2022-02-11 13:00:37 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
Copyright 2022 The Matrix.org Foundation C.I.C.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
import { EventEmitter } from "events";
|
|
|
|
import { mocked } from "jest-mock";
|
2022-03-01 20:42:05 +00:00
|
|
|
import { Room } from "matrix-js-sdk/src/matrix";
|
2022-10-04 07:53:23 +00:00
|
|
|
import { logger } from "matrix-js-sdk/src/logger";
|
2022-02-11 13:00:37 +00:00
|
|
|
|
|
|
|
import DeviceListener from "../src/DeviceListener";
|
|
|
|
import { MatrixClientPeg } from "../src/MatrixClientPeg";
|
|
|
|
import * as SetupEncryptionToast from "../src/toasts/SetupEncryptionToast";
|
|
|
|
import * as UnverifiedSessionToast from "../src/toasts/UnverifiedSessionToast";
|
|
|
|
import * as BulkUnverifiedSessionsToast from "../src/toasts/BulkUnverifiedSessionsToast";
|
|
|
|
import { isSecretStorageBeingAccessed } from "../src/SecurityManager";
|
|
|
|
import dis from "../src/dispatcher/dispatcher";
|
|
|
|
import { Action } from "../src/dispatcher/actions";
|
2022-10-04 07:53:23 +00:00
|
|
|
import SettingsStore from "../src/settings/SettingsStore";
|
|
|
|
import { SettingLevel } from "../src/settings/SettingLevel";
|
2022-10-04 13:12:23 +00:00
|
|
|
import { mockPlatformPeg } from "./test-utils";
|
2022-02-11 13:00:37 +00:00
|
|
|
|
|
|
|
// don't litter test console with logs
|
|
|
|
jest.mock("matrix-js-sdk/src/logger");
|
|
|
|
|
|
|
|
jest.mock("../src/dispatcher/dispatcher", () => ({
|
|
|
|
dispatch: jest.fn(),
|
|
|
|
register: jest.fn(),
|
|
|
|
}));
|
|
|
|
|
|
|
|
jest.mock("../src/SecurityManager", () => ({
|
|
|
|
isSecretStorageBeingAccessed: jest.fn(), accessSecretStorage: jest.fn(),
|
|
|
|
}));
|
|
|
|
|
2022-10-04 07:53:23 +00:00
|
|
|
const deviceId = 'my-device-id';
|
|
|
|
|
2022-02-11 13:00:37 +00:00
|
|
|
class MockClient extends EventEmitter {
|
2022-10-04 07:53:23 +00:00
|
|
|
isGuest = jest.fn();
|
2022-02-11 13:00:37 +00:00
|
|
|
getUserId = jest.fn();
|
|
|
|
getKeyBackupVersion = jest.fn().mockResolvedValue(undefined);
|
|
|
|
getRooms = jest.fn().mockReturnValue([]);
|
|
|
|
doesServerSupportUnstableFeature = jest.fn().mockResolvedValue(true);
|
|
|
|
isCrossSigningReady = jest.fn().mockResolvedValue(true);
|
|
|
|
isSecretStorageReady = jest.fn().mockResolvedValue(true);
|
|
|
|
isCryptoEnabled = jest.fn().mockReturnValue(true);
|
|
|
|
isInitialSyncComplete = jest.fn().mockReturnValue(true);
|
|
|
|
getKeyBackupEnabled = jest.fn();
|
|
|
|
getStoredDevicesForUser = jest.fn().mockReturnValue([]);
|
|
|
|
getCrossSigningId = jest.fn();
|
|
|
|
getStoredCrossSigningForUser = jest.fn();
|
|
|
|
waitForClientWellKnown = jest.fn();
|
|
|
|
downloadKeys = jest.fn();
|
|
|
|
isRoomEncrypted = jest.fn();
|
|
|
|
getClientWellKnown = jest.fn();
|
2022-10-04 07:53:23 +00:00
|
|
|
getDeviceId = jest.fn().mockReturnValue(deviceId);
|
|
|
|
setAccountData = jest.fn();
|
2022-02-11 13:00:37 +00:00
|
|
|
}
|
|
|
|
const mockDispatcher = mocked(dis);
|
|
|
|
const flushPromises = async () => await new Promise(process.nextTick);
|
|
|
|
|
|
|
|
describe('DeviceListener', () => {
|
|
|
|
let mockClient;
|
|
|
|
|
|
|
|
// spy on various toasts' hide and show functions
|
|
|
|
// easier than mocking
|
|
|
|
jest.spyOn(SetupEncryptionToast, 'showToast');
|
|
|
|
jest.spyOn(SetupEncryptionToast, 'hideToast');
|
|
|
|
jest.spyOn(BulkUnverifiedSessionsToast, 'showToast');
|
|
|
|
jest.spyOn(BulkUnverifiedSessionsToast, 'hideToast');
|
|
|
|
jest.spyOn(UnverifiedSessionToast, 'showToast');
|
|
|
|
jest.spyOn(UnverifiedSessionToast, 'hideToast');
|
|
|
|
|
|
|
|
beforeEach(() => {
|
|
|
|
jest.resetAllMocks();
|
2022-10-04 07:53:23 +00:00
|
|
|
mockPlatformPeg({
|
|
|
|
getAppVersion: jest.fn().mockResolvedValue('1.2.3'),
|
|
|
|
});
|
2022-02-11 13:00:37 +00:00
|
|
|
mockClient = new MockClient();
|
|
|
|
jest.spyOn(MatrixClientPeg, 'get').mockReturnValue(mockClient);
|
2022-10-04 07:53:23 +00:00
|
|
|
jest.spyOn(SettingsStore, 'getValue').mockReturnValue(false);
|
2022-02-11 13:00:37 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
const createAndStart = async (): Promise<DeviceListener> => {
|
|
|
|
const instance = new DeviceListener();
|
|
|
|
instance.start();
|
|
|
|
await flushPromises();
|
|
|
|
return instance;
|
|
|
|
};
|
|
|
|
|
2022-10-04 07:53:23 +00:00
|
|
|
describe('client information', () => {
|
|
|
|
it('watches device client information setting', async () => {
|
|
|
|
const watchSettingSpy = jest.spyOn(SettingsStore, 'watchSetting');
|
|
|
|
const unwatchSettingSpy = jest.spyOn(SettingsStore, 'unwatchSetting');
|
|
|
|
const deviceListener = await createAndStart();
|
|
|
|
|
|
|
|
expect(watchSettingSpy).toHaveBeenCalledWith(
|
|
|
|
'deviceClientInformationOptIn', null, expect.any(Function),
|
|
|
|
);
|
|
|
|
|
|
|
|
deviceListener.stop();
|
|
|
|
|
|
|
|
expect(unwatchSettingSpy).toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('when device client information feature is enabled', () => {
|
|
|
|
beforeEach(() => {
|
|
|
|
jest.spyOn(SettingsStore, 'getValue').mockImplementation(
|
|
|
|
settingName => settingName === 'deviceClientInformationOptIn',
|
|
|
|
);
|
|
|
|
});
|
|
|
|
it('saves client information on start', async () => {
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.setAccountData).toHaveBeenCalledWith(
|
|
|
|
`io.element.matrix_client_information.${deviceId}`,
|
|
|
|
{ name: 'Element', url: 'localhost', version: '1.2.3' },
|
|
|
|
);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('catches error and logs when saving client information fails', async () => {
|
|
|
|
const errorLogSpy = jest.spyOn(logger, 'error');
|
|
|
|
const error = new Error('oups');
|
|
|
|
mockClient.setAccountData.mockRejectedValue(error);
|
|
|
|
|
|
|
|
// doesn't throw
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(errorLogSpy).toHaveBeenCalledWith(
|
|
|
|
'Failed to record client information',
|
|
|
|
error,
|
|
|
|
);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('saves client information on logged in action', async () => {
|
|
|
|
const instance = await createAndStart();
|
|
|
|
|
|
|
|
mockClient.setAccountData.mockClear();
|
|
|
|
|
|
|
|
// @ts-ignore calling private function
|
|
|
|
instance.onAction({ action: Action.OnLoggedIn });
|
|
|
|
|
|
|
|
await flushPromises();
|
|
|
|
|
|
|
|
expect(mockClient.setAccountData).toHaveBeenCalledWith(
|
|
|
|
`io.element.matrix_client_information.${deviceId}`,
|
|
|
|
{ name: 'Element', url: 'localhost', version: '1.2.3' },
|
|
|
|
);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('when device client information feature is disabled', () => {
|
|
|
|
beforeEach(() => {
|
|
|
|
jest.spyOn(SettingsStore, 'getValue').mockReturnValue(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('does not save client information on start', async () => {
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.setAccountData).not.toHaveBeenCalledWith(
|
|
|
|
`io.element.matrix_client_information.${deviceId}`,
|
|
|
|
{ name: 'Element', url: 'localhost', version: '1.2.3' },
|
|
|
|
);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('does not save client information on logged in action', async () => {
|
|
|
|
const instance = await createAndStart();
|
|
|
|
|
|
|
|
// @ts-ignore calling private function
|
|
|
|
instance.onAction({ action: Action.OnLoggedIn });
|
|
|
|
|
|
|
|
await flushPromises();
|
|
|
|
|
|
|
|
expect(mockClient.setAccountData).not.toHaveBeenCalledWith(
|
|
|
|
`io.element.matrix_client_information.${deviceId}`,
|
|
|
|
{ name: 'Element', url: 'localhost', version: '1.2.3' },
|
|
|
|
);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('saves client information after setting is enabled', async () => {
|
|
|
|
const watchSettingSpy = jest.spyOn(SettingsStore, 'watchSetting');
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
const [settingName, roomId, callback] = watchSettingSpy.mock.calls[0];
|
|
|
|
expect(settingName).toEqual('deviceClientInformationOptIn');
|
|
|
|
expect(roomId).toBeNull();
|
|
|
|
|
|
|
|
callback('deviceClientInformationOptIn', null, SettingLevel.DEVICE, SettingLevel.DEVICE, true);
|
|
|
|
|
|
|
|
await flushPromises();
|
|
|
|
|
|
|
|
expect(mockClient.setAccountData).toHaveBeenCalledWith(
|
|
|
|
`io.element.matrix_client_information.${deviceId}`,
|
|
|
|
{ name: 'Element', url: 'localhost', version: '1.2.3' },
|
|
|
|
);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2022-02-11 13:00:37 +00:00
|
|
|
describe('recheck', () => {
|
|
|
|
it('does nothing when cross signing feature is not supported', async () => {
|
|
|
|
mockClient.doesServerSupportUnstableFeature.mockResolvedValue(false);
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.isCrossSigningReady).not.toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
it('does nothing when crypto is not enabled', async () => {
|
|
|
|
mockClient.isCryptoEnabled.mockReturnValue(false);
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.isCrossSigningReady).not.toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
it('does nothing when initial sync is not complete', async () => {
|
|
|
|
mockClient.isInitialSyncComplete.mockReturnValue(false);
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.isCrossSigningReady).not.toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('set up encryption', () => {
|
|
|
|
const rooms = [
|
|
|
|
{ roomId: '!room1' },
|
|
|
|
{ roomId: '!room2' },
|
|
|
|
] as unknown as Room[];
|
|
|
|
|
|
|
|
beforeEach(() => {
|
|
|
|
mockClient.isCrossSigningReady.mockResolvedValue(false);
|
|
|
|
mockClient.isSecretStorageReady.mockResolvedValue(false);
|
|
|
|
mockClient.getRooms.mockReturnValue(rooms);
|
|
|
|
mockClient.isRoomEncrypted.mockReturnValue(true);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('hides setup encryption toast when cross signing and secret storage are ready', async () => {
|
|
|
|
mockClient.isCrossSigningReady.mockResolvedValue(true);
|
|
|
|
mockClient.isSecretStorageReady.mockResolvedValue(true);
|
|
|
|
await createAndStart();
|
|
|
|
expect(SetupEncryptionToast.hideToast).toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
it('hides setup encryption toast when it is dismissed', async () => {
|
|
|
|
const instance = await createAndStart();
|
|
|
|
instance.dismissEncryptionSetup();
|
|
|
|
await flushPromises();
|
|
|
|
expect(SetupEncryptionToast.hideToast).toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
it('does not do any checks or show any toasts when secret storage is being accessed', async () => {
|
|
|
|
mocked(isSecretStorageBeingAccessed).mockReturnValue(true);
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.downloadKeys).not.toHaveBeenCalled();
|
|
|
|
expect(SetupEncryptionToast.showToast).not.toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
it('does not do any checks or show any toasts when no rooms are encrypted', async () => {
|
|
|
|
mockClient.isRoomEncrypted.mockReturnValue(false);
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.downloadKeys).not.toHaveBeenCalled();
|
|
|
|
expect(SetupEncryptionToast.showToast).not.toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('when user does not have a cross signing id on this device', () => {
|
|
|
|
beforeEach(() => {
|
|
|
|
mockClient.getCrossSigningId.mockReturnValue(undefined);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('shows verify session toast when account has cross signing', async () => {
|
|
|
|
mockClient.getStoredCrossSigningForUser.mockReturnValue(true);
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.downloadKeys).toHaveBeenCalled();
|
|
|
|
expect(SetupEncryptionToast.showToast).toHaveBeenCalledWith(
|
|
|
|
SetupEncryptionToast.Kind.VERIFY_THIS_SESSION);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('checks key backup status when when account has cross signing', async () => {
|
|
|
|
mockClient.getCrossSigningId.mockReturnValue(undefined);
|
|
|
|
mockClient.getStoredCrossSigningForUser.mockReturnValue(true);
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(mockClient.getKeyBackupEnabled).toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('when user does have a cross signing id on this device', () => {
|
|
|
|
beforeEach(() => {
|
|
|
|
mockClient.getCrossSigningId.mockReturnValue('abc');
|
|
|
|
});
|
|
|
|
|
|
|
|
it('shows upgrade encryption toast when user has a key backup available', async () => {
|
|
|
|
// non falsy response
|
|
|
|
mockClient.getKeyBackupVersion.mockResolvedValue({});
|
|
|
|
await createAndStart();
|
|
|
|
|
|
|
|
expect(SetupEncryptionToast.showToast).toHaveBeenCalledWith(
|
|
|
|
SetupEncryptionToast.Kind.UPGRADE_ENCRYPTION);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('key backup status', () => {
|
|
|
|
it('checks keybackup status when cross signing and secret storage are ready', async () => {
|
|
|
|
// default mocks set cross signing and secret storage to ready
|
|
|
|
await createAndStart();
|
|
|
|
expect(mockClient.getKeyBackupEnabled).toHaveBeenCalled();
|
|
|
|
expect(mockDispatcher.dispatch).not.toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
it('checks keybackup status when setup encryption toast has been dismissed', async () => {
|
|
|
|
mockClient.isCrossSigningReady.mockResolvedValue(false);
|
|
|
|
const instance = await createAndStart();
|
|
|
|
|
|
|
|
instance.dismissEncryptionSetup();
|
|
|
|
await flushPromises();
|
|
|
|
|
|
|
|
expect(mockClient.getKeyBackupEnabled).toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
it('does not dispatch keybackup event when key backup check is not finished', async () => {
|
|
|
|
// returns null when key backup status hasn't finished being checked
|
|
|
|
mockClient.getKeyBackupEnabled.mockReturnValue(null);
|
|
|
|
await createAndStart();
|
|
|
|
expect(mockDispatcher.dispatch).not.toHaveBeenCalled();
|
|
|
|
});
|
|
|
|
|
|
|
|
it('dispatches keybackup event when key backup is not enabled', async () => {
|
|
|
|
mockClient.getKeyBackupEnabled.mockReturnValue(false);
|
|
|
|
await createAndStart();
|
|
|
|
expect(mockDispatcher.dispatch).toHaveBeenCalledWith({ action: Action.ReportKeyBackupNotEnabled });
|
|
|
|
});
|
|
|
|
|
|
|
|
it('does not check key backup status again after check is complete', async () => {
|
|
|
|
mockClient.getKeyBackupEnabled.mockReturnValue(null);
|
|
|
|
const instance = await createAndStart();
|
|
|
|
expect(mockClient.getKeyBackupEnabled).toHaveBeenCalled();
|
|
|
|
|
|
|
|
// keyback check now complete
|
|
|
|
mockClient.getKeyBackupEnabled.mockReturnValue(true);
|
|
|
|
|
|
|
|
// trigger a recheck
|
|
|
|
instance.dismissEncryptionSetup();
|
|
|
|
await flushPromises();
|
|
|
|
expect(mockClient.getKeyBackupEnabled).toHaveBeenCalledTimes(2);
|
|
|
|
|
|
|
|
// trigger another recheck
|
|
|
|
instance.dismissEncryptionSetup();
|
|
|
|
await flushPromises();
|
|
|
|
// not called again, check was complete last time
|
|
|
|
expect(mockClient.getKeyBackupEnabled).toHaveBeenCalledTimes(2);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|