$ConversationRepository.Companion$-> + Wrapping:ConversationRepositoryTest.kt$ConversationRepositoryTest$( + Wrapping:ConversationRepositoryTest.kt$ConversationRepositoryTest.Companion$( UpdateConversationProtocolResponse.ProtocolUpdated( EventContentDTO.Conversation.ProtocolUpdate( TestConversation.NETWORK_ID, ConversationProtocolDTO(ConvProtocol.MIXED), TestUser.NETWORK_ID ) ), emptyMap(), 200 ) + Wrapping:CreateBackupUseCase.kt$CreateBackupUseCaseImpl$( + Wrapping:DeleteClientUseCase.kt$DeleteClientUseCaseImpl$( + Wrapping:DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest.kt$DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest$( + Wrapping:DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest.kt$DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest$( matching { it.conversationId == SELF_CONVERSION_ID.first() && it.content == MessageContent.DeleteForMe(messageId, conversationId) }, matching { it == MessageTarget.Conversation() }) + Wrapping:DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest.kt$DeleteEphemeralMessageForSelfUserAsReceiverUseCaseTest$( matching { it.conversationId == conversationId && it.content == MessageContent.DeleteMessage(messageId) }, matching { it == MessageTarget.Users(listOf(senderUserID)) }) + Wrapping:EnrollE2EICertificateUseCaseTest.kt$EnrollE2EICertificateUseCaseTest.Companion$( "keyauth" to JsonObject( mapOf("essential" to JsonPrimitive(true), "value" to JsonPrimitive(OIDC_AUTHZ.keyAuth)) ), "acme_aud" to JsonObject( mapOf("essential" to JsonPrimitive(true), "value" to JsonPrimitive(OIDC_AUTHZ.challenge.url)) ) ) + Wrapping:EnvelopeProtoMapper.kt$EnvelopeProtoMapperImpl$( + Wrapping:EnvelopeProtoMapperTest.kt$EnvelopeProtoMapperTest$( user, mapOf( Pair("241b5be49179d81b", ByteArray(0)), Pair("8bdacec7398a982e", ByteArray(0)), Pair("e47d908549239b72", ByteArray(0)), Pair("4c8346ce67fa0d7", ByteArray(0)) ) ) + Wrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$( + Wrapping:FeatureConfigEventReceiverTest.kt$FeatureConfigEventReceiverTest$( SelfDeletingMessagesConfigModel( enforcedTimeoutSeconds = null ), Status.DISABLED ) + Wrapping:FeatureConfigMapperTest.kt$FeatureConfigMapperTest.Arrangement$( MLSConfigDTO( SupportedProtocolDTO.MLS, listOf(SupportedProtocolDTO.MLS), emptyList(), 1 ), FeatureFlagStatusDTO.ENABLED ) + Wrapping:FeatureConfigRepositoryTest.kt$FeatureConfigRepositoryTest.Arrangement$( MLSConfigDTO( SupportedProtocolDTO.PROTEUS, listOf(SupportedProtocolDTO.PROTEUS), emptyList(), 1 ), FeatureFlagStatusDTO.ENABLED ) + Wrapping:FederationEventReceiverTest.kt$FederationEventReceiverTest$UserId(value = "defIdTwo$it", domain = defederatedDomainTwo) + Wrapping:GetNotificationsUseCaseTest.kt$GetNotificationsUseCaseTest$( + Wrapping:GetOrCreateOneToOneConversationUseCase.kt$GetOrCreateOneToOneConversationUseCaseImpl$( + Wrapping:GetUserInfoUseCase.kt$GetUserInfoUseCaseImpl$( + Wrapping:HandleExternalRequestAction.kt$( """ Hey there, I hope you're doing well. I've got a bit of a craving for bananas, and I was wondering if you might be able to share a few with me? It would mean a lot. 😊 Thanks a bunch, A friendly monkey 🍌🐡 """.trimIndent(), """ Yo, I'm in need of some bananas, my friend. Can you hook me up? I'd appreciate it big time. Respect, A neutral monkey 🍌 """.trimIndent(), """ Listen up, I ain't messin' around. I want them bananas, and I want 'em now. You better deliver or there'll be consequences. No games, An evil monkey πŸŒπŸ‘ΏπŸ’€ """.trimIndent() ) + Wrapping:InstanceLifecycle.kt$InstanceLifecycle$( + Wrapping:InstanceService.kt$InstanceService$( + Wrapping:InstanceServiceTest.kt$InstanceServiceTest$( + Wrapping:IsEligibleToStartCallUseCase.kt$IsEligibleToStartCallUseCaseImpl$( + Wrapping:JoinConversationViaCodeUseCaseTest.kt$JoinConversationViaCodeUseCaseTest$( code, key, null, password, Either.Left( NetworkFailure.ServerMiscommunication( KaliumException.InvalidRequestError( ErrorResponse(403, "wrong password", "invalid-conversation-password") ) ) ) ) + Wrapping:JoinExistingMLSConversationUseCaseTest.kt$JoinExistingMLSConversationUseCaseTest.Arrangement$; + Wrapping:JoinSubconversationUseCaseTest.kt$JoinSubconversationUseCaseTest.Arrangement$; + Wrapping:KaliumHttpLogger.kt$KaliumHttpLogger$""" + Wrapping:KaliumKtorCustomLogging.kt$KaliumKtorCustomLogging$""" + Wrapping:KeyingMaterialsManager.kt$KeyingMaterialsManagerImpl$( + Wrapping:LeaveSubconversationUseCase.kt$LeaveSubconversationUseCaseImpl$conversationApi.fetchSubconversationDetails(conversationId.toApi(), subconversationId.toApi()) + Wrapping:LegalHoldHandlerTest.kt$LegalHoldHandlerTest.Arrangement$stubsUnitByDefault = true + Wrapping:LegalHoldSystemMessageHandlerTest.kt$LegalHoldSystemMessagesHandlerTest$( + Wrapping:ListUsersRequestJson.kt$ListUsersRequestJson$( QualifiedUserIdListRequest( listOf( QualifiedID("id1", "domain1"), QualifiedID("id11", "domain1"), QualifiedID("id2", "domain2") ) ), qualifiedIdsProvider ) + Wrapping:LoginWithEmailRequestJson.kt$LoginWithEmailRequestJson$( LoginApi.LoginParam.LoginWithEmail( email = "user@email.de", label = "label", password = "password", verificationCode = "verificationCode" ), jsonProvider ) + Wrapping:LoginWithEmailRequestJson.kt$LoginWithEmailRequestJson$( LoginApi.LoginParam.LoginWithHandle( handle = "cool_user_name", label = "label", password = "password", ), jsonProvider ) + Wrapping:MLSConfigHandlerTest.kt$MLSConfigHandlerTest$( + Wrapping:MLSConfigHandlerTest.kt$MLSConfigHandlerTest$(MLS_CONFIG.copy( status = Status.DISABLED ), duringSlowSync = false) + Wrapping:MLSConfigHandlerTest.kt$MLSConfigHandlerTest$(MLS_CONFIG.copy( status = Status.DISABLED, defaultProtocol = SupportedProtocol.MLS ), duringSlowSync = false) + Wrapping:MLSConfigHandlerTest.kt$MLSConfigHandlerTest$(MLS_CONFIG.copy( status = Status.ENABLED, defaultProtocol = SupportedProtocol.MLS ), duringSlowSync = false) + Wrapping:MLSConfigHandlerTest.kt$MLSConfigHandlerTest$(MLS_CONFIG.copy( status = Status.ENABLED, defaultProtocol = SupportedProtocol.PROTEUS ), duringSlowSync = false) + Wrapping:MLSConfigHandlerTest.kt$MLSConfigHandlerTest$(MLS_CONFIG.copy( status = Status.ENABLED, supportedProtocols = setOf(SupportedProtocol.PROTEUS, SupportedProtocol.MLS) ), duringSlowSync = false) + Wrapping:MLSConfigHandlerTest.kt$MLSConfigHandlerTest$(MLS_CONFIG.copy( status = Status.ENABLED, supportedProtocols = setOf(SupportedProtocol.PROTEUS, SupportedProtocol.MLS) ), duringSlowSync = true) + Wrapping:MLSConversationRepositoryTest.kt$MLSConversationRepositoryTest.Arrangement$; + Wrapping:MLSConversationsVerificationStatusesHandler.kt$MLSConversationsVerificationStatusesHandlerImpl$( + Wrapping:MLSKeyPackageCountUseCase.kt$MLSKeyPackageCountUseCaseImpl$( + Wrapping:MLSMessageUnpacker.kt$MLSMessageUnpackerImpl$( KaliumLogLevel.DEBUG, "Decrypting MLS for Conversation", mapOf( "conversationId" to messageEvent.conversationId.toLogString(), "groupID" to protocolInfo.groupId.toLogString(), "protocolInfo" to protocolInfo.toLogMap() ) ) + Wrapping:MLSMessageUnpacker.kt$MLSMessageUnpackerImpl$( KaliumLogLevel.DEBUG, "Decrypting MLS for SubConversation", mapOf( "conversationId" to messageEvent.conversationId.toLogString(), "subConversationId" to subConversationId.toLogString(), "groupID" to groupID.toLogString() ) ) + Wrapping:MLSMigrationConfigHandlerTest.kt$MLSMigrationConfigHandlerTest$( + Wrapping:MLSMigrationConfigHandlerTest.kt$MLSMigrationConfigHandlerTest$(MIGRATION_CONFIG.copy( startTime = Instant.DISTANT_PAST, endTime = Instant.DISTANT_PAST ), duringSlowSync = false) + Wrapping:MLSMigrationConfigHandlerTest.kt$MLSMigrationConfigHandlerTest$(MIGRATION_CONFIG.copy( startTime = Instant.DISTANT_PAST, endTime = Instant.DISTANT_PAST ), duringSlowSync = true) + Wrapping:MLSMigrationWorker.kt$MLSMigrationWorkerImpl$configurations.mlsMigrationModel?.let { mlsMigrationConfigHandler.handle(configurations.mlsMigrationModel, duringSlowSync = false) } ?: Either.Right(Unit) + Wrapping:MemberLeaveEventHandlerTest.kt$MemberLeaveEventHandlerTest$( + Wrapping:MemberLeaveEventHandlerTest.kt$MemberLeaveEventHandlerTest.Arrangement$UserRepositoryArrangement by UserRepositoryArrangementImpl(), PersistMessageUseCaseArrangement by PersistMessageUseCaseArrangementImpl(), MemberDAOArrangement by MemberDAOArrangementImpl(), SelfTeamIdProviderArrangement by SelfTeamIdProviderArrangementImpl() + Wrapping:MessageContentEncoderTest.kt$MessageContentEncoderTest.TestData$( + Wrapping:MessageDraftMapper.kt$( + Wrapping:MessageEnvelope.kt$ClientPayload$( + Wrapping:MessageEnvelope.kt$MessageEnvelope$( + Wrapping:MessageEnvelopeCreatorTest.kt$MessageEnvelopeCreatorTest$CryptoSessionId(recipient.id.toCrypto(), CryptoClientId((it.value))) + Wrapping:MessageMapper.kt$MessageMapperImpl$( + Wrapping:MessageRepository.kt$MessageDataSource$it.toApi() + Wrapping:MessageRepositoryExtensionsTest.kt$MessageRepositoryExtensionsTest$( + Wrapping:MessageRepositoryExtensionsTest.kt$MessageRepositoryExtensionsTest$(eq(CONVERSATION_ID_ENTITY), matching { val list = it.toList() list.size == 1 && list[0] == MessageEntity.Visibility.VISIBLE }, eq(pagingConfig)) + Wrapping:MessageRepositoryTest.kt$MessageRepositoryTest$( + Wrapping:MessageRepositoryTest.kt$MessageRepositoryTest$( matching { (it.messageOption is MessageApi.QualifiedMessageOption.ReportSome) && ((it.messageOption as MessageApi.QualifiedMessageOption.ReportSome) .userIDs == recipient.map { it.id }) }, anything() ) + Wrapping:MessageRepositoryTest.kt$MessageRepositoryTest$( matching { it.recipients.isEmpty() && it.messageOption == MessageApi.QualifiedMessageOption.IgnoreAll }, anything() ) + Wrapping:MessageRepositoryTest.kt$MessageRepositoryTest$( matching { it.recipients.isEmpty() && it.messageOption == MessageApi.QualifiedMessageOption.ReportAll }, anything() ) + Wrapping:MessageSenderTest.kt$MessageSenderTest.Arrangement$; + Wrapping:MigrationDAO.kt$MigrationDAOImpl$MigrationDAO, MessageInsertExtension by MessageInsertExtensionImpl( messagesQueries, unreadEventsQueries, conversationsQueries, buttonContentQueries, selfUserIDEntity ) + Wrapping:MockUnboundNetworkClient.kt$MockUnboundNetworkClient$( + Wrapping:MonkeyPool.kt$MonkeyPool$ConcurrentHashMap() + Wrapping:NewConversationMembersRepositoryTest.kt$NewConversationMembersRepositoryTest.Arrangement$( + Wrapping:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$( + Wrapping:NewGroupConversationSystemMessagesCreatorTest.kt$NewGroupConversationSystemMessagesCreatorTest$( ConversationMemberDTO.Self( TestUser.SELF.id.toApi(), "wire_admin" ), emptyList() ) + Wrapping:NewMessageEventHandlerTest.kt$NewMessageEventHandlerTest$( + Wrapping:NotificationTokenRepository.kt$NotificationTokenDataSource$tokenStorage.getToken() + Wrapping:ObfuscateUtil.kt$listOf("qualified_id", "qualified_ids", "qualified_users", "content", "payload") + Wrapping:ObserveClientDetailsUseCase.kt$ObserveClientDetailsUseCaseImpl$( + Wrapping:ObserveConversationAssetStatusesUseCase.kt$ObserveAssetStatusesUseCaseImpl$( + Wrapping:ObserveConversationMembersUseCaseTest.kt$ObserveConversationMembersUseCaseTest$( + Wrapping:ObserveMessageReceiptsUseCase.kt$ObserveMessageReceiptsUseCaseImpl$( + Wrapping:ObserveNewClientsUseCaseTest.kt$ObserveNewClientsUseCaseTest$( NewClientResult.InOtherAccount( listOf(TestClient.CLIENT), TestUser.OTHER_USER_ID, TestUser.SELF.name, TestUser.SELF.handle ), awaitItem() ) + Wrapping:ObserveNewClientsUseCaseTest.kt$ObserveNewClientsUseCaseTest.Arrangement$stubsUnitByDefault = true + Wrapping:ObserveSecurityClassificationLabelUseCaseTest.kt$ObserveSecurityClassificationLabelUseCaseTest.Arrangement$( TestUser.OTHER.copy( UserId(uuid4().toString(), domain), expiresAt = expiresAt ), Conversation.Member.Role.Member ) + Wrapping:OnCloseCall.kt$OnCloseCall$( + Wrapping:OnlyAffectedTestTask.kt$OnlyAffectedTestTask$( + Wrapping:OnlyAffectedTestTask.kt$OnlyAffectedTestTask$computeModulesPredicate(hasToRunAllTests, affectedModules.contains(it.name) && !ignoredModules.contains(it.name)) + Wrapping:PersistMigratedMessagesUseCase.kt$PersistMigratedMessagesUseCaseImpl$( + Wrapping:PocIntegrationTest.kt$PocIntegrationTest.Companion$( rootPath = "$HOME_DIRECTORY/.kalium/accounts-test", kaliumConfigs = KaliumConfigs( developmentApiEnabled = true, encryptProteusStorage = true, isMLSSupportEnabled = true, wipeOnDeviceRemoval = true, kaliumMockEngine = KaliumMockEngine(mockEngine = mockEngine), mockNetworkStateObserver = TestNetworkStateObserver.DEFAULT_TEST_NETWORK_STATE_OBSERVER ), "Wire Integration Tests" ) + Wrapping:PreKeyListMapper.kt$PreKeyListMapper$( + Wrapping:PreKeyListMapperTest.kt$PreKeyListMapperTest$( "domA" to mapOf( "userA" to mapOf( "clientA" to PreKeyDTO(1, "keyA") ), "userB" to mapOf( "clientB" to PreKeyDTO(32, "key") ) ), "domB" to mapOf( "userB" to mapOf( "clientB" to PreKeyDTO(22, "keyC") ) ) ) + Wrapping:PreKeyListMapperTest.kt$PreKeyListMapperTest$( "userA" to mapOf( "clientA" to PreKeyDTO(1, "keyA") ), "userB" to mapOf( "clientB" to PreKeyDTO(32, "key") ) ) + Wrapping:PreKeyListMapperTest.kt$PreKeyListMapperTest$( "userA" to mapOf( firstKeySet.clientId to firstKeySet.response, secondKeySet.clientId to secondKeySet.response ), "userB" to mapOf(thirdKeySet.clientId to thirdKeySet.response) ) + Wrapping:ProteusClientCoreCryptoImpl.kt$ProteusClientCoreCryptoImpl$coreCrypto.proteusSessionFromPrekey(sessionId.value, toUByteList(preKeyCrypto.encodedData.decodeBase64Bytes())) + Wrapping:ProteusMessageUnpackerTest.kt$ProteusMessageUnpackerTest$( + Wrapping:ProteusMessageUnpackerTest.kt$ProteusMessageUnpackerTest$(any(), ProtoContent.Readable( "uuid", MessageContent.Unknown(), false, Conversation.LegalHoldStatus.DISABLED )) + Wrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$( + Wrapping:ProtoContentMapper.kt$ProtoContentMapperImpl$( type = when (receiptContent.type) { ReceiptType.DELIVERED -> Confirmation.Type.DELIVERED ReceiptType.READ -> Confirmation.Type.READ }, firstMessageId = firstMessage, moreMessageIds = restOfMessageIds ) + Wrapping:ProtoContentMapperTest.kt$ProtoContentMapperTest$( TEST_MESSAGE_UUID, GenericMessage.Content.Asset( Asset( original = Asset.Original( mimeType = "file/binary", size = mockedAsset.size.toLong(), name = assetName, ), status = Asset.Status.NotUploaded(Asset.NotUploaded.CANCELLED), ) ) ) + Wrapping:QualifiedSendMessageRequestJson.kt$QualifiedSendMessageRequestJson$( MessageApi.Parameters.QualifiedDefaultParameters( sender = USER_1_CLIENT_1, externalBlob = "blob-id".toByteArray(), nativePush = true, recipients = mapOf(), transient = false, priority = MessagePriority.HIGH, messageOption = MessageApi.QualifiedMessageOption.IgnoreAll ), defaultParametersProvider ) + Wrapping:ReceiptModeUpdateEventHandlerTest.kt$ReceiptModeUpdateEventHandlerTest$( + Wrapping:RegisterTokenJson.kt$RegisterTokenJson$( PushTokenBody( "8218398", "123456", "oaisjdoiasjd", "GCM" ), jsonProvider ) + Wrapping:RemoteMonkey.kt$RemoteMonkey$( + Wrapping:ReplayApplication.kt$ReplayApplication$"-e and -t must be provided for the file type" + Wrapping:RequestResponseEventAction.kt$RequestResponseEventAction$ + Wrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$( + Wrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$( matching { it is Message.Signaling // message edits are sent as signaling messages && it.id != message.id // when editing we need to generate and set a new id && it.content is MessageContent.TextEdited && (it.content as MessageContent.TextEdited).editMessageId == message.id // original id in edited content }, anything() ) + Wrapping:RetryFailedMessageUseCaseTest.kt$RetryFailedMessageUseCaseTest$(matching { it.id == message.id && it.content is MessageContent.Asset && (it.content as MessageContent.Asset).value.remoteData.assetId == uploadedAssetId.key && (it.content as MessageContent.Asset).value.remoteData.assetDomain == uploadedAssetId.domain && (it.content as MessageContent.Asset).value.remoteData.assetToken == uploadedAssetId.assetToken }, anything()) + Wrapping:SSOLoginRepositoryTest.kt$SSOLoginRepositoryTest$( DomainLookupResult( networkResponse.configJsonUrl, networkResponse.webappWelcomeUrl ), actual.value ) + Wrapping:ScheduleNewAssetMessageUseCaseTest.kt$ScheduleNewAssetMessageUseCaseTest$( + Wrapping:SearchDAOTest.kt$SearchDAOTest$( MemberEntity( connectedPartOfConversation1.id, MemberEntity.Role.Member ), conversationToExclude.id ) + Wrapping:SearchDAOTest.kt$SearchDAOTest$( MemberEntity( connectedPartOfConversation2.id, MemberEntity.Role.Member ), conversationToExclude.id ) + Wrapping:SearchDAOTest.kt$SearchDAOTest$( MemberEntity( connectedUser1.id, MemberEntity.Role.Member ), conversation.id ) + Wrapping:SearchUserRepositoryTest.kt$SearchUserRepositoryTest.Arrangement$SelfTeamIdProviderArrangement by SelfTeamIdProviderArrangementImpl(), SearchDAOArrangement by SearchDAOArrangementImpl() + Wrapping:SendButtonActionConfirmationMessageTest.kt$SendButtonActionConfirmationMessageTest$( + Wrapping:SendButtonActionConfirmationMessageTest.kt$SendButtonActionConfirmationMessageTest$(any(), matching { it is MessageTarget.Users && it.userId == listOf(buttonActionSender) }) + Wrapping:SendButtonActionMessageTest.kt$SendButtonActionMessageTest$( + Wrapping:SendButtonActionMessageTest.kt$SendButtonActionMessageTest$(any(), matching { it is MessageTarget.Users && it.userId == listOf(originalSender) }) + Wrapping:SendDirectMessageEventAction.kt$SendDirectMessageEventAction$( + Wrapping:SendDirectMessageEventAction.kt$SendDirectMessageEventAction$(ActionType.SendMessage( UserCount.single(), 1u, 1u ), {}) + Wrapping:SendEditTextMessageUseCase.kt$SendEditTextMessageUseCase$messageSendFailureHandler.handleFailureAndUpdateMessageStatus(it, conversationId, originalMessageId, TYPE) + Wrapping:SendKnockUseCase.kt$SendKnockUseCase$messageSendFailureHandler.handleFailureAndUpdateMessageStatus(it, conversationId, generatedMessageUuid, TYPE) + Wrapping:SendKnockUserCaseTest.kt$SendKnockUserCaseTest$( + Wrapping:SendKnockUserCaseTest.kt$SendKnockUserCaseTest$(matching { assertIs<Message.Regular>(it) it.expirationData?.expireAfter == expectedDuration }, any()) + Wrapping:SendLocationUseCase.kt$SendLocationUseCase$messageSendFailureHandler.handleFailureAndUpdateMessageStatus(it, conversationId, generatedMessageUuid, TYPE) + Wrapping:SendLocationUseCaseTest.kt$SendLocationUseCaseTest$( + Wrapping:SendLocationUseCaseTest.kt$SendLocationUseCaseTest$(matching { assertIs<Message.Regular>(it) it.expirationData?.expireAfter == expectedDuration }, any()) + Wrapping:SendMessageAction.kt$SendMessageAction$( + Wrapping:SendMessageEventAction.kt$SendMessageEventAction$( + Wrapping:SendMessageEventAction.kt$SendMessageEventAction$(ActionType.SendMessage( UserCount.single(), 1u, 1u ), {}) + Wrapping:SendMessagePartialFailureMapperTest.kt$SendMessagePartialFailureMapperTest$( + Wrapping:SendMessageRequestJson.kt$SendMessageRequestJson$( MessageApi.Parameters.DefaultParameters( sender = "sender-client-it", data = null, nativePush = true, recipients = recipients, transient = false, priority = MessagePriority.LOW ), defaultParametersProvider ) + Wrapping:SlowSyncManagerTest.kt$SlowSyncManagerTest.Arrangement$stubsUnitByDefault = true + Wrapping:StoreServerConfigUseCaseTest.kt$StoreServerConfigUseCaseTest.Arrangement$( + Wrapping:SyncFeatureConfigsUseCaseTest.kt$SyncFeatureConfigsUseCaseTest$( + Wrapping:SyncMigrationStep_6_7_Test.kt$SyncMigrationStep_6_7_Test.Arrangement$AccountRepositoryArrangement by AccountRepositoryArrangementImpl(), SelfTeamIdProviderArrangement by SelfTeamIdProviderArrangementImpl() + Wrapping:SyncMigrationStepsProviderTest.kt$SyncMigrationStepsProviderTest.Arrangement$AccountRepositoryArrangement by AccountRepositoryArrangementImpl(), SelfTeamIdProviderArrangement by SelfTeamIdProviderArrangementImpl() + Wrapping:TeamRepositoryTest.kt$TeamRepositoryTest$( + Wrapping:TestAsset.kt$TestAsset$( + Wrapping:TestDataImporter.kt$( "config" to mapOf( "allowedCipherSuites" to listOf(1), "defaultCipherSuite" to 1, "defaultProtocol" to "proteus", "protocolToggleUsers" to listOf<String>(), "supportedProtocols" to listOf("mls", "proteus") ), "status" to "enabled" ) + Wrapping:TestDataImporter.kt$( "email" to email, "name" to ownerName, "password" to backendConfig.passwordForUsers, "email_code" to code, "team" to mapOf( "name" to backendConfig.teamName, "icon" to "default", "binding" to true ) ) + Wrapping:TestDataImporter.kt$TestDataImporter$( + Wrapping:TestDataImporter.kt$TestDataImporter$("id" to team.id, "owner" to mapOf( "email" to team.owner.email, "id" to team.owner.userId.value ), "users" to users.map { mapOf( "email" to it.email, "id" to it.userId.value ) }) + Wrapping:TestDataImporter.kt$token + Wrapping:ToggleReactionUseCaseTest.kt$ToggleReactionUseCaseTest$( + Wrapping:ToggleReactionUseCaseTest.kt$ToggleReactionUseCaseTest$(matching { val content = it.content as MessageContent.Reaction content.emojiSet.isEmpty() && content.messageId == TEST_MESSAGE_ID }, any()) + Wrapping:ToggleReactionUseCaseTest.kt$ToggleReactionUseCaseTest$(matching { val content = it.content as MessageContent.Reaction content.emojiSet.size == 1 && content.emojiSet.first() == emojiReaction && content.messageId == TEST_MESSAGE_ID }, any()) + Wrapping:UnreadEventMapper.kt$UnreadEventMapper$( + Wrapping:UpdateConversationMutedStatusUseCase.kt$UpdateConversationMutedStatusUseCaseImpl$( + Wrapping:UpdateConversationReceiptModeUseCaseTest.kt$UpdateConversationReceiptModeUseCaseTest$( + Wrapping:UpdateSelfUserSupportedProtocolsUseCase.kt$UpdateSelfUserSupportedProtocolsUseCaseImpl$( + Wrapping:UpdateSupportedProtocolsUseCaseTest.kt$UpdateSupportedProtocolsUseCaseTest$( + Wrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( conversationId, listOf( MemberEntity( user = QualifiedIDEntity( "3", "someDomain" ), role = MemberEntity.Role.Admin ) ) ) + Wrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( conversationId, listOf( MemberEntity( user = user1.id, role = MemberEntity.Role.Admin ), MemberEntity( user = user2.id, role = MemberEntity.Role.Member ), ) ) + Wrapping:UserConversationDAOIntegrationTest.kt$UserConversationDAOIntegrationTest$( user = QualifiedIDEntity( "3", "someDomain" ), role = MemberEntity.Role.Admin ) + Wrapping:UserDTOJson.kt$UserDTOJson$( SelfUserDTO( id = UserId("user_id", "domain.com"), name = "user_name_123", accentId = 2, assets = listOf(), deleted = null, email = null, handle = null, service = null, teamId = null, expiresAt = "", nonQualifiedId = "", locale = "", managedByDTO = null, phone = null, ssoID = null, supportedProtocols = null ), jsonProvider ) + Wrapping:UserEventReceiverTest.kt$UserEventReceiverTest$( + Wrapping:UserMapper.kt$UserMapperImpl$( name = newName, accentId = newAccent, assets = if (newAssetId != null) { listOf( UserAssetDTO(newAssetId, AssetSizeDTO.COMPLETE, UserAssetTypeDTO.IMAGE), UserAssetDTO(newAssetId, AssetSizeDTO.PREVIEW, UserAssetTypeDTO.IMAGE) ) } else { null } ) + Wrapping:UserRepository.kt$UserDataSource$( + Wrapping:UserRepository.kt$UserDataSource$it.id.value + Wrapping:UserRepository.kt$UserDataSource$it.isTeamMember(selfUserTeamId?.value, selfUserDomain) + Wrapping:UserRepositoryTest.kt$UserRepositoryTest$( + Wrapping:UserSearchApiWrapperTest.kt$UserSearchApiWrapperTest$( ConversationMemberExcludedOptions.ConversationExcluded( ConversationId( "someValue", "someDomain" ) ), selfUserIncluded = false ) + Wrapping:UserSearchApiWrapperTest.kt$UserSearchApiWrapperTest$( ConversationMemberExcludedOptions.ConversationExcluded( ConversationId( "someValue", "someDomain" ) ), selfUserIncluded = true ) + Wrapping:UserSearchApiWrapperTest.kt$UserSearchApiWrapperTest$( user = QualifiedIDEntity( "value3", "someDomain" ), role = MemberEntity.Role.Member ) + Wrapping:UserSearchApiWrapperTest.kt$UserSearchApiWrapperTest$( user = QualifiedIDEntity( selfUser.id.value, selfUser.id.domain ), role = MemberEntity.Role.Member ) + Wrapping:UserSessionScope.kt$UserSessionScope$( + Wrapping:ValidateEmailUseCase.kt$ValidateEmailUseCaseImpl.Companion$( + Wrapping:ValidatePasswordUseCase.kt$ValidatePasswordUseCaseImpl.Companion$( + Wrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$it is ValidatePasswordResult.Invalid && it.missingLowercaseCharacter + Wrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$it is ValidatePasswordResult.Invalid && it.missingSpecialCharacter + Wrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$it is ValidatePasswordResult.Invalid && it.missingUppercaseCharacter + Wrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$validatePasswordUseCase("A1@3.").let { it is ValidatePasswordResult.Invalid && it.missingLowercaseCharacter } + Wrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$validatePasswordUseCase("a1@3.").let { it is ValidatePasswordResult.Invalid && it.missingUppercaseCharacter } + Wrapping:ValidatePasswordUseCaseTest.kt$ValidatePasswordUseCaseTest$validatePasswordUseCase("aA13").let { it is ValidatePasswordResult.Invalid && it.missingSpecialCharacter } + Wrapping:ValidateUserHandleUseCaseTest.kt$ValidateUserHandleUseCaseTest$validateUserHandleUseCase( "1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890" + "1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890" + "123456789012345678901234567890123456789012345678901234567890" ) is ValidateUserHandleResult.Invalid.TooLong + Wrapping:VerifyBackupUseCaseTest.kt$VerifyBackupUseCaseTest.Arrangement$( + Wrapping:VerifyBackupUseCaseTest.kt$VerifyBackupUseCaseTest.Arrangement$(data.map { source(it.second) to it.second.name }, outputSink) + Wrapping:build.gradle.kts$( + Wrapping:build.gradle.kts$(it, closureOf<ExternalModuleDependency> { artifact { type = "aar" } }) + Wrapping:homeDirectory.kt$( rootPath, kaliumConfigs = KaliumConfigs( developmentApiEnabled = true, encryptProteusStorage = true, isMLSSupportEnabled = true, wipeOnDeviceRemoval = true, ), userAgent = "Wire Infinite Monkeys", useInMemoryStorage = true ) + From b4d4e7ce78b86f0896355a4582d94bd456e6f0f6 Mon Sep 17 00:00:00 2001 From: Vitor Hugo Schwaab Date: Tue, 2 Apr 2024 16:08:54 +0200 Subject: [PATCH 20/20] chore: update detekt rules --- detekt/detekt.yml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/detekt/detekt.yml b/detekt/detekt.yml index 2ef348d1357..1056d800b93 100644 --- a/detekt/detekt.yml +++ b/detekt/detekt.yml @@ -221,6 +221,9 @@ formatting: AnnotationOnSeparateLine: active: false autoCorrect: true + ArgumentListWrapping: + active: true + maxLineLength: 140 ChainWrapping: active: false autoCorrect: true @@ -293,6 +296,7 @@ formatting: ParameterListWrapping: active: true autoCorrect: true + maxLineLength: 140 SpacingAroundColon: active: true autoCorrect: true