2022-05-30 16:26:48 +03:00
|
|
|
/*
|
|
|
|
Copyright 2022 The Matrix.org Foundation C.I.C.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2022-11-25 16:54:06 +03:00
|
|
|
import type { ISendEventResponse, MatrixClient, Room } from "matrix-js-sdk/src/matrix";
|
2023-06-14 17:35:32 +03:00
|
|
|
import type { VerificationRequest } from "matrix-js-sdk/src/crypto-api";
|
2022-12-16 17:59:03 +03:00
|
|
|
import type { CypressBot } from "../../support/bot";
|
2023-01-11 02:29:56 +03:00
|
|
|
import { HomeserverInstance } from "../../plugins/utils/homeserver";
|
2023-01-19 18:19:07 +03:00
|
|
|
import { UserCredentials } from "../../support/login";
|
2023-06-22 12:43:49 +03:00
|
|
|
import { doTwoWaySasVerification, waitForVerificationRequest } from "./utils";
|
2023-05-24 12:50:05 +03:00
|
|
|
import { skipIfRustCrypto } from "../../support/util";
|
2022-05-30 16:26:48 +03:00
|
|
|
|
2022-06-30 11:59:25 +03:00
|
|
|
interface CryptoTestContext extends Mocha.Context {
|
2023-01-11 02:29:56 +03:00
|
|
|
homeserver: HomeserverInstance;
|
2022-12-16 17:59:03 +03:00
|
|
|
bob: CypressBot;
|
2022-06-30 11:59:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
const openRoomInfo = () => {
|
2023-05-01 23:13:24 +03:00
|
|
|
cy.findByRole("button", { name: "Room info" }).click();
|
2022-06-30 11:59:25 +03:00
|
|
|
return cy.get(".mx_RightPanel");
|
|
|
|
};
|
2022-05-30 16:26:48 +03:00
|
|
|
|
2022-06-30 11:59:25 +03:00
|
|
|
const checkDMRoom = () => {
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.get(".mx_RoomView_body").within(() => {
|
|
|
|
cy.findByText("Alice created this DM.").should("exist");
|
|
|
|
cy.findByText("Alice invited Bob", { timeout: 1000 }).should("exist");
|
|
|
|
|
|
|
|
cy.get(".mx_cryptoEvent").within(() => {
|
|
|
|
cy.findByText("Encryption enabled").should("exist");
|
|
|
|
});
|
|
|
|
});
|
2022-06-30 11:59:25 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
const startDMWithBob = function (this: CryptoTestContext) {
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.get(".mx_RoomList").within(() => {
|
|
|
|
cy.findByRole("button", { name: "Start chat" }).click();
|
|
|
|
});
|
|
|
|
cy.findByTestId("invite-dialog-input").type(this.bob.getUserId());
|
|
|
|
cy.get(".mx_InviteDialog_tile_nameStack_name").within(() => {
|
|
|
|
cy.findByText("Bob").click();
|
|
|
|
});
|
|
|
|
cy.get(".mx_InviteDialog_userTile_pill .mx_InviteDialog_userTile_name").within(() => {
|
|
|
|
cy.findByText("Bob").should("exist");
|
|
|
|
});
|
|
|
|
cy.findByRole("button", { name: "Go" }).click();
|
2022-06-30 11:59:25 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
const testMessages = function (this: CryptoTestContext) {
|
2022-08-04 09:19:52 +03:00
|
|
|
// check the invite message
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.findByText("Hey!")
|
2022-08-25 12:46:43 +03:00
|
|
|
.closest(".mx_EventTile")
|
|
|
|
.within(() => {
|
|
|
|
cy.get(".mx_EventTile_e2eIcon_warning").should("not.exist");
|
|
|
|
});
|
2022-06-30 11:59:25 +03:00
|
|
|
|
|
|
|
// Bob sends a response
|
|
|
|
cy.get<Room>("@bobsRoom").then((room) => {
|
|
|
|
this.bob.sendTextMessage(room.roomId, "Hoo!");
|
2022-05-30 16:26:48 +03:00
|
|
|
});
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.findByText("Hoo!").closest(".mx_EventTile").should("not.have.descendants", ".mx_EventTile_e2eIcon_warning");
|
2022-06-30 11:59:25 +03:00
|
|
|
};
|
2022-05-30 16:26:48 +03:00
|
|
|
|
2022-06-30 11:59:25 +03:00
|
|
|
const bobJoin = function (this: CryptoTestContext) {
|
2022-10-07 14:34:28 +03:00
|
|
|
cy.window({ log: false })
|
|
|
|
.then(async (win) => {
|
|
|
|
const bobRooms = this.bob.getRooms();
|
|
|
|
if (!bobRooms.length) {
|
|
|
|
await new Promise<void>((resolve) => {
|
|
|
|
const onMembership = (_event) => {
|
|
|
|
this.bob.off(win.matrixcs.RoomMemberEvent.Membership, onMembership);
|
|
|
|
resolve();
|
|
|
|
};
|
|
|
|
this.bob.on(win.matrixcs.RoomMemberEvent.Membership, onMembership);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.then(() => {
|
|
|
|
cy.botJoinRoomByName(this.bob, "Alice").as("bobsRoom");
|
|
|
|
});
|
|
|
|
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.findByText("Bob joined the room").should("exist");
|
2022-06-30 11:59:25 +03:00
|
|
|
};
|
|
|
|
|
2022-11-30 16:03:47 +03:00
|
|
|
/** configure the given MatrixClient to auto-accept any invites */
|
|
|
|
function autoJoin(client: MatrixClient) {
|
|
|
|
cy.window({ log: false }).then(async (win) => {
|
|
|
|
client.on(win.matrixcs.RoomMemberEvent.Membership, (event, member) => {
|
|
|
|
if (member.membership === "invite" && member.userId === client.getUserId()) {
|
|
|
|
client.joinRoom(member.roomId);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2022-06-30 11:59:25 +03:00
|
|
|
const verify = function (this: CryptoTestContext) {
|
|
|
|
const bobsVerificationRequestPromise = waitForVerificationRequest(this.bob);
|
|
|
|
|
|
|
|
openRoomInfo().within(() => {
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.findByRole("button", { name: /People \d/ }).click(); // \d is the number of the room members
|
|
|
|
cy.findByText("Bob").click();
|
|
|
|
cy.findByRole("button", { name: "Verify" }).click();
|
|
|
|
cy.findByRole("button", { name: "Start Verification" }).click();
|
2023-06-19 15:37:28 +03:00
|
|
|
|
|
|
|
// this requires creating a DM, so can take a while. Give it a longer timeout.
|
|
|
|
cy.findByRole("button", { name: "Verify by emoji", timeout: 30000 }).click();
|
|
|
|
|
2023-07-07 19:56:53 +03:00
|
|
|
cy.wrap(bobsVerificationRequestPromise).then(async (request: VerificationRequest) => {
|
2023-06-22 12:43:49 +03:00
|
|
|
// the bot user races with the Element user to hit the "verify by emoji" button
|
2023-07-07 19:56:53 +03:00
|
|
|
const verifier = await request.startVerification("m.sas.v1");
|
2023-06-22 12:43:49 +03:00
|
|
|
doTwoWaySasVerification(verifier);
|
2022-06-30 11:59:25 +03:00
|
|
|
});
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.findByRole("button", { name: "They match" }).click();
|
|
|
|
cy.findByText("You've successfully verified Bob!").should("exist");
|
|
|
|
cy.findByRole("button", { name: "Got it" }).click();
|
2022-05-30 16:26:48 +03:00
|
|
|
});
|
2022-06-30 11:59:25 +03:00
|
|
|
};
|
2022-05-30 16:26:48 +03:00
|
|
|
|
2022-06-30 11:59:25 +03:00
|
|
|
describe("Cryptography", function () {
|
2023-01-19 18:19:07 +03:00
|
|
|
let aliceCredentials: UserCredentials;
|
|
|
|
|
2022-06-30 11:59:25 +03:00
|
|
|
beforeEach(function () {
|
2023-01-11 02:29:56 +03:00
|
|
|
cy.startHomeserver("default")
|
|
|
|
.as("homeserver")
|
|
|
|
.then((homeserver: HomeserverInstance) => {
|
2023-01-19 18:19:07 +03:00
|
|
|
cy.initTestUser(homeserver, "Alice", undefined, "alice_").then((credentials) => {
|
|
|
|
aliceCredentials = credentials;
|
|
|
|
});
|
2023-05-25 21:24:50 +03:00
|
|
|
cy.getBot(homeserver, {
|
|
|
|
displayName: "Bob",
|
|
|
|
autoAcceptInvites: false,
|
|
|
|
userIdPrefix: "bob_",
|
|
|
|
}).as("bob");
|
2022-05-30 16:26:48 +03:00
|
|
|
});
|
2022-06-30 11:59:25 +03:00
|
|
|
});
|
|
|
|
|
|
|
|
afterEach(function (this: CryptoTestContext) {
|
2023-01-11 02:29:56 +03:00
|
|
|
cy.stopHomeserver(this.homeserver);
|
2022-06-30 11:59:25 +03:00
|
|
|
});
|
2022-05-30 16:26:48 +03:00
|
|
|
|
2023-07-27 14:34:44 +03:00
|
|
|
for (const isDeviceVerified of [true, false]) {
|
|
|
|
it(`setting up secure key backup should work isDeviceVerified=${isDeviceVerified}`, () => {
|
2023-06-20 18:27:18 +03:00
|
|
|
/**
|
|
|
|
* Verify that the `m.cross_signing.${keyType}` key is available on the account data on the server
|
|
|
|
* @param keyType
|
|
|
|
*/
|
|
|
|
function verifyKey(keyType: string) {
|
|
|
|
return cy
|
|
|
|
.getClient()
|
|
|
|
.then((cli) => cy.wrap(cli.getAccountDataFromServer(`m.cross_signing.${keyType}`)))
|
|
|
|
.then((accountData: { encrypted: Record<string, Record<string, string>> }) => {
|
|
|
|
expect(accountData.encrypted).to.exist;
|
|
|
|
const keys = Object.keys(accountData.encrypted);
|
|
|
|
const key = accountData.encrypted[keys[0]];
|
|
|
|
expect(key.ciphertext).to.exist;
|
|
|
|
expect(key.iv).to.exist;
|
|
|
|
expect(key.mac).to.exist;
|
2023-06-14 11:12:01 +03:00
|
|
|
});
|
2023-06-20 18:27:18 +03:00
|
|
|
}
|
2023-06-14 11:12:01 +03:00
|
|
|
|
2023-06-20 18:27:18 +03:00
|
|
|
/**
|
|
|
|
* Click on download button and continue
|
|
|
|
*/
|
|
|
|
function downloadKey() {
|
|
|
|
// Clicking download instead of Copy because of https://github.com/cypress-io/cypress/issues/2851
|
|
|
|
cy.findByRole("button", { name: "Download" }).click();
|
2023-06-14 11:12:01 +03:00
|
|
|
cy.contains(".mx_Dialog_primary:not([disabled])", "Continue").click();
|
2023-06-20 18:27:18 +03:00
|
|
|
}
|
2023-06-14 11:12:01 +03:00
|
|
|
|
2023-06-20 18:27:18 +03:00
|
|
|
it("by recovery code", () => {
|
|
|
|
skipIfRustCrypto();
|
|
|
|
|
|
|
|
// Verified the device
|
|
|
|
if (isDeviceVerified) {
|
|
|
|
cy.bootstrapCrossSigning(aliceCredentials);
|
|
|
|
}
|
|
|
|
|
|
|
|
cy.openUserSettings("Security & Privacy");
|
|
|
|
cy.findByRole("button", { name: "Set up Secure Backup" }).click();
|
|
|
|
cy.get(".mx_Dialog").within(() => {
|
|
|
|
// Recovery key is selected by default
|
|
|
|
cy.findByRole("button", { name: "Continue" }).click();
|
|
|
|
cy.get(".mx_CreateSecretStorageDialog_recoveryKey code").invoke("text").as("securityKey");
|
|
|
|
|
|
|
|
downloadKey();
|
|
|
|
|
|
|
|
// When the device is verified, the `Setting up keys` step is skipped
|
|
|
|
if (!isDeviceVerified) {
|
|
|
|
cy.get(".mx_InteractiveAuthDialog").within(() => {
|
|
|
|
cy.get(".mx_Dialog_title").within(() => {
|
|
|
|
cy.findByText("Setting up keys").should("exist");
|
|
|
|
cy.findByText("Setting up keys").should("not.exist");
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
cy.findByText("Secure Backup successful").should("exist");
|
|
|
|
cy.findByRole("button", { name: "Done" }).click();
|
|
|
|
cy.findByText("Secure Backup successful").should("not.exist");
|
|
|
|
});
|
2023-06-14 11:12:01 +03:00
|
|
|
|
2023-06-20 18:27:18 +03:00
|
|
|
// Verify that the SSSS keys are in the account data stored in the server
|
|
|
|
verifyKey("master");
|
|
|
|
verifyKey("self_signing");
|
|
|
|
verifyKey("user_signing");
|
2023-04-12 18:48:31 +03:00
|
|
|
});
|
2023-02-17 15:35:13 +03:00
|
|
|
|
2023-06-20 18:27:18 +03:00
|
|
|
it("by passphrase", () => {
|
|
|
|
skipIfRustCrypto();
|
|
|
|
|
|
|
|
// Verified the device
|
|
|
|
if (isDeviceVerified) {
|
|
|
|
cy.bootstrapCrossSigning(aliceCredentials);
|
|
|
|
}
|
|
|
|
|
|
|
|
cy.openUserSettings("Security & Privacy");
|
|
|
|
cy.findByRole("button", { name: "Set up Secure Backup" }).click();
|
|
|
|
cy.get(".mx_Dialog").within(() => {
|
|
|
|
// Select passphrase option
|
|
|
|
cy.findByText("Enter a Security Phrase").click();
|
|
|
|
cy.findByRole("button", { name: "Continue" }).click();
|
|
|
|
|
|
|
|
// Fill passphrase input
|
|
|
|
cy.get("input").type("new passphrase for setting up a secure key backup");
|
|
|
|
cy.contains(".mx_Dialog_primary:not([disabled])", "Continue").click();
|
|
|
|
// Confirm passphrase
|
|
|
|
cy.get("input").type("new passphrase for setting up a secure key backup");
|
|
|
|
cy.contains(".mx_Dialog_primary:not([disabled])", "Continue").click();
|
|
|
|
|
|
|
|
downloadKey();
|
|
|
|
|
|
|
|
cy.findByText("Secure Backup successful").should("exist");
|
|
|
|
cy.findByRole("button", { name: "Done" }).click();
|
|
|
|
cy.findByText("Secure Backup successful").should("not.exist");
|
|
|
|
});
|
|
|
|
|
|
|
|
// Verify that the SSSS keys are in the account data stored in the server
|
|
|
|
verifyKey("master");
|
|
|
|
verifyKey("self_signing");
|
|
|
|
verifyKey("user_signing");
|
|
|
|
});
|
2023-07-27 14:34:44 +03:00
|
|
|
});
|
|
|
|
}
|
2022-05-30 16:26:48 +03:00
|
|
|
|
2022-06-30 11:59:25 +03:00
|
|
|
it("creating a DM should work, being e2e-encrypted / user verification", function (this: CryptoTestContext) {
|
2023-05-24 12:50:05 +03:00
|
|
|
skipIfRustCrypto();
|
2023-01-19 18:19:07 +03:00
|
|
|
cy.bootstrapCrossSigning(aliceCredentials);
|
2022-06-30 11:59:25 +03:00
|
|
|
startDMWithBob.call(this);
|
2022-08-04 09:19:52 +03:00
|
|
|
// send first message
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.findByRole("textbox", { name: "Send a message…" }).type("Hey!{enter}");
|
2022-06-30 11:59:25 +03:00
|
|
|
checkDMRoom();
|
|
|
|
bobJoin.call(this);
|
|
|
|
testMessages.call(this);
|
|
|
|
verify.call(this);
|
2023-05-08 05:26:29 +03:00
|
|
|
|
|
|
|
// Assert that verified icon is rendered
|
|
|
|
cy.findByRole("button", { name: "Room members" }).click();
|
|
|
|
cy.findByRole("button", { name: "Room information" }).click();
|
|
|
|
cy.get(".mx_RoomSummaryCard_e2ee_verified").should("exist");
|
|
|
|
|
|
|
|
// Take a snapshot of RoomSummaryCard with a verified E2EE icon
|
|
|
|
cy.get(".mx_RightPanel").percySnapshotElement("RoomSummaryCard - with a verified E2EE icon", {
|
|
|
|
widths: [264], // Emulate the UI. The value is based on minWidth specified on MainSplit.tsx
|
|
|
|
});
|
2022-05-30 16:26:48 +03:00
|
|
|
});
|
2022-11-30 16:03:47 +03:00
|
|
|
|
|
|
|
it("should allow verification when there is no existing DM", function (this: CryptoTestContext) {
|
2023-05-24 12:50:05 +03:00
|
|
|
skipIfRustCrypto();
|
2023-01-19 18:19:07 +03:00
|
|
|
cy.bootstrapCrossSigning(aliceCredentials);
|
2022-11-30 16:03:47 +03:00
|
|
|
autoJoin(this.bob);
|
|
|
|
|
2022-11-25 16:54:06 +03:00
|
|
|
// we need to have a room with the other user present, so we can open the verification panel
|
2022-11-30 16:03:47 +03:00
|
|
|
let roomId: string;
|
|
|
|
cy.createRoom({ name: "TestRoom", invite: [this.bob.getUserId()] }).then((_room1Id) => {
|
|
|
|
roomId = _room1Id;
|
|
|
|
cy.log(`Created test room ${roomId}`);
|
|
|
|
cy.visit(`/#/room/${roomId}`);
|
|
|
|
// wait for Bob to join the room, otherwise our attempt to open his user details may race
|
|
|
|
// with his join.
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.findByText("Bob joined the room").should("exist");
|
2022-11-30 16:03:47 +03:00
|
|
|
});
|
|
|
|
|
|
|
|
verify.call(this);
|
|
|
|
});
|
2022-11-25 16:54:06 +03:00
|
|
|
|
|
|
|
it("should show the correct shield on edited e2e events", function (this: CryptoTestContext) {
|
2023-05-24 12:50:05 +03:00
|
|
|
skipIfRustCrypto();
|
2023-01-19 18:19:07 +03:00
|
|
|
cy.bootstrapCrossSigning(aliceCredentials);
|
2022-11-25 16:54:06 +03:00
|
|
|
|
|
|
|
// bob has a second, not cross-signed, device
|
2023-01-11 02:29:56 +03:00
|
|
|
cy.loginBot(this.homeserver, this.bob.getUserId(), this.bob.__cypress_password, {}).as("bobSecondDevice");
|
2022-11-25 16:54:06 +03:00
|
|
|
|
|
|
|
autoJoin(this.bob);
|
|
|
|
|
|
|
|
// first create the room, so that we can open the verification panel
|
|
|
|
cy.createRoom({ name: "TestRoom", invite: [this.bob.getUserId()] })
|
|
|
|
.as("testRoomId")
|
|
|
|
.then((roomId) => {
|
|
|
|
cy.log(`Created test room ${roomId}`);
|
|
|
|
cy.visit(`/#/room/${roomId}`);
|
|
|
|
|
|
|
|
// enable encryption
|
|
|
|
cy.getClient().then((cli) => {
|
|
|
|
cli.sendStateEvent(roomId, "m.room.encryption", { algorithm: "m.megolm.v1.aes-sha2" });
|
|
|
|
});
|
|
|
|
|
|
|
|
// wait for Bob to join the room, otherwise our attempt to open his user details may race
|
|
|
|
// with his join.
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.findByText("Bob joined the room").should("exist");
|
2022-11-25 16:54:06 +03:00
|
|
|
});
|
|
|
|
|
|
|
|
verify.call(this);
|
|
|
|
|
|
|
|
cy.get<string>("@testRoomId").then((roomId) => {
|
|
|
|
// bob sends a valid event
|
|
|
|
cy.wrap(this.bob.sendTextMessage(roomId, "Hoo!")).as("testEvent");
|
|
|
|
|
|
|
|
// the message should appear, decrypted, with no warning
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.get(".mx_EventTile_last .mx_EventTile_body")
|
|
|
|
.within(() => {
|
|
|
|
cy.findByText("Hoo!");
|
|
|
|
})
|
2022-11-25 16:54:06 +03:00
|
|
|
.closest(".mx_EventTile")
|
|
|
|
.should("not.have.descendants", ".mx_EventTile_e2eIcon_warning");
|
|
|
|
|
|
|
|
// bob sends an edit to the first message with his unverified device
|
|
|
|
cy.get<MatrixClient>("@bobSecondDevice").then((bobSecondDevice) => {
|
|
|
|
cy.get<ISendEventResponse>("@testEvent").then((testEvent) => {
|
|
|
|
bobSecondDevice.sendMessage(roomId, {
|
|
|
|
"m.new_content": {
|
|
|
|
msgtype: "m.text",
|
|
|
|
body: "Haa!",
|
|
|
|
},
|
|
|
|
"m.relates_to": {
|
|
|
|
rel_type: "m.replace",
|
|
|
|
event_id: testEvent.event_id,
|
|
|
|
},
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
// the edit should have a warning
|
|
|
|
cy.contains(".mx_EventTile_body", "Haa!")
|
|
|
|
.closest(".mx_EventTile")
|
|
|
|
.within(() => {
|
|
|
|
cy.get(".mx_EventTile_e2eIcon_warning").should("exist");
|
|
|
|
});
|
|
|
|
|
|
|
|
// a second edit from the verified device should be ok
|
|
|
|
cy.get<ISendEventResponse>("@testEvent").then((testEvent) => {
|
|
|
|
this.bob.sendMessage(roomId, {
|
|
|
|
"m.new_content": {
|
|
|
|
msgtype: "m.text",
|
|
|
|
body: "Hee!",
|
|
|
|
},
|
|
|
|
"m.relates_to": {
|
|
|
|
rel_type: "m.replace",
|
|
|
|
event_id: testEvent.event_id,
|
|
|
|
},
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2023-04-12 18:48:31 +03:00
|
|
|
cy.get(".mx_EventTile_last .mx_EventTile_body")
|
|
|
|
.within(() => {
|
|
|
|
cy.findByText("Hee!");
|
|
|
|
})
|
2022-11-25 16:54:06 +03:00
|
|
|
.closest(".mx_EventTile")
|
|
|
|
.should("not.have.descendants", ".mx_EventTile_e2eIcon_warning");
|
|
|
|
});
|
|
|
|
});
|
2022-05-30 16:26:48 +03:00
|
|
|
});
|