mirror of
https://github.com/element-hq/element-web
synced 2024-11-25 02:35:48 +03:00
491f0cd08a
* Copyright headers 1 * Licence headers 2 * Copyright Headers 3 * Copyright Headers 4 * Copyright Headers 5 * Copyright Headers 6 * Copyright headers 7 * Add copyright headers for html and config file * Replace license files and update package.json * Update with CLA * lint
294 lines
14 KiB
TypeScript
294 lines
14 KiB
TypeScript
/*
|
|
Copyright 2024 New Vector Ltd.
|
|
Copyright 2022-2024 The Matrix.org Foundation C.I.C.
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
|
|
Please see LICENSE files in the repository root for full details.
|
|
*/
|
|
|
|
import type { EmittedEvents, Preset } from "matrix-js-sdk/src/matrix";
|
|
import { expect, test } from "../../element-web-test";
|
|
import {
|
|
createRoom,
|
|
enableKeyBackup,
|
|
logIntoElement,
|
|
logOutOfElement,
|
|
sendMessageInCurrentRoom,
|
|
verifySession,
|
|
} from "./utils";
|
|
import { isDendrite } from "../../plugins/homeserver/dendrite";
|
|
|
|
test.describe("Cryptography", function () {
|
|
test.use({
|
|
displayName: "Alice",
|
|
botCreateOpts: {
|
|
displayName: "Bob",
|
|
autoAcceptInvites: false,
|
|
},
|
|
});
|
|
|
|
test.describe("decryption failure messages", () => {
|
|
test("should handle device-relative historical messages", async ({
|
|
homeserver,
|
|
page,
|
|
app,
|
|
credentials,
|
|
user,
|
|
}) => {
|
|
test.setTimeout(60000);
|
|
|
|
// Start with a logged-in session, without key backup, and send a message.
|
|
await createRoom(page, "Test room", true);
|
|
await sendMessageInCurrentRoom(page, "test test");
|
|
|
|
// Log out, discarding the key for the sent message.
|
|
await logOutOfElement(page, true);
|
|
|
|
// Log in again, and see how the message looks.
|
|
await logIntoElement(page, homeserver, credentials);
|
|
await app.viewRoomByName("Test room");
|
|
const lastTile = page.locator(".mx_EventTile").last();
|
|
await expect(lastTile).toContainText("Historical messages are not available on this device");
|
|
await expect(lastTile.locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
|
|
|
|
// Now, we set up key backup, and then send another message.
|
|
const secretStorageKey = await enableKeyBackup(app);
|
|
await app.viewRoomByName("Test room");
|
|
await sendMessageInCurrentRoom(page, "test2 test2");
|
|
|
|
// Workaround for https://github.com/element-hq/element-web/issues/27267. It can take up to 10 seconds for
|
|
// the key to be backed up.
|
|
await page.waitForTimeout(10000);
|
|
|
|
// Finally, log out again, and back in, skipping verification for now, and see what we see.
|
|
await logOutOfElement(page);
|
|
await logIntoElement(page, homeserver, credentials);
|
|
await page.locator(".mx_AuthPage").getByRole("button", { name: "Skip verification for now" }).click();
|
|
await page.locator(".mx_AuthPage").getByRole("button", { name: "I'll verify later" }).click();
|
|
await app.viewRoomByName("Test room");
|
|
|
|
// There should be two historical events in the timeline
|
|
const tiles = await page.locator(".mx_EventTile").all();
|
|
expect(tiles.length).toBeGreaterThanOrEqual(2);
|
|
// look at the last two tiles only
|
|
for (const tile of tiles.slice(-2)) {
|
|
await expect(tile).toContainText("You need to verify this device for access to historical messages");
|
|
await expect(tile.locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
|
|
}
|
|
|
|
// Now verify our device (setting up key backup), and check what happens
|
|
await verifySession(app, secretStorageKey);
|
|
const tilesAfterVerify = (await page.locator(".mx_EventTile").all()).slice(-2);
|
|
|
|
// The first message still cannot be decrypted, because it was never backed up. It's now a regular UTD though.
|
|
await expect(tilesAfterVerify[0]).toContainText("Unable to decrypt message");
|
|
await expect(tilesAfterVerify[0].locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
|
|
|
|
// The second message should now be decrypted, with a grey shield
|
|
await expect(tilesAfterVerify[1]).toContainText("test2 test2");
|
|
await expect(tilesAfterVerify[1].locator(".mx_EventTile_e2eIcon_normal")).toBeVisible();
|
|
});
|
|
|
|
test.describe("non-joined historical messages", () => {
|
|
test.skip(isDendrite, "does not yet support membership on events");
|
|
|
|
test("should display undecryptable non-joined historical messages with a different message", async ({
|
|
homeserver,
|
|
page,
|
|
app,
|
|
credentials: aliceCredentials,
|
|
user: alice,
|
|
bot: bob,
|
|
}) => {
|
|
// Bob creates an encrypted room and sends a message to it. He then invites Alice
|
|
const roomId = await bob.evaluate(
|
|
async (client, { alice }) => {
|
|
const encryptionStatePromise = new Promise<void>((resolve) => {
|
|
client.on("RoomState.events" as EmittedEvents, (event, _state, _lastStateEvent) => {
|
|
if (event.getType() === "m.room.encryption") {
|
|
resolve();
|
|
}
|
|
});
|
|
});
|
|
|
|
const { room_id: roomId } = await client.createRoom({
|
|
initial_state: [
|
|
{
|
|
type: "m.room.encryption",
|
|
content: {
|
|
algorithm: "m.megolm.v1.aes-sha2",
|
|
},
|
|
},
|
|
],
|
|
name: "Test room",
|
|
preset: "private_chat" as Preset,
|
|
});
|
|
|
|
// wait for m.room.encryption event, so that when we send a
|
|
// message, it will be encrypted
|
|
await encryptionStatePromise;
|
|
|
|
await client.sendTextMessage(roomId, "This should be undecryptable");
|
|
|
|
await client.invite(roomId, alice.userId);
|
|
|
|
return roomId;
|
|
},
|
|
{ alice },
|
|
);
|
|
|
|
// Alice accepts the invite
|
|
await expect(
|
|
page.getByRole("group", { name: "Invites" }).locator(".mx_RoomSublist_tiles").getByRole("treeitem"),
|
|
).toHaveCount(1);
|
|
await page.getByRole("treeitem", { name: "Test room" }).click();
|
|
await page.locator(".mx_RoomView").getByRole("button", { name: "Accept" }).click();
|
|
|
|
// Bob sends an encrypted event and an undecryptable event
|
|
await bob.evaluate(
|
|
async (client, { roomId }) => {
|
|
await client.sendTextMessage(roomId, "This should be decryptable");
|
|
await client.sendEvent(
|
|
roomId,
|
|
"m.room.encrypted" as any,
|
|
{
|
|
algorithm: "m.megolm.v1.aes-sha2",
|
|
ciphertext: "this+message+will+be+undecryptable",
|
|
device_id: client.getDeviceId()!,
|
|
sender_key: (await client.getCrypto()!.getOwnDeviceKeys()).ed25519,
|
|
session_id: "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
|
|
} as any,
|
|
);
|
|
},
|
|
{ roomId },
|
|
);
|
|
|
|
// We wait for the event tiles that we expect from the messages that
|
|
// Bob sent, in sequence.
|
|
await expect(
|
|
page.locator(`.mx_EventTile`).getByText("You don't have access to this message"),
|
|
).toBeVisible();
|
|
await expect(page.locator(`.mx_EventTile`).getByText("This should be decryptable")).toBeVisible();
|
|
await expect(page.locator(`.mx_EventTile`).getByText("Unable to decrypt message")).toBeVisible();
|
|
|
|
// And then we ensure that they are where we expect them to be
|
|
// Alice should see these event tiles:
|
|
// - first message sent by Bob (undecryptable)
|
|
// - Bob invited Alice
|
|
// - Alice joined the room
|
|
// - second message sent by Bob (decryptable)
|
|
// - third message sent by Bob (undecryptable)
|
|
const tiles = await page.locator(".mx_EventTile").all();
|
|
expect(tiles.length).toBeGreaterThanOrEqual(5);
|
|
|
|
// The first message from Bob was sent before Alice was in the room, so should
|
|
// be different from the standard UTD message
|
|
await expect(tiles[tiles.length - 5]).toContainText("You don't have access to this message");
|
|
await expect(tiles[tiles.length - 5].locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
|
|
|
|
// The second message from Bob should be decryptable
|
|
await expect(tiles[tiles.length - 2]).toContainText("This should be decryptable");
|
|
// this tile won't have an e2e icon since we got the key from the sender
|
|
|
|
// The third message from Bob is undecryptable, but was sent while Alice was
|
|
// in the room and is expected to be decryptable, so this should have the
|
|
// standard UTD message
|
|
await expect(tiles[tiles.length - 1]).toContainText("Unable to decrypt message");
|
|
await expect(tiles[tiles.length - 1].locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
|
|
});
|
|
|
|
test("should be able to jump to a message sent before our last join event", async ({
|
|
homeserver,
|
|
page,
|
|
app,
|
|
credentials: aliceCredentials,
|
|
user: alice,
|
|
bot: bob,
|
|
}) => {
|
|
// Bob:
|
|
// - creates an encrypted room,
|
|
// - invites Alice,
|
|
// - sends a message to it,
|
|
// - kicks Alice,
|
|
// - sends a bunch more events
|
|
// - invites Alice again
|
|
// In this way, there will be an event that Alice can decrypt,
|
|
// followed by a bunch of undecryptable events which Alice shouldn't
|
|
// expect to be able to decrypt. The old code would have hidden all
|
|
// the events, even the decryptable event (which it wouldn't have
|
|
// even tried to fetch, if it was far enough back).
|
|
const { roomId, eventId } = await bob.evaluate(
|
|
async (client, { alice }) => {
|
|
const { room_id: roomId } = await client.createRoom({
|
|
initial_state: [
|
|
{
|
|
type: "m.room.encryption",
|
|
content: {
|
|
algorithm: "m.megolm.v1.aes-sha2",
|
|
},
|
|
},
|
|
],
|
|
name: "Test room",
|
|
preset: "private_chat" as Preset,
|
|
});
|
|
|
|
// invite Alice
|
|
const inviteAlicePromise = new Promise<void>((resolve) => {
|
|
client.on("RoomMember.membership" as EmittedEvents, (_event, member, _oldMembership?) => {
|
|
if (member.userId === alice.userId && member.membership === "invite") {
|
|
resolve();
|
|
}
|
|
});
|
|
});
|
|
await client.invite(roomId, alice.userId);
|
|
// wait for the invite to come back so that we encrypt to Alice
|
|
await inviteAlicePromise;
|
|
|
|
// send a message that Alice should be able to decrypt
|
|
const { event_id: eventId } = await client.sendTextMessage(
|
|
roomId,
|
|
"This should be decryptable",
|
|
);
|
|
|
|
// kick Alice
|
|
const kickAlicePromise = new Promise<void>((resolve) => {
|
|
client.on("RoomMember.membership" as EmittedEvents, (_event, member, _oldMembership?) => {
|
|
if (member.userId === alice.userId && member.membership === "leave") {
|
|
resolve();
|
|
}
|
|
});
|
|
});
|
|
await client.kick(roomId, alice.userId);
|
|
await kickAlicePromise;
|
|
|
|
// send a bunch of messages that Alice won't be able to decrypt
|
|
for (let i = 0; i < 20; i++) {
|
|
await client.sendTextMessage(roomId, `${i}`);
|
|
}
|
|
|
|
// invite Alice again
|
|
await client.invite(roomId, alice.userId);
|
|
|
|
return { roomId, eventId };
|
|
},
|
|
{ alice },
|
|
);
|
|
|
|
// Alice accepts the invite
|
|
await expect(
|
|
page.getByRole("group", { name: "Invites" }).locator(".mx_RoomSublist_tiles").getByRole("treeitem"),
|
|
).toHaveCount(1);
|
|
await page.getByRole("treeitem", { name: "Test room" }).click();
|
|
await page.locator(".mx_RoomView").getByRole("button", { name: "Accept" }).click();
|
|
|
|
// wait until we're joined and see the timeline
|
|
await expect(page.locator(`.mx_EventTile`).getByText("Alice joined the room")).toBeVisible();
|
|
|
|
// we should be able to jump to the decryptable message that Bob sent
|
|
await page.goto(`#/room/${roomId}/${eventId}`);
|
|
|
|
await expect(page.locator(`.mx_EventTile`).getByText("This should be decryptable")).toBeVisible();
|
|
});
|
|
});
|
|
});
|
|
});
|