/* Copyright 2024 New Vector Ltd. Copyright 2022 The Matrix.org Foundation C.I.C. SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only Please see LICENSE files in the repository root for full details. */ import { Mocked, mocked } from "jest-mock"; import { MatrixEvent, Room, MatrixClient, Device, ClientStoppedError } from "matrix-js-sdk/src/matrix"; import { logger } from "matrix-js-sdk/src/logger"; import { CryptoEvent } from "matrix-js-sdk/src/crypto"; import { CryptoSessionStateChange } from "@matrix-org/analytics-events/types/typescript/CryptoSessionStateChange"; import { CrossSigningStatus, CryptoApi, DeviceVerificationStatus, KeyBackupInfo } from "matrix-js-sdk/src/crypto-api"; import DeviceListener from "../../src/DeviceListener"; import { MatrixClientPeg } from "../../src/MatrixClientPeg"; import * as SetupEncryptionToast from "../../src/toasts/SetupEncryptionToast"; import * as UnverifiedSessionToast from "../../src/toasts/UnverifiedSessionToast"; import * as BulkUnverifiedSessionsToast from "../../src/toasts/BulkUnverifiedSessionsToast"; import { isSecretStorageBeingAccessed } from "../../src/SecurityManager"; import dis from "../../src/dispatcher/dispatcher"; import { Action } from "../../src/dispatcher/actions"; import SettingsStore from "../../src/settings/SettingsStore"; import { SettingLevel } from "../../src/settings/SettingLevel"; import { getMockClientWithEventEmitter, mockPlatformPeg } from "../test-utils"; import { UIFeature } from "../../src/settings/UIFeature"; import { isBulkUnverifiedDeviceReminderSnoozed } from "../../src/utils/device/snoozeBulkUnverifiedDeviceReminder"; import { PosthogAnalytics } from "../../src/PosthogAnalytics"; // don't litter test console with logs jest.mock("matrix-js-sdk/src/logger"); jest.mock("../../src/dispatcher/dispatcher", () => ({ dispatch: jest.fn(), register: jest.fn(), })); jest.mock("../../src/SecurityManager", () => ({ isSecretStorageBeingAccessed: jest.fn(), accessSecretStorage: jest.fn(), })); jest.mock("../../src/utils/device/snoozeBulkUnverifiedDeviceReminder", () => ({ isBulkUnverifiedDeviceReminderSnoozed: jest.fn(), })); const userId = "@user:server"; const deviceId = "my-device-id"; const mockDispatcher = mocked(dis); const flushPromises = async () => await new Promise(process.nextTick); describe("DeviceListener", () => { let mockClient: Mocked; let mockCrypto: Mocked; beforeEach(() => { jest.resetAllMocks(); // spy on various toasts' hide and show functions // easier than mocking jest.spyOn(SetupEncryptionToast, "showToast").mockReturnValue(undefined); jest.spyOn(SetupEncryptionToast, "hideToast").mockReturnValue(undefined); jest.spyOn(BulkUnverifiedSessionsToast, "showToast").mockReturnValue(undefined); jest.spyOn(BulkUnverifiedSessionsToast, "hideToast").mockReturnValue(undefined); jest.spyOn(UnverifiedSessionToast, "showToast").mockResolvedValue(undefined); jest.spyOn(UnverifiedSessionToast, "hideToast").mockReturnValue(undefined); mockPlatformPeg({ getAppVersion: jest.fn().mockResolvedValue("1.2.3"), }); mockCrypto = { getDeviceVerificationStatus: jest.fn().mockResolvedValue({ crossSigningVerified: false, }), getCrossSigningKeyId: jest.fn(), getUserDeviceInfo: jest.fn().mockResolvedValue(new Map()), isCrossSigningReady: jest.fn().mockResolvedValue(true), isSecretStorageReady: jest.fn().mockResolvedValue(true), userHasCrossSigningKeys: jest.fn(), getActiveSessionBackupVersion: jest.fn(), getCrossSigningStatus: jest.fn().mockReturnValue({ publicKeysOnDevice: true, privateKeysInSecretStorage: true, privateKeysCachedLocally: { masterKey: true, selfSigningKey: true, userSigningKey: true, }, }), getSessionBackupPrivateKey: jest.fn(), } as unknown as Mocked; mockClient = getMockClientWithEventEmitter({ isGuest: jest.fn(), getUserId: jest.fn().mockReturnValue(userId), getSafeUserId: jest.fn().mockReturnValue(userId), getKeyBackupVersion: jest.fn().mockResolvedValue(undefined), getRooms: jest.fn().mockReturnValue([]), isVersionSupported: jest.fn().mockResolvedValue(true), isInitialSyncComplete: jest.fn().mockReturnValue(true), waitForClientWellKnown: jest.fn(), isRoomEncrypted: jest.fn(), getClientWellKnown: jest.fn(), getDeviceId: jest.fn().mockReturnValue(deviceId), setAccountData: jest.fn(), getAccountData: jest.fn(), deleteAccountData: jest.fn(), getCrypto: jest.fn().mockReturnValue(mockCrypto), secretStorage: { isStored: jest.fn().mockReturnValue(null), getDefaultKeyId: jest.fn().mockReturnValue("00"), }, }); jest.spyOn(MatrixClientPeg, "get").mockReturnValue(mockClient); jest.spyOn(SettingsStore, "getValue").mockReturnValue(false); mocked(isBulkUnverifiedDeviceReminderSnoozed).mockClear().mockReturnValue(false); }); const createAndStart = async (): Promise => { const instance = new DeviceListener(); instance.start(mockClient); await flushPromises(); return instance; }; describe("client information", () => { it("watches device client information setting", async () => { const watchSettingSpy = jest.spyOn(SettingsStore, "watchSetting"); const unwatchSettingSpy = jest.spyOn(SettingsStore, "unwatchSetting"); const deviceListener = await createAndStart(); expect(watchSettingSpy).toHaveBeenCalledWith("deviceClientInformationOptIn", null, expect.any(Function)); deviceListener.stop(); expect(unwatchSettingSpy).toHaveBeenCalled(); }); describe("when device client information feature is enabled", () => { beforeEach(() => { jest.spyOn(SettingsStore, "getValue").mockImplementation( (settingName) => settingName === "deviceClientInformationOptIn", ); }); it("saves client information on start", async () => { await createAndStart(); expect(mockClient!.setAccountData).toHaveBeenCalledWith( `io.element.matrix_client_information.${deviceId}`, { name: "Element", url: "localhost", version: "1.2.3" }, ); }); it("catches error and logs when saving client information fails", async () => { const errorLogSpy = jest.spyOn(logger, "error"); const error = new Error("oups"); mockClient!.setAccountData.mockRejectedValue(error); // doesn't throw await createAndStart(); expect(errorLogSpy).toHaveBeenCalledWith("Failed to update client information", error); }); it("saves client information on logged in action", async () => { const instance = await createAndStart(); mockClient!.setAccountData.mockClear(); // @ts-ignore calling private function instance.onAction({ action: Action.OnLoggedIn }); await flushPromises(); expect(mockClient!.setAccountData).toHaveBeenCalledWith( `io.element.matrix_client_information.${deviceId}`, { name: "Element", url: "localhost", version: "1.2.3" }, ); }); }); describe("when device client information feature is disabled", () => { const clientInfoEvent = new MatrixEvent({ type: `io.element.matrix_client_information.${deviceId}`, content: { name: "hello" }, }); const emptyClientInfoEvent = new MatrixEvent({ type: `io.element.matrix_client_information.${deviceId}` }); beforeEach(() => { jest.spyOn(SettingsStore, "getValue").mockReturnValue(false); mockClient!.getAccountData.mockReturnValue(undefined); }); it("does not save client information on start", async () => { await createAndStart(); expect(mockClient!.setAccountData).not.toHaveBeenCalled(); }); it("removes client information on start if it exists", async () => { mockClient!.getAccountData.mockReturnValue(clientInfoEvent); await createAndStart(); expect(mockClient!.deleteAccountData).toHaveBeenCalledWith( `io.element.matrix_client_information.${deviceId}`, ); }); it("does not try to remove client info event that are already empty", async () => { mockClient!.getAccountData.mockReturnValue(emptyClientInfoEvent); await createAndStart(); expect(mockClient!.deleteAccountData).not.toHaveBeenCalled(); }); it("does not save client information on logged in action", async () => { const instance = await createAndStart(); // @ts-ignore calling private function instance.onAction({ action: Action.OnLoggedIn }); await flushPromises(); expect(mockClient!.setAccountData).not.toHaveBeenCalled(); }); it("saves client information after setting is enabled", async () => { const watchSettingSpy = jest.spyOn(SettingsStore, "watchSetting"); await createAndStart(); const [settingName, roomId, callback] = watchSettingSpy.mock.calls[0]; expect(settingName).toEqual("deviceClientInformationOptIn"); expect(roomId).toBeNull(); callback("deviceClientInformationOptIn", null, SettingLevel.DEVICE, SettingLevel.DEVICE, true); await flushPromises(); expect(mockClient!.setAccountData).toHaveBeenCalledWith( `io.element.matrix_client_information.${deviceId}`, { name: "Element", url: "localhost", version: "1.2.3" }, ); }); }); }); describe("recheck", () => { it("does nothing when cross signing feature is not supported", async () => { mockClient!.isVersionSupported.mockResolvedValue(false); await createAndStart(); expect(mockClient!.isVersionSupported).toHaveBeenCalledWith("v1.1"); expect(mockCrypto!.isCrossSigningReady).not.toHaveBeenCalled(); }); it("does nothing when crypto is not enabled", async () => { mockClient!.getCrypto.mockReturnValue(undefined); await createAndStart(); expect(mockCrypto!.isCrossSigningReady).not.toHaveBeenCalled(); }); it("does nothing when initial sync is not complete", async () => { mockClient!.isInitialSyncComplete.mockReturnValue(false); await createAndStart(); expect(mockCrypto!.isCrossSigningReady).not.toHaveBeenCalled(); }); it("correctly handles the client being stopped", async () => { mockCrypto!.isCrossSigningReady.mockImplementation(() => { throw new ClientStoppedError(); }); await createAndStart(); expect(logger.error).not.toHaveBeenCalled(); }); it("correctly handles other errors", async () => { mockCrypto!.isCrossSigningReady.mockImplementation(() => { throw new Error("blah"); }); await createAndStart(); expect(logger.error).toHaveBeenCalledTimes(1); }); describe("set up encryption", () => { const rooms = [{ roomId: "!room1" }, { roomId: "!room2" }] as unknown as Room[]; beforeEach(() => { mockCrypto!.isCrossSigningReady.mockResolvedValue(false); mockCrypto!.isSecretStorageReady.mockResolvedValue(false); mockClient!.getRooms.mockReturnValue(rooms); mockClient!.isRoomEncrypted.mockReturnValue(true); }); it("hides setup encryption toast when cross signing and secret storage are ready", async () => { mockCrypto!.isCrossSigningReady.mockResolvedValue(true); mockCrypto!.isSecretStorageReady.mockResolvedValue(true); await createAndStart(); expect(SetupEncryptionToast.hideToast).toHaveBeenCalled(); }); it("hides setup encryption toast when it is dismissed", async () => { const instance = await createAndStart(); instance.dismissEncryptionSetup(); await flushPromises(); expect(SetupEncryptionToast.hideToast).toHaveBeenCalled(); }); it("does not show any toasts when secret storage is being accessed", async () => { mocked(isSecretStorageBeingAccessed).mockReturnValue(true); await createAndStart(); expect(SetupEncryptionToast.showToast).not.toHaveBeenCalled(); }); it("does not show any toasts when no rooms are encrypted", async () => { mockClient!.isRoomEncrypted.mockReturnValue(false); await createAndStart(); expect(SetupEncryptionToast.showToast).not.toHaveBeenCalled(); }); describe("when user does not have a cross signing id on this device", () => { beforeEach(() => { mockCrypto!.getCrossSigningKeyId.mockResolvedValue(null); }); it("shows verify session toast when account has cross signing", async () => { mockCrypto!.userHasCrossSigningKeys.mockResolvedValue(true); await createAndStart(); expect(mockCrypto!.getUserDeviceInfo).toHaveBeenCalled(); expect(SetupEncryptionToast.showToast).toHaveBeenCalledWith( SetupEncryptionToast.Kind.VERIFY_THIS_SESSION, ); }); it("checks key backup status when when account has cross signing", async () => { mockCrypto!.getCrossSigningKeyId.mockResolvedValue(null); mockCrypto!.userHasCrossSigningKeys.mockResolvedValue(true); await createAndStart(); expect(mockCrypto!.getActiveSessionBackupVersion).toHaveBeenCalled(); }); }); describe("when user does have a cross signing id on this device", () => { beforeEach(() => { mockCrypto!.getCrossSigningKeyId.mockResolvedValue("abc"); }); it("shows upgrade encryption toast when user has a key backup available", async () => { // non falsy response mockClient!.getKeyBackupVersion.mockResolvedValue({} as unknown as KeyBackupInfo); await createAndStart(); expect(SetupEncryptionToast.showToast).toHaveBeenCalledWith( SetupEncryptionToast.Kind.UPGRADE_ENCRYPTION, ); }); }); }); describe("key backup status", () => { it("checks keybackup status when cross signing and secret storage are ready", async () => { // default mocks set cross signing and secret storage to ready await createAndStart(); expect(mockCrypto.getActiveSessionBackupVersion).toHaveBeenCalled(); }); it("checks keybackup status when setup encryption toast has been dismissed", async () => { mockCrypto!.isCrossSigningReady.mockResolvedValue(false); const instance = await createAndStart(); instance.dismissEncryptionSetup(); await flushPromises(); expect(mockCrypto.getActiveSessionBackupVersion).toHaveBeenCalled(); }); it("dispatches keybackup event when key backup is not enabled", async () => { mockCrypto.getActiveSessionBackupVersion.mockResolvedValue(null); await createAndStart(); expect(mockDispatcher.dispatch).toHaveBeenCalledWith({ action: Action.ReportKeyBackupNotEnabled }); }); it("does not check key backup status again after check is complete", async () => { mockCrypto.getActiveSessionBackupVersion.mockResolvedValue("1"); const instance = await createAndStart(); expect(mockCrypto.getActiveSessionBackupVersion).toHaveBeenCalled(); // trigger a recheck instance.dismissEncryptionSetup(); await flushPromises(); // not called again, check was complete last time expect(mockCrypto.getActiveSessionBackupVersion).toHaveBeenCalledTimes(1); }); }); describe("unverified sessions toasts", () => { const currentDevice = new Device({ deviceId, userId: userId, algorithms: [], keys: new Map() }); const device2 = new Device({ deviceId: "d2", userId: userId, algorithms: [], keys: new Map() }); const device3 = new Device({ deviceId: "d3", userId: userId, algorithms: [], keys: new Map() }); const deviceTrustVerified = new DeviceVerificationStatus({ crossSigningVerified: true }); const deviceTrustUnverified = new DeviceVerificationStatus({}); beforeEach(() => { mockCrypto!.isCrossSigningReady.mockResolvedValue(true); mockCrypto!.getUserDeviceInfo.mockResolvedValue( new Map([[userId, new Map([currentDevice, device2, device3].map((d) => [d.deviceId, d]))]]), ); // all devices verified by default mockCrypto!.getDeviceVerificationStatus.mockResolvedValue(deviceTrustVerified); mockClient!.deviceId = currentDevice.deviceId; jest.spyOn(SettingsStore, "getValue").mockImplementation( (settingName) => settingName === UIFeature.BulkUnverifiedSessionsReminder, ); }); describe("bulk unverified sessions toasts", () => { it("hides toast when cross signing is not ready", async () => { mockCrypto!.isCrossSigningReady.mockResolvedValue(false); await createAndStart(); expect(BulkUnverifiedSessionsToast.hideToast).toHaveBeenCalled(); expect(BulkUnverifiedSessionsToast.showToast).not.toHaveBeenCalled(); }); it("hides toast when all devices at app start are verified", async () => { await createAndStart(); expect(BulkUnverifiedSessionsToast.hideToast).toHaveBeenCalled(); expect(BulkUnverifiedSessionsToast.showToast).not.toHaveBeenCalled(); }); it("hides toast when feature is disabled", async () => { // BulkUnverifiedSessionsReminder set to false jest.spyOn(SettingsStore, "getValue").mockReturnValue(false); // currentDevice, device2 are verified, device3 is unverified // ie if reminder was enabled it should be shown mockCrypto!.getDeviceVerificationStatus.mockImplementation(async (_userId, deviceId) => { switch (deviceId) { case currentDevice.deviceId: case device2.deviceId: return deviceTrustVerified; default: return deviceTrustUnverified; } }); await createAndStart(); expect(BulkUnverifiedSessionsToast.hideToast).toHaveBeenCalled(); }); it("hides toast when current device is unverified", async () => { // device2 verified, current and device3 unverified mockCrypto!.getDeviceVerificationStatus.mockImplementation(async (_userId, deviceId) => { switch (deviceId) { case device2.deviceId: return deviceTrustVerified; default: return deviceTrustUnverified; } }); await createAndStart(); expect(BulkUnverifiedSessionsToast.hideToast).toHaveBeenCalled(); expect(BulkUnverifiedSessionsToast.showToast).not.toHaveBeenCalled(); }); it("hides toast when reminder is snoozed", async () => { mocked(isBulkUnverifiedDeviceReminderSnoozed).mockReturnValue(true); // currentDevice, device2 are verified, device3 is unverified mockCrypto!.getDeviceVerificationStatus.mockImplementation(async (_userId, deviceId) => { switch (deviceId) { case currentDevice.deviceId: case device2.deviceId: return deviceTrustVerified; default: return deviceTrustUnverified; } }); await createAndStart(); expect(BulkUnverifiedSessionsToast.showToast).not.toHaveBeenCalled(); expect(BulkUnverifiedSessionsToast.hideToast).toHaveBeenCalled(); }); it("shows toast with unverified devices at app start", async () => { // currentDevice, device2 are verified, device3 is unverified mockCrypto!.getDeviceVerificationStatus.mockImplementation(async (_userId, deviceId) => { switch (deviceId) { case currentDevice.deviceId: case device2.deviceId: return deviceTrustVerified; default: return deviceTrustUnverified; } }); await createAndStart(); expect(BulkUnverifiedSessionsToast.showToast).toHaveBeenCalledWith( new Set([device3.deviceId]), ); expect(BulkUnverifiedSessionsToast.hideToast).not.toHaveBeenCalled(); }); it("hides toast when unverified sessions at app start have been dismissed", async () => { // currentDevice, device2 are verified, device3 is unverified mockCrypto!.getDeviceVerificationStatus.mockImplementation(async (_userId, deviceId) => { switch (deviceId) { case currentDevice.deviceId: case device2.deviceId: return deviceTrustVerified; default: return deviceTrustUnverified; } }); const instance = await createAndStart(); expect(BulkUnverifiedSessionsToast.showToast).toHaveBeenCalledWith( new Set([device3.deviceId]), ); await instance.dismissUnverifiedSessions([device3.deviceId]); await flushPromises(); expect(BulkUnverifiedSessionsToast.hideToast).toHaveBeenCalled(); }); it("hides toast when unverified sessions are added after app start", async () => { // currentDevice, device2 are verified, device3 is unverified mockCrypto!.getDeviceVerificationStatus.mockImplementation(async (_userId, deviceId) => { switch (deviceId) { case currentDevice.deviceId: case device2.deviceId: return deviceTrustVerified; default: return deviceTrustUnverified; } }); mockCrypto!.getUserDeviceInfo.mockResolvedValue( new Map([[userId, new Map([currentDevice, device2].map((d) => [d.deviceId, d]))]]), ); await createAndStart(); expect(BulkUnverifiedSessionsToast.hideToast).toHaveBeenCalled(); // add an unverified device mockCrypto!.getUserDeviceInfo.mockResolvedValue( new Map([[userId, new Map([currentDevice, device2, device3].map((d) => [d.deviceId, d]))]]), ); // trigger a recheck mockClient!.emit(CryptoEvent.DevicesUpdated, [userId], false); await flushPromises(); // bulk unverified sessions toast only shown for devices that were // there at app start // individual nags are shown for new unverified devices expect(BulkUnverifiedSessionsToast.hideToast).toHaveBeenCalledTimes(2); expect(BulkUnverifiedSessionsToast.showToast).not.toHaveBeenCalled(); }); }); }); describe("Report verification and recovery state to Analytics", () => { let setPropertySpy: jest.SpyInstance; let trackEventSpy: jest.SpyInstance; beforeEach(() => { setPropertySpy = jest.spyOn(PosthogAnalytics.instance, "setProperty"); trackEventSpy = jest.spyOn(PosthogAnalytics.instance, "trackEvent"); }); describe("Report crypto verification state to analytics", () => { type VerificationTestCases = [string, Partial, "Verified" | "NotVerified"]; const testCases: VerificationTestCases[] = [ [ "Identity trusted and device is signed by owner", { signedByOwner: true, crossSigningVerified: true, }, "Verified", ], [ "Identity is trusted, but device is not signed", { signedByOwner: false, crossSigningVerified: true, }, "NotVerified", ], [ "Identity is not trusted, device not signed", { signedByOwner: false, crossSigningVerified: false, }, "NotVerified", ], [ "Identity is not trusted, and device signed", { signedByOwner: true, crossSigningVerified: false, }, "NotVerified", ], ]; beforeEach(() => { mockClient.secretStorage.getDefaultKeyId.mockResolvedValue(null); mockCrypto.isSecretStorageReady.mockResolvedValue(false); }); it.each(testCases)("Does report session verification state when %s", async (_, status, expected) => { mockCrypto!.getDeviceVerificationStatus.mockResolvedValue(status as DeviceVerificationStatus); await createAndStart(); // Should have updated user properties expect(setPropertySpy).toHaveBeenCalledWith("verificationState", expected); // Should have reported a status change event const expectedTrackedEvent: CryptoSessionStateChange = { eventName: "CryptoSessionState", verificationState: expected, recoveryState: "Disabled", }; expect(trackEventSpy).toHaveBeenCalledWith(expectedTrackedEvent); }); it("should not report a status event if no changes", async () => { mockCrypto!.getDeviceVerificationStatus.mockResolvedValue({ signedByOwner: true, crossSigningVerified: true, } as unknown as DeviceVerificationStatus); await createAndStart(); const expectedTrackedEvent: CryptoSessionStateChange = { eventName: "CryptoSessionState", verificationState: "Verified", recoveryState: "Disabled", }; expect(trackEventSpy).toHaveBeenCalledTimes(1); expect(trackEventSpy).toHaveBeenCalledWith(expectedTrackedEvent); // simulate a recheck mockClient.emit(CryptoEvent.DevicesUpdated, [userId], false); await flushPromises(); expect(trackEventSpy).toHaveBeenCalledTimes(1); // Now simulate a change mockCrypto!.getDeviceVerificationStatus.mockResolvedValue({ signedByOwner: false, crossSigningVerified: true, } as unknown as DeviceVerificationStatus); // simulate a recheck mockClient.emit(CryptoEvent.DevicesUpdated, [userId], false); await flushPromises(); expect(trackEventSpy).toHaveBeenCalledTimes(2); }); }); describe("Report crypto recovery state to analytics", () => { beforeEach(() => { // During all these tests we want verification state to be verified. mockCrypto!.getDeviceVerificationStatus.mockResolvedValue({ signedByOwner: true, crossSigningVerified: true, } as unknown as DeviceVerificationStatus); }); describe("When Room Key Backup is not enabled", () => { beforeEach(() => { // no backup mockClient.getKeyBackupVersion.mockResolvedValue(null); }); it("Should report recovery state as Enabled", async () => { // 4S is enabled mockClient.secretStorage.getDefaultKeyId.mockResolvedValue("00"); // Session trusted and cross signing secrets in 4S and stored locally mockCrypto!.getCrossSigningStatus.mockResolvedValue({ publicKeysOnDevice: true, privateKeysInSecretStorage: true, privateKeysCachedLocally: { masterKey: true, selfSigningKey: true, userSigningKey: true, }, }); await createAndStart(); // Should have updated user properties expect(setPropertySpy).toHaveBeenCalledWith("verificationState", "Verified"); expect(setPropertySpy).toHaveBeenCalledWith("recoveryState", "Enabled"); // Should have reported a status change event const expectedTrackedEvent: CryptoSessionStateChange = { eventName: "CryptoSessionState", verificationState: "Verified", recoveryState: "Enabled", }; expect(trackEventSpy).toHaveBeenCalledWith(expectedTrackedEvent); }); it("Should report recovery state as Incomplete if secrets not cached locally", async () => { // 4S is enabled mockClient.secretStorage.getDefaultKeyId.mockResolvedValue("00"); // Session trusted and cross signing secrets in 4S and stored locally mockCrypto!.getCrossSigningStatus.mockResolvedValue({ publicKeysOnDevice: true, privateKeysInSecretStorage: true, privateKeysCachedLocally: { masterKey: false, selfSigningKey: true, userSigningKey: true, }, }); // no backup mockClient.getKeyBackupVersion.mockResolvedValue(null); await createAndStart(); // Should have updated user properties expect(setPropertySpy).toHaveBeenCalledWith("verificationState", "Verified"); expect(setPropertySpy).toHaveBeenCalledWith("recoveryState", "Incomplete"); // Should have reported a status change event const expectedTrackedEvent: CryptoSessionStateChange = { eventName: "CryptoSessionState", verificationState: "Verified", recoveryState: "Incomplete", }; expect(trackEventSpy).toHaveBeenCalledWith(expectedTrackedEvent); }); const baseState: CrossSigningStatus = { publicKeysOnDevice: true, privateKeysInSecretStorage: true, privateKeysCachedLocally: { masterKey: true, selfSigningKey: true, userSigningKey: true, }, }; type MissingSecretsInCacheTestCases = [string, CrossSigningStatus]; const partialTestCases: MissingSecretsInCacheTestCases[] = [ [ "MSK not cached", { ...baseState, privateKeysCachedLocally: { ...baseState.privateKeysCachedLocally, masterKey: false }, }, ], [ "SSK not cached", { ...baseState, privateKeysCachedLocally: { ...baseState.privateKeysCachedLocally, selfSigningKey: false, }, }, ], [ "USK not cached", { ...baseState, privateKeysCachedLocally: { ...baseState.privateKeysCachedLocally, userSigningKey: false, }, }, ], [ "MSK/USK not cached", { ...baseState, privateKeysCachedLocally: { ...baseState.privateKeysCachedLocally, masterKey: false, userSigningKey: false, }, }, ], [ "MSK/SSK not cached", { ...baseState, privateKeysCachedLocally: { ...baseState.privateKeysCachedLocally, masterKey: false, selfSigningKey: false, }, }, ], [ "USK/SSK not cached", { ...baseState, privateKeysCachedLocally: { ...baseState.privateKeysCachedLocally, userSigningKey: false, selfSigningKey: false, }, }, ], ]; it.each(partialTestCases)( "Should report recovery state as Incomplete when %s", async (_, status) => { mockClient.secretStorage.getDefaultKeyId.mockResolvedValue("00"); // Session trusted and cross signing secrets in 4S and stored locally mockCrypto!.getCrossSigningStatus.mockResolvedValue(status); await createAndStart(); // Should have updated user properties expect(setPropertySpy).toHaveBeenCalledWith("verificationState", "Verified"); expect(setPropertySpy).toHaveBeenCalledWith("recoveryState", "Incomplete"); // Should have reported a status change event const expectedTrackedEvent: CryptoSessionStateChange = { eventName: "CryptoSessionState", verificationState: "Verified", recoveryState: "Incomplete", }; expect(trackEventSpy).toHaveBeenCalledWith(expectedTrackedEvent); }, ); it("Should report recovery state as Incomplete when some secrets are not in 4S", async () => { mockClient.secretStorage.getDefaultKeyId.mockResolvedValue("00"); // Some missing secret in 4S mockCrypto.isSecretStorageReady.mockResolvedValue(false); // Session trusted and secrets known locally. mockCrypto!.getCrossSigningStatus.mockResolvedValue({ publicKeysOnDevice: true, privateKeysCachedLocally: { masterKey: true, selfSigningKey: true, userSigningKey: true, }, } as unknown as CrossSigningStatus); await createAndStart(); // Should have updated user properties expect(setPropertySpy).toHaveBeenCalledWith("verificationState", "Verified"); expect(setPropertySpy).toHaveBeenCalledWith("recoveryState", "Incomplete"); // Should have reported a status change event const expectedTrackedEvent: CryptoSessionStateChange = { eventName: "CryptoSessionState", verificationState: "Verified", recoveryState: "Incomplete", }; expect(trackEventSpy).toHaveBeenCalledWith(expectedTrackedEvent); }); }); describe("When Room Key Backup is enabled", () => { beforeEach(() => { // backup enabled - just need a mock object mockClient.getKeyBackupVersion.mockResolvedValue({} as KeyBackupInfo); }); const testCases = [ ["as Incomplete if backup key not cached locally", false], ["as Enabled if backup key is cached locally", true], ]; it.each(testCases)("Should report recovery state as %s", async (_, isCached) => { // 4S is enabled mockClient.secretStorage.getDefaultKeyId.mockResolvedValue("00"); // Session trusted and cross signing secrets in 4S and stored locally mockCrypto!.getCrossSigningStatus.mockResolvedValue({ publicKeysOnDevice: true, privateKeysInSecretStorage: true, privateKeysCachedLocally: { masterKey: true, selfSigningKey: true, userSigningKey: true, }, }); mockCrypto.getSessionBackupPrivateKey.mockResolvedValue(isCached ? new Uint8Array() : null); await createAndStart(); expect(setPropertySpy).toHaveBeenCalledWith("verificationState", "Verified"); expect(setPropertySpy).toHaveBeenCalledWith( "recoveryState", isCached ? "Enabled" : "Incomplete", ); // Should have reported a status change event const expectedTrackedEvent: CryptoSessionStateChange = { eventName: "CryptoSessionState", verificationState: "Verified", recoveryState: isCached ? "Enabled" : "Incomplete", }; expect(trackEventSpy).toHaveBeenCalledWith(expectedTrackedEvent); }); }); }); }); }); });