2022-04-07 11:34:07 +00:00
|
|
|
/*
|
|
|
|
Copyright 2022 The Matrix.org Foundation C.I.C.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2022-09-16 15:12:27 +00:00
|
|
|
import { mocked, Mocked } from "jest-mock";
|
2023-08-08 10:12:12 +00:00
|
|
|
import { CryptoApi, MatrixClient, Device, Preset, RoomType } from "matrix-js-sdk/src/matrix";
|
2023-11-21 17:12:08 +00:00
|
|
|
// eslint-disable-next-line no-restricted-imports
|
|
|
|
import { MatrixRTCSession } from "matrix-js-sdk/src/matrixrtc/MatrixRTCSession";
|
2022-04-07 11:34:07 +00:00
|
|
|
|
2023-06-21 21:50:01 +00:00
|
|
|
import { stubClient, setupAsyncStoreWithClient, mockPlatformPeg, getMockClientWithEventEmitter } from "./test-utils";
|
2022-04-07 11:34:07 +00:00
|
|
|
import { MatrixClientPeg } from "../src/MatrixClientPeg";
|
|
|
|
import WidgetStore from "../src/stores/WidgetStore";
|
|
|
|
import WidgetUtils from "../src/utils/WidgetUtils";
|
2022-09-16 15:12:27 +00:00
|
|
|
import { JitsiCall, ElementCall } from "../src/models/Call";
|
2023-06-21 21:50:01 +00:00
|
|
|
import createRoom, { checkUserIsAllowedToChangeEncryption, canEncryptToAllUsers } from "../src/createRoom";
|
2022-10-07 18:10:17 +00:00
|
|
|
import SettingsStore from "../src/settings/SettingsStore";
|
2022-04-07 11:34:07 +00:00
|
|
|
|
|
|
|
describe("createRoom", () => {
|
2022-07-12 12:23:35 +00:00
|
|
|
mockPlatformPeg();
|
|
|
|
|
2022-09-16 15:12:27 +00:00
|
|
|
let client: Mocked<MatrixClient>;
|
2022-04-07 11:34:07 +00:00
|
|
|
beforeEach(() => {
|
|
|
|
stubClient();
|
2023-06-05 17:12:23 +00:00
|
|
|
client = mocked(MatrixClientPeg.safeGet());
|
2022-04-07 11:34:07 +00:00
|
|
|
});
|
|
|
|
|
2022-07-12 12:23:35 +00:00
|
|
|
afterEach(() => jest.clearAllMocks());
|
|
|
|
|
2022-09-16 15:12:27 +00:00
|
|
|
it("sets up Jitsi video rooms correctly", async () => {
|
2022-04-07 11:34:07 +00:00
|
|
|
setupAsyncStoreWithClient(WidgetStore.instance, client);
|
|
|
|
jest.spyOn(WidgetUtils, "waitForRoomWidget").mockResolvedValue();
|
2022-09-16 15:12:27 +00:00
|
|
|
const createCallSpy = jest.spyOn(JitsiCall, "create");
|
2022-04-07 11:34:07 +00:00
|
|
|
|
2022-09-16 15:12:27 +00:00
|
|
|
const userId = client.getUserId()!;
|
2023-05-30 09:36:34 +00:00
|
|
|
const roomId = await createRoom(client, { roomType: RoomType.ElementVideo });
|
2022-06-09 13:56:02 +00:00
|
|
|
|
2022-12-12 11:24:14 +00:00
|
|
|
const [
|
|
|
|
[
|
|
|
|
{
|
|
|
|
power_level_content_override: {
|
|
|
|
users: { [userId]: userPower },
|
|
|
|
events: {
|
|
|
|
"im.vector.modular.widgets": widgetPower,
|
|
|
|
[JitsiCall.MEMBER_EVENT_TYPE]: callMemberPower,
|
|
|
|
},
|
|
|
|
},
|
2022-06-09 13:56:02 +00:00
|
|
|
},
|
2022-12-12 11:24:14 +00:00
|
|
|
],
|
|
|
|
] = client.createRoom.mock.calls as any; // no good type
|
2022-04-07 11:34:07 +00:00
|
|
|
|
2022-09-16 15:12:27 +00:00
|
|
|
// We should have had enough power to be able to set up the widget
|
2022-06-09 13:56:02 +00:00
|
|
|
expect(userPower).toBeGreaterThanOrEqual(widgetPower);
|
|
|
|
// and should have actually set it up
|
2022-09-16 15:12:27 +00:00
|
|
|
expect(createCallSpy).toHaveBeenCalled();
|
2022-04-07 11:34:07 +00:00
|
|
|
|
|
|
|
// All members should be able to update their connected devices
|
2022-09-16 15:12:27 +00:00
|
|
|
expect(callMemberPower).toEqual(0);
|
|
|
|
// widget should be immutable for admins
|
2022-06-09 13:56:02 +00:00
|
|
|
expect(widgetPower).toBeGreaterThan(100);
|
|
|
|
// and we should have been reset back to admin
|
2022-11-28 21:37:32 +00:00
|
|
|
expect(client.setPowerLevel).toHaveBeenCalledWith(roomId, userId, 100, null);
|
2022-04-07 11:34:07 +00:00
|
|
|
});
|
2022-09-16 15:12:27 +00:00
|
|
|
|
|
|
|
it("sets up Element video rooms correctly", async () => {
|
|
|
|
const userId = client.getUserId()!;
|
|
|
|
const createCallSpy = jest.spyOn(ElementCall, "create");
|
2023-11-21 17:12:08 +00:00
|
|
|
const callMembershipSpy = jest.spyOn(MatrixRTCSession, "callMembershipsForRoom");
|
|
|
|
callMembershipSpy.mockReturnValue([]);
|
|
|
|
|
2023-05-30 09:36:34 +00:00
|
|
|
const roomId = await createRoom(client, { roomType: RoomType.UnstableCall });
|
2022-09-16 15:12:27 +00:00
|
|
|
|
2023-02-24 15:28:40 +00:00
|
|
|
const userPower = client.createRoom.mock.calls[0][0].power_level_content_override?.users?.[userId];
|
|
|
|
const callPower =
|
|
|
|
client.createRoom.mock.calls[0][0].power_level_content_override?.events?.[ElementCall.CALL_EVENT_TYPE.name];
|
|
|
|
const callMemberPower =
|
|
|
|
client.createRoom.mock.calls[0][0].power_level_content_override?.events?.[
|
|
|
|
ElementCall.MEMBER_EVENT_TYPE.name
|
|
|
|
];
|
2022-09-16 15:12:27 +00:00
|
|
|
|
|
|
|
// We should have had enough power to be able to set up the call
|
2023-02-24 15:28:40 +00:00
|
|
|
expect(userPower).toBeGreaterThanOrEqual(callPower!);
|
2022-09-16 15:12:27 +00:00
|
|
|
// and should have actually set it up
|
|
|
|
expect(createCallSpy).toHaveBeenCalled();
|
|
|
|
|
|
|
|
// All members should be able to update their connected devices
|
|
|
|
expect(callMemberPower).toEqual(0);
|
|
|
|
// call should be immutable for admins
|
|
|
|
expect(callPower).toBeGreaterThan(100);
|
|
|
|
// and we should have been reset back to admin
|
2022-11-28 21:37:32 +00:00
|
|
|
expect(client.setPowerLevel).toHaveBeenCalledWith(roomId, userId, 100, null);
|
2022-09-16 15:12:27 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
it("doesn't create calls in non-video-rooms", async () => {
|
|
|
|
const createJitsiCallSpy = jest.spyOn(JitsiCall, "create");
|
|
|
|
const createElementCallSpy = jest.spyOn(ElementCall, "create");
|
|
|
|
|
2023-05-30 09:36:34 +00:00
|
|
|
await createRoom(client, {});
|
2022-09-16 15:12:27 +00:00
|
|
|
|
|
|
|
expect(createJitsiCallSpy).not.toHaveBeenCalled();
|
|
|
|
expect(createElementCallSpy).not.toHaveBeenCalled();
|
|
|
|
});
|
2022-10-07 18:10:17 +00:00
|
|
|
|
|
|
|
it("correctly sets up MSC3401 power levels", async () => {
|
|
|
|
jest.spyOn(SettingsStore, "getValue").mockImplementation((name: string) => {
|
|
|
|
if (name === "feature_group_calls") return true;
|
|
|
|
});
|
|
|
|
|
2023-05-30 09:36:34 +00:00
|
|
|
await createRoom(client, {});
|
2022-10-07 18:10:17 +00:00
|
|
|
|
2023-02-24 15:28:40 +00:00
|
|
|
const callPower =
|
|
|
|
client.createRoom.mock.calls[0][0].power_level_content_override?.events?.[ElementCall.CALL_EVENT_TYPE.name];
|
|
|
|
const callMemberPower =
|
|
|
|
client.createRoom.mock.calls[0][0].power_level_content_override?.events?.[
|
|
|
|
ElementCall.MEMBER_EVENT_TYPE.name
|
|
|
|
];
|
2022-10-07 18:10:17 +00:00
|
|
|
|
|
|
|
expect(callPower).toBe(100);
|
|
|
|
expect(callMemberPower).toBe(100);
|
|
|
|
});
|
2022-10-12 17:59:07 +00:00
|
|
|
|
|
|
|
it("should upload avatar if one is passed", async () => {
|
|
|
|
client.uploadContent.mockResolvedValue({ content_uri: "mxc://foobar" });
|
|
|
|
const avatar = new File([], "avatar.png");
|
2023-05-30 09:36:34 +00:00
|
|
|
await createRoom(client, { avatar });
|
2022-12-12 11:24:14 +00:00
|
|
|
expect(client.createRoom).toHaveBeenCalledWith(
|
|
|
|
expect.objectContaining({
|
|
|
|
initial_state: expect.arrayContaining([
|
|
|
|
{
|
|
|
|
content: {
|
|
|
|
url: "mxc://foobar",
|
|
|
|
},
|
|
|
|
type: "m.room.avatar",
|
|
|
|
},
|
|
|
|
]),
|
|
|
|
}),
|
|
|
|
);
|
2022-10-12 17:59:07 +00:00
|
|
|
});
|
2023-10-17 09:37:08 +00:00
|
|
|
|
|
|
|
it("should strip self-invite", async () => {
|
|
|
|
await createRoom(client, { dmUserId: client.getSafeUserId() });
|
|
|
|
expect(client.createRoom).toHaveBeenCalledWith(
|
|
|
|
expect.not.objectContaining({
|
|
|
|
invite: expect.any(Array),
|
|
|
|
}),
|
|
|
|
);
|
|
|
|
});
|
2022-04-07 11:34:07 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
describe("canEncryptToAllUsers", () => {
|
2023-03-31 07:43:47 +00:00
|
|
|
const user1Id = "@user1:example.com";
|
|
|
|
const user2Id = "@user2:example.com";
|
2023-03-28 10:23:16 +00:00
|
|
|
|
2023-03-31 07:43:47 +00:00
|
|
|
const devices = new Map([
|
2023-04-24 14:19:08 +00:00
|
|
|
["DEV1", {} as unknown as Device],
|
|
|
|
["DEV2", {} as unknown as Device],
|
2023-03-31 07:43:47 +00:00
|
|
|
]);
|
2022-04-07 11:34:07 +00:00
|
|
|
|
2022-09-16 15:12:27 +00:00
|
|
|
let client: Mocked<MatrixClient>;
|
2023-04-24 14:19:08 +00:00
|
|
|
let cryptoApi: Mocked<CryptoApi>;
|
2023-03-31 07:43:47 +00:00
|
|
|
|
|
|
|
beforeAll(() => {
|
|
|
|
client = mocked(stubClient());
|
2023-04-24 14:19:08 +00:00
|
|
|
cryptoApi = mocked(client.getCrypto()!);
|
2022-04-07 11:34:07 +00:00
|
|
|
});
|
|
|
|
|
2023-04-03 09:28:17 +00:00
|
|
|
it("should return true if userIds is empty", async () => {
|
2023-04-24 14:19:08 +00:00
|
|
|
cryptoApi.getUserDeviceInfo.mockResolvedValue(new Map());
|
2023-04-03 09:28:17 +00:00
|
|
|
const result = await canEncryptToAllUsers(client, []);
|
|
|
|
expect(result).toBe(true);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should return true if download keys does not return any user", async () => {
|
2023-04-24 14:19:08 +00:00
|
|
|
cryptoApi.getUserDeviceInfo.mockResolvedValue(new Map());
|
2023-03-31 07:43:47 +00:00
|
|
|
const result = await canEncryptToAllUsers(client, [user1Id, user2Id]);
|
2023-04-03 09:28:17 +00:00
|
|
|
expect(result).toBe(true);
|
2022-04-07 11:34:07 +00:00
|
|
|
});
|
|
|
|
|
2023-03-31 07:43:47 +00:00
|
|
|
it("should return false if none of the users has a device", async () => {
|
2023-04-24 14:19:08 +00:00
|
|
|
cryptoApi.getUserDeviceInfo.mockResolvedValue(
|
2023-03-31 07:43:47 +00:00
|
|
|
new Map([
|
|
|
|
[user1Id, new Map()],
|
|
|
|
[user2Id, new Map()],
|
|
|
|
]),
|
|
|
|
);
|
|
|
|
const result = await canEncryptToAllUsers(client, [user1Id, user2Id]);
|
|
|
|
expect(result).toBe(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should return false if some of the users don't have a device", async () => {
|
2023-04-24 14:19:08 +00:00
|
|
|
cryptoApi.getUserDeviceInfo.mockResolvedValue(
|
2023-03-31 07:43:47 +00:00
|
|
|
new Map([
|
|
|
|
[user1Id, new Map()],
|
|
|
|
[user2Id, devices],
|
|
|
|
]),
|
|
|
|
);
|
|
|
|
const result = await canEncryptToAllUsers(client, [user1Id, user2Id]);
|
|
|
|
expect(result).toBe(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should return true if all users have a device", async () => {
|
2023-04-24 14:19:08 +00:00
|
|
|
cryptoApi.getUserDeviceInfo.mockResolvedValue(
|
2023-03-31 07:43:47 +00:00
|
|
|
new Map([
|
|
|
|
[user1Id, devices],
|
|
|
|
[user2Id, devices],
|
|
|
|
]),
|
|
|
|
);
|
|
|
|
const result = await canEncryptToAllUsers(client, [user1Id, user2Id]);
|
|
|
|
expect(result).toBe(true);
|
2022-04-07 11:34:07 +00:00
|
|
|
});
|
|
|
|
});
|
2023-06-21 21:50:01 +00:00
|
|
|
|
|
|
|
describe("checkUserIsAllowedToChangeEncryption()", () => {
|
|
|
|
const mockClient = getMockClientWithEventEmitter({
|
|
|
|
doesServerForceEncryptionForPreset: jest.fn(),
|
|
|
|
getClientWellKnown: jest.fn().mockReturnValue({}),
|
|
|
|
});
|
|
|
|
beforeEach(() => {
|
|
|
|
mockClient.doesServerForceEncryptionForPreset.mockClear().mockResolvedValue(false);
|
|
|
|
mockClient.getClientWellKnown.mockClear().mockReturnValue({});
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should allow changing when neither server nor well known force encryption", async () => {
|
|
|
|
expect(await checkUserIsAllowedToChangeEncryption(mockClient, Preset.PrivateChat)).toEqual({
|
|
|
|
allowChange: true,
|
|
|
|
});
|
|
|
|
|
|
|
|
expect(mockClient.doesServerForceEncryptionForPreset).toHaveBeenCalledWith(Preset.PrivateChat);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should not allow changing when server forces encryption", async () => {
|
|
|
|
mockClient.doesServerForceEncryptionForPreset.mockResolvedValue(true);
|
|
|
|
expect(await checkUserIsAllowedToChangeEncryption(mockClient, Preset.PrivateChat)).toEqual({
|
|
|
|
allowChange: false,
|
|
|
|
forcedValue: true,
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should not allow changing when well-known force_disable is true", async () => {
|
|
|
|
mockClient.getClientWellKnown.mockReturnValue({
|
|
|
|
"io.element.e2ee": {
|
|
|
|
force_disable: true,
|
|
|
|
},
|
|
|
|
});
|
|
|
|
expect(await checkUserIsAllowedToChangeEncryption(mockClient, Preset.PrivateChat)).toEqual({
|
|
|
|
allowChange: false,
|
|
|
|
forcedValue: false,
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should not allow changing when server forces enabled and wk forces disabled encryption", async () => {
|
|
|
|
mockClient.getClientWellKnown.mockReturnValue({
|
|
|
|
"io.element.e2ee": {
|
|
|
|
force_disable: true,
|
|
|
|
},
|
|
|
|
});
|
|
|
|
mockClient.doesServerForceEncryptionForPreset.mockResolvedValue(true);
|
|
|
|
expect(await checkUserIsAllowedToChangeEncryption(mockClient, Preset.PrivateChat)).toEqual(
|
|
|
|
// server's forced enable takes precedence
|
|
|
|
{ allowChange: false, forcedValue: true },
|
|
|
|
);
|
|
|
|
});
|
|
|
|
});
|