295 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			TypeScript
		
	
	
			
		
		
	
	
			295 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			TypeScript
		
	
	
/*
 | 
						|
Copyright 2024 New Vector Ltd.
 | 
						|
Copyright 2022-2024 The Matrix.org Foundation C.I.C.
 | 
						|
 | 
						|
SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
 | 
						|
Please see LICENSE files in the repository root for full details.
 | 
						|
*/
 | 
						|
 | 
						|
import type { EmittedEvents, Preset } from "matrix-js-sdk/src/matrix";
 | 
						|
import { expect, test } from "../../element-web-test";
 | 
						|
import {
 | 
						|
    createRoom,
 | 
						|
    enableKeyBackup,
 | 
						|
    logIntoElement,
 | 
						|
    logOutOfElement,
 | 
						|
    sendMessageInCurrentRoom,
 | 
						|
    verifySession,
 | 
						|
} from "./utils";
 | 
						|
import { isDendrite } from "../../plugins/homeserver/dendrite";
 | 
						|
 | 
						|
test.describe("Cryptography", function () {
 | 
						|
    test.use({
 | 
						|
        displayName: "Alice",
 | 
						|
        botCreateOpts: {
 | 
						|
            displayName: "Bob",
 | 
						|
            autoAcceptInvites: false,
 | 
						|
        },
 | 
						|
    });
 | 
						|
 | 
						|
    test.describe("decryption failure messages", () => {
 | 
						|
        test("should handle device-relative historical messages", async ({
 | 
						|
            homeserver,
 | 
						|
            page,
 | 
						|
            app,
 | 
						|
            credentials,
 | 
						|
            user,
 | 
						|
        }) => {
 | 
						|
            test.setTimeout(60000);
 | 
						|
 | 
						|
            // Start with a logged-in session, without key backup, and send a message.
 | 
						|
            await createRoom(page, "Test room", true);
 | 
						|
            await sendMessageInCurrentRoom(page, "test test");
 | 
						|
 | 
						|
            // Log out, discarding the key for the sent message.
 | 
						|
            await logOutOfElement(page, true);
 | 
						|
 | 
						|
            // Log in again, and see how the message looks.
 | 
						|
            await logIntoElement(page, homeserver, credentials);
 | 
						|
            await app.viewRoomByName("Test room");
 | 
						|
            const lastTile = page.locator(".mx_EventTile").last();
 | 
						|
            await expect(lastTile).toContainText("Historical messages are not available on this device");
 | 
						|
            await expect(lastTile.locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
 | 
						|
 | 
						|
            // Now, we set up key backup, and then send another message.
 | 
						|
            const secretStorageKey = await enableKeyBackup(app);
 | 
						|
            await app.viewRoomByName("Test room");
 | 
						|
            await sendMessageInCurrentRoom(page, "test2 test2");
 | 
						|
 | 
						|
            // Workaround for https://github.com/element-hq/element-web/issues/27267. It can take up to 10 seconds for
 | 
						|
            // the key to be backed up.
 | 
						|
            await page.waitForTimeout(10000);
 | 
						|
 | 
						|
            // Finally, log out again, and back in, skipping verification for now, and see what we see.
 | 
						|
            await logOutOfElement(page);
 | 
						|
            await logIntoElement(page, homeserver, credentials);
 | 
						|
            await page.locator(".mx_AuthPage").getByRole("button", { name: "Skip verification for now" }).click();
 | 
						|
            await page.locator(".mx_AuthPage").getByRole("button", { name: "I'll verify later" }).click();
 | 
						|
            await app.viewRoomByName("Test room");
 | 
						|
 | 
						|
            // There should be two historical events in the timeline
 | 
						|
            const tiles = await page.locator(".mx_EventTile").all();
 | 
						|
            expect(tiles.length).toBeGreaterThanOrEqual(2);
 | 
						|
            // look at the last two tiles only
 | 
						|
            for (const tile of tiles.slice(-2)) {
 | 
						|
                await expect(tile).toContainText("You need to verify this device for access to historical messages");
 | 
						|
                await expect(tile.locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
 | 
						|
            }
 | 
						|
 | 
						|
            // Now verify our device (setting up key backup), and check what happens
 | 
						|
            await verifySession(app, secretStorageKey);
 | 
						|
            const tilesAfterVerify = (await page.locator(".mx_EventTile").all()).slice(-2);
 | 
						|
 | 
						|
            // The first message still cannot be decrypted, because it was never backed up. It's now a regular UTD though.
 | 
						|
            await expect(tilesAfterVerify[0]).toContainText("Unable to decrypt message");
 | 
						|
            await expect(tilesAfterVerify[0].locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
 | 
						|
 | 
						|
            // The second message should now be decrypted, with a grey shield
 | 
						|
            await expect(tilesAfterVerify[1]).toContainText("test2 test2");
 | 
						|
            await expect(tilesAfterVerify[1].locator(".mx_EventTile_e2eIcon_normal")).toBeVisible();
 | 
						|
        });
 | 
						|
 | 
						|
        test.describe("non-joined historical messages", () => {
 | 
						|
            test.skip(isDendrite, "does not yet support membership on events");
 | 
						|
 | 
						|
            test("should display undecryptable non-joined historical messages with a different message", async ({
 | 
						|
                homeserver,
 | 
						|
                page,
 | 
						|
                app,
 | 
						|
                credentials: aliceCredentials,
 | 
						|
                user: alice,
 | 
						|
                bot: bob,
 | 
						|
            }) => {
 | 
						|
                // Bob creates an encrypted room and sends a message to it. He then invites Alice
 | 
						|
                const roomId = await bob.evaluate(
 | 
						|
                    async (client, { alice }) => {
 | 
						|
                        const encryptionStatePromise = new Promise<void>((resolve) => {
 | 
						|
                            client.on("RoomState.events" as EmittedEvents, (event, _state, _lastStateEvent) => {
 | 
						|
                                if (event.getType() === "m.room.encryption") {
 | 
						|
                                    resolve();
 | 
						|
                                }
 | 
						|
                            });
 | 
						|
                        });
 | 
						|
 | 
						|
                        const { room_id: roomId } = await client.createRoom({
 | 
						|
                            initial_state: [
 | 
						|
                                {
 | 
						|
                                    type: "m.room.encryption",
 | 
						|
                                    content: {
 | 
						|
                                        algorithm: "m.megolm.v1.aes-sha2",
 | 
						|
                                    },
 | 
						|
                                },
 | 
						|
                            ],
 | 
						|
                            name: "Test room",
 | 
						|
                            preset: "private_chat" as Preset,
 | 
						|
                        });
 | 
						|
 | 
						|
                        // wait for m.room.encryption event, so that when we send a
 | 
						|
                        // message, it will be encrypted
 | 
						|
                        await encryptionStatePromise;
 | 
						|
 | 
						|
                        await client.sendTextMessage(roomId, "This should be undecryptable");
 | 
						|
 | 
						|
                        await client.invite(roomId, alice.userId);
 | 
						|
 | 
						|
                        return roomId;
 | 
						|
                    },
 | 
						|
                    { alice },
 | 
						|
                );
 | 
						|
 | 
						|
                // Alice accepts the invite
 | 
						|
                await expect(
 | 
						|
                    page.getByRole("group", { name: "Invites" }).locator(".mx_RoomSublist_tiles").getByRole("treeitem"),
 | 
						|
                ).toHaveCount(1);
 | 
						|
                await page.getByRole("treeitem", { name: "Test room" }).click();
 | 
						|
                await page.locator(".mx_RoomView").getByRole("button", { name: "Accept" }).click();
 | 
						|
 | 
						|
                // Bob sends an encrypted event and an undecryptable event
 | 
						|
                await bob.evaluate(
 | 
						|
                    async (client, { roomId }) => {
 | 
						|
                        await client.sendTextMessage(roomId, "This should be decryptable");
 | 
						|
                        await client.sendEvent(
 | 
						|
                            roomId,
 | 
						|
                            "m.room.encrypted" as any,
 | 
						|
                            {
 | 
						|
                                algorithm: "m.megolm.v1.aes-sha2",
 | 
						|
                                ciphertext: "this+message+will+be+undecryptable",
 | 
						|
                                device_id: client.getDeviceId()!,
 | 
						|
                                sender_key: (await client.getCrypto()!.getOwnDeviceKeys()).ed25519,
 | 
						|
                                session_id: "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
 | 
						|
                            } as any,
 | 
						|
                        );
 | 
						|
                    },
 | 
						|
                    { roomId },
 | 
						|
                );
 | 
						|
 | 
						|
                // We wait for the event tiles that we expect from the messages that
 | 
						|
                // Bob sent, in sequence.
 | 
						|
                await expect(
 | 
						|
                    page.locator(`.mx_EventTile`).getByText("You don't have access to this message"),
 | 
						|
                ).toBeVisible();
 | 
						|
                await expect(page.locator(`.mx_EventTile`).getByText("This should be decryptable")).toBeVisible();
 | 
						|
                await expect(page.locator(`.mx_EventTile`).getByText("Unable to decrypt message")).toBeVisible();
 | 
						|
 | 
						|
                // And then we ensure that they are where we expect them to be
 | 
						|
                // Alice should see these event tiles:
 | 
						|
                // - first message sent by Bob (undecryptable)
 | 
						|
                // - Bob invited Alice
 | 
						|
                // - Alice joined the room
 | 
						|
                // - second message sent by Bob (decryptable)
 | 
						|
                // - third message sent by Bob (undecryptable)
 | 
						|
                const tiles = await page.locator(".mx_EventTile").all();
 | 
						|
                expect(tiles.length).toBeGreaterThanOrEqual(5);
 | 
						|
 | 
						|
                // The first message from Bob was sent before Alice was in the room, so should
 | 
						|
                // be different from the standard UTD message
 | 
						|
                await expect(tiles[tiles.length - 5]).toContainText("You don't have access to this message");
 | 
						|
                await expect(tiles[tiles.length - 5].locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
 | 
						|
 | 
						|
                // The second message from Bob should be decryptable
 | 
						|
                await expect(tiles[tiles.length - 2]).toContainText("This should be decryptable");
 | 
						|
                // this tile won't have an e2e icon since we got the key from the sender
 | 
						|
 | 
						|
                // The third message from Bob is undecryptable, but was sent while Alice was
 | 
						|
                // in the room and is expected to be decryptable, so this should have the
 | 
						|
                // standard UTD message
 | 
						|
                await expect(tiles[tiles.length - 1]).toContainText("Unable to decrypt message");
 | 
						|
                await expect(tiles[tiles.length - 1].locator(".mx_EventTile_e2eIcon_decryption_failure")).toBeVisible();
 | 
						|
            });
 | 
						|
 | 
						|
            test("should be able to jump to a message sent before our last join event", async ({
 | 
						|
                homeserver,
 | 
						|
                page,
 | 
						|
                app,
 | 
						|
                credentials: aliceCredentials,
 | 
						|
                user: alice,
 | 
						|
                bot: bob,
 | 
						|
            }) => {
 | 
						|
                // Bob:
 | 
						|
                // - creates an encrypted room,
 | 
						|
                // - invites Alice,
 | 
						|
                // - sends a message to it,
 | 
						|
                // - kicks Alice,
 | 
						|
                // - sends a bunch more events
 | 
						|
                // - invites Alice again
 | 
						|
                // In this way, there will be an event that Alice can decrypt,
 | 
						|
                // followed by a bunch of undecryptable events which Alice shouldn't
 | 
						|
                // expect to be able to decrypt.  The old code would have hidden all
 | 
						|
                // the events, even the decryptable event (which it wouldn't have
 | 
						|
                // even tried to fetch, if it was far enough back).
 | 
						|
                const { roomId, eventId } = await bob.evaluate(
 | 
						|
                    async (client, { alice }) => {
 | 
						|
                        const { room_id: roomId } = await client.createRoom({
 | 
						|
                            initial_state: [
 | 
						|
                                {
 | 
						|
                                    type: "m.room.encryption",
 | 
						|
                                    content: {
 | 
						|
                                        algorithm: "m.megolm.v1.aes-sha2",
 | 
						|
                                    },
 | 
						|
                                },
 | 
						|
                            ],
 | 
						|
                            name: "Test room",
 | 
						|
                            preset: "private_chat" as Preset,
 | 
						|
                        });
 | 
						|
 | 
						|
                        // invite Alice
 | 
						|
                        const inviteAlicePromise = new Promise<void>((resolve) => {
 | 
						|
                            client.on("RoomMember.membership" as EmittedEvents, (_event, member, _oldMembership?) => {
 | 
						|
                                if (member.userId === alice.userId && member.membership === "invite") {
 | 
						|
                                    resolve();
 | 
						|
                                }
 | 
						|
                            });
 | 
						|
                        });
 | 
						|
                        await client.invite(roomId, alice.userId);
 | 
						|
                        // wait for the invite to come back so that we encrypt to Alice
 | 
						|
                        await inviteAlicePromise;
 | 
						|
 | 
						|
                        // send a message that Alice should be able to decrypt
 | 
						|
                        const { event_id: eventId } = await client.sendTextMessage(
 | 
						|
                            roomId,
 | 
						|
                            "This should be decryptable",
 | 
						|
                        );
 | 
						|
 | 
						|
                        // kick Alice
 | 
						|
                        const kickAlicePromise = new Promise<void>((resolve) => {
 | 
						|
                            client.on("RoomMember.membership" as EmittedEvents, (_event, member, _oldMembership?) => {
 | 
						|
                                if (member.userId === alice.userId && member.membership === "leave") {
 | 
						|
                                    resolve();
 | 
						|
                                }
 | 
						|
                            });
 | 
						|
                        });
 | 
						|
                        await client.kick(roomId, alice.userId);
 | 
						|
                        await kickAlicePromise;
 | 
						|
 | 
						|
                        // send a bunch of messages that Alice won't be able to decrypt
 | 
						|
                        for (let i = 0; i < 20; i++) {
 | 
						|
                            await client.sendTextMessage(roomId, `${i}`);
 | 
						|
                        }
 | 
						|
 | 
						|
                        // invite Alice again
 | 
						|
                        await client.invite(roomId, alice.userId);
 | 
						|
 | 
						|
                        return { roomId, eventId };
 | 
						|
                    },
 | 
						|
                    { alice },
 | 
						|
                );
 | 
						|
 | 
						|
                // Alice accepts the invite
 | 
						|
                await expect(
 | 
						|
                    page.getByRole("group", { name: "Invites" }).locator(".mx_RoomSublist_tiles").getByRole("treeitem"),
 | 
						|
                ).toHaveCount(1);
 | 
						|
                await page.getByRole("treeitem", { name: "Test room" }).click();
 | 
						|
                await page.locator(".mx_RoomView").getByRole("button", { name: "Accept" }).click();
 | 
						|
 | 
						|
                // wait until we're joined and see the timeline
 | 
						|
                await expect(page.locator(`.mx_EventTile`).getByText("Alice joined the room")).toBeVisible();
 | 
						|
 | 
						|
                // we should be able to jump to the decryptable message that Bob sent
 | 
						|
                await page.goto(`#/room/${roomId}/${eventId}`);
 | 
						|
 | 
						|
                await expect(page.locator(`.mx_EventTile`).getByText("This should be decryptable")).toBeVisible();
 | 
						|
            });
 | 
						|
        });
 | 
						|
    });
 | 
						|
});
 |