mirror of
https://github.com/vector-im/element-web.git
synced 2024-11-17 22:14:58 +08:00
236 lines
10 KiB
TypeScript
236 lines
10 KiB
TypeScript
|
/*
|
||
|
Copyright 2022 The Matrix.org Foundation C.I.C.
|
||
|
|
||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
you may not use this file except in compliance with the License.
|
||
|
You may obtain a copy of the License at
|
||
|
|
||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||
|
|
||
|
Unless required by applicable law or agreed to in writing, software
|
||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
See the License for the specific language governing permissions and
|
||
|
limitations under the License.
|
||
|
*/
|
||
|
|
||
|
import type { VerificationRequest } from "matrix-js-sdk/src/crypto/verification/request/VerificationRequest";
|
||
|
import type { ISasEvent } from "matrix-js-sdk/src/crypto/verification/SAS";
|
||
|
import type { MatrixClient } from "matrix-js-sdk/src/matrix";
|
||
|
import { SynapseInstance } from "../../plugins/synapsedocker";
|
||
|
import { UserCredentials } from "../../support/login";
|
||
|
import Chainable = Cypress.Chainable;
|
||
|
|
||
|
const ROOM_NAME = "Test room";
|
||
|
const TEST_USER = "Alia";
|
||
|
const BOT_USER = "Benjamin";
|
||
|
|
||
|
type EmojiMapping = [emoji: string, name: string];
|
||
|
|
||
|
const waitForVerificationRequest = (cli: MatrixClient): Promise<VerificationRequest> => {
|
||
|
return new Promise<VerificationRequest>((resolve) => {
|
||
|
const onVerificationRequestEvent = (request: VerificationRequest) => {
|
||
|
// @ts-ignore CryptoEvent is not exported to window.matrixcs; using the string value here
|
||
|
cli.off("crypto.verification.request", onVerificationRequestEvent);
|
||
|
resolve(request);
|
||
|
};
|
||
|
// @ts-ignore
|
||
|
cli.on("crypto.verification.request", onVerificationRequestEvent);
|
||
|
});
|
||
|
};
|
||
|
|
||
|
const handleVerificationRequest = (request: VerificationRequest): Chainable<EmojiMapping[]> => {
|
||
|
return cy.wrap(
|
||
|
new Promise<EmojiMapping[]>((resolve) => {
|
||
|
const onShowSas = (event: ISasEvent) => {
|
||
|
verifier.off("show_sas", onShowSas);
|
||
|
event.confirm();
|
||
|
resolve(event.sas.emoji);
|
||
|
};
|
||
|
|
||
|
const verifier = request.beginKeyVerification("m.sas.v1");
|
||
|
verifier.on("show_sas", onShowSas);
|
||
|
verifier.verify();
|
||
|
}),
|
||
|
);
|
||
|
};
|
||
|
|
||
|
describe("Decryption Failure Bar", () => {
|
||
|
let synapse: SynapseInstance | undefined;
|
||
|
let testUser: UserCredentials | undefined;
|
||
|
let bot: MatrixClient | undefined;
|
||
|
let roomId: string;
|
||
|
|
||
|
beforeEach(function () {
|
||
|
cy.startSynapse("default").then((syn: SynapseInstance) => {
|
||
|
synapse = syn;
|
||
|
cy.initTestUser(synapse, TEST_USER)
|
||
|
.then((creds: UserCredentials) => {
|
||
|
testUser = creds;
|
||
|
})
|
||
|
.then(() => {
|
||
|
cy.getBot(synapse, { displayName: BOT_USER }).then((cli) => {
|
||
|
bot = cli;
|
||
|
});
|
||
|
})
|
||
|
.then(() => {
|
||
|
cy.createRoom({ name: ROOM_NAME }).then((id) => {
|
||
|
roomId = id;
|
||
|
});
|
||
|
})
|
||
|
.then(() => {
|
||
|
cy.inviteUser(roomId, bot.getUserId());
|
||
|
cy.visit("/#/room/" + roomId);
|
||
|
cy.contains(".mx_TextualEvent", BOT_USER + " joined the room").should("exist");
|
||
|
})
|
||
|
.then(() => {
|
||
|
cy.getClient()
|
||
|
.then(async (cli) => {
|
||
|
await cli.setRoomEncryption(roomId, { algorithm: "m.megolm.v1.aes-sha2" });
|
||
|
await bot.setRoomEncryption(roomId, { algorithm: "m.megolm.v1.aes-sha2" });
|
||
|
})
|
||
|
.then(() => {
|
||
|
bot.getRoom(roomId).setBlacklistUnverifiedDevices(true);
|
||
|
});
|
||
|
});
|
||
|
});
|
||
|
});
|
||
|
|
||
|
afterEach(() => {
|
||
|
cy.stopSynapse(synapse);
|
||
|
});
|
||
|
|
||
|
it(
|
||
|
"should prompt the user to verify, if this device isn't verified " +
|
||
|
"and there are other verified devices or backups",
|
||
|
() => {
|
||
|
let otherDevice: MatrixClient | undefined;
|
||
|
cy.loginBot(synapse, testUser.username, testUser.password, {})
|
||
|
.then(async (cli) => {
|
||
|
otherDevice = cli;
|
||
|
await otherDevice.bootstrapCrossSigning({
|
||
|
authUploadDeviceSigningKeys: async (makeRequest) => {
|
||
|
await makeRequest({});
|
||
|
},
|
||
|
setupNewCrossSigning: true,
|
||
|
});
|
||
|
})
|
||
|
.then(() => {
|
||
|
cy.botSendMessage(bot, roomId, "test");
|
||
|
cy.wait(5000);
|
||
|
cy.get(".mx_DecryptionFailureBar .mx_DecryptionFailureBar_message_headline").should(
|
||
|
"have.text",
|
||
|
"Verify this device to access all messages",
|
||
|
);
|
||
|
|
||
|
cy.percySnapshot("DecryptionFailureBar prompts user to verify");
|
||
|
|
||
|
cy.contains(".mx_DecryptionFailureBar_button", "Resend key requests").should("not.exist");
|
||
|
cy.contains(".mx_DecryptionFailureBar_button", "Verify").click();
|
||
|
|
||
|
const verificationRequestPromise = waitForVerificationRequest(otherDevice);
|
||
|
cy.get(".mx_CompleteSecurity_actionRow .mx_AccessibleButton").click();
|
||
|
cy.wrap(verificationRequestPromise).then((verificationRequest: VerificationRequest) => {
|
||
|
cy.wrap(verificationRequest.accept());
|
||
|
handleVerificationRequest(verificationRequest).then((emojis) => {
|
||
|
cy.get(".mx_VerificationShowSas_emojiSas_block").then((emojiBlocks) => {
|
||
|
emojis.forEach((emoji: EmojiMapping, index: number) => {
|
||
|
expect(emojiBlocks[index].textContent.toLowerCase()).to.eq(emoji[0] + emoji[1]);
|
||
|
});
|
||
|
});
|
||
|
});
|
||
|
});
|
||
|
});
|
||
|
cy.contains(".mx_AccessibleButton", "They match").click();
|
||
|
cy.get(".mx_VerificationPanel_verified_section .mx_E2EIcon_verified").should("exist");
|
||
|
cy.contains(".mx_AccessibleButton", "Got it").click();
|
||
|
|
||
|
cy.get(".mx_DecryptionFailureBar .mx_DecryptionFailureBar_message_headline").should(
|
||
|
"have.text",
|
||
|
"Open another device to load encrypted messages",
|
||
|
);
|
||
|
|
||
|
cy.percySnapshot(
|
||
|
"DecryptionFailureBar prompts user to open another device, with Resend Key Requests button",
|
||
|
);
|
||
|
|
||
|
cy.intercept("/_matrix/client/r0/sendToDevice/m.room_key_request/*").as("keyRequest");
|
||
|
cy.contains(".mx_DecryptionFailureBar_button", "Resend key requests").click();
|
||
|
cy.wait("@keyRequest");
|
||
|
cy.contains(".mx_DecryptionFailureBar_button", "Resend key requests").should("not.exist");
|
||
|
|
||
|
cy.percySnapshot(
|
||
|
"DecryptionFailureBar prompts user to open another device, " + "without Resend Key Requests button",
|
||
|
);
|
||
|
},
|
||
|
);
|
||
|
|
||
|
it(
|
||
|
"should prompt the user to reset keys, if this device isn't verified " +
|
||
|
"and there are no other verified devices or backups",
|
||
|
() => {
|
||
|
cy.loginBot(synapse, testUser.username, testUser.password, {}).then(async (cli) => {
|
||
|
await cli.bootstrapCrossSigning({
|
||
|
authUploadDeviceSigningKeys: async (makeRequest) => {
|
||
|
await makeRequest({});
|
||
|
},
|
||
|
setupNewCrossSigning: true,
|
||
|
});
|
||
|
await cli.logout(true);
|
||
|
});
|
||
|
|
||
|
cy.botSendMessage(bot, roomId, "test");
|
||
|
cy.wait(5000);
|
||
|
cy.get(".mx_DecryptionFailureBar .mx_DecryptionFailureBar_message_headline").should(
|
||
|
"have.text",
|
||
|
"Reset your keys to prevent future decryption errors",
|
||
|
);
|
||
|
|
||
|
cy.percySnapshot("DecryptionFailureBar prompts user to reset keys");
|
||
|
|
||
|
cy.contains(".mx_DecryptionFailureBar_button", "Reset").click();
|
||
|
|
||
|
cy.get(".mx_Dialog").within(() => {
|
||
|
cy.contains(".mx_Dialog_primary", "Continue").click();
|
||
|
cy.get(".mx_CreateSecretStorageDialog_recoveryKey code").invoke("text").as("securityKey");
|
||
|
// Clicking download instead of Copy because of https://github.com/cypress-io/cypress/issues/2851
|
||
|
cy.contains(".mx_AccessibleButton", "Download").click();
|
||
|
cy.contains(".mx_Dialog_primary:not([disabled])", "Continue").click();
|
||
|
});
|
||
|
|
||
|
cy.get(".mx_DecryptionFailureBar .mx_DecryptionFailureBar_message_headline").should(
|
||
|
"have.text",
|
||
|
"Some messages could not be decrypted",
|
||
|
);
|
||
|
|
||
|
cy.percySnapshot("DecryptionFailureBar displays general message with no call to action");
|
||
|
},
|
||
|
);
|
||
|
|
||
|
it("should appear and disappear as undecryptable messages enter and leave view", () => {
|
||
|
cy.getClient().then((cli) => {
|
||
|
for (let i = 0; i < 25; i++) {
|
||
|
cy.botSendMessage(cli, roomId, `test ${i}`);
|
||
|
}
|
||
|
});
|
||
|
cy.botSendMessage(bot, roomId, "test");
|
||
|
cy.get(".mx_DecryptionFailureBar").should("exist");
|
||
|
cy.get(".mx_DecryptionFailureBar .mx_Spinner").should("exist");
|
||
|
|
||
|
cy.percySnapshot("DecryptionFailureBar displays loading spinner");
|
||
|
|
||
|
cy.wait(5000);
|
||
|
cy.get(".mx_DecryptionFailureBar .mx_Spinner").should("not.exist");
|
||
|
cy.get(".mx_DecryptionFailureBar .mx_DecryptionFailureBar_icon").should("exist");
|
||
|
|
||
|
cy.get(".mx_RoomView_messagePanel").scrollTo("top");
|
||
|
cy.get(".mx_DecryptionFailureBar").should("not.exist");
|
||
|
|
||
|
cy.botSendMessage(bot, roomId, "another test");
|
||
|
cy.get(".mx_DecryptionFailureBar").should("not.exist");
|
||
|
|
||
|
cy.get(".mx_RoomView_messagePanel").scrollTo("bottom");
|
||
|
cy.get(".mx_DecryptionFailureBar").should("exist");
|
||
|
});
|
||
|
});
|