mirror of
https://github.com/vector-im/element-web.git
synced 2024-11-28 11:28:12 +08:00
f28f1d998f
* Add labs option to exclude unverified devices Add a labs option which will, when set, switch into the "invisible crypto" mode of refusing to send keys to, or decrypt messages from, devices that have not been signed by their owner. * DecryptionFailureBody: better error messages Improve the error messages shown for messages from insecure devices. * playwright: factor out `createSecondBotDevice` utility * Playwright test for messages from insecure devices * fixup! DecryptionFailureBody: better error messages Use compound colour tokens, and add a background colour. * fixup! DecryptionFailureBody: better error messages Use compound spacing tokens
135 lines
4.7 KiB
TypeScript
135 lines
4.7 KiB
TypeScript
/*
|
|
* Copyright 2024 New Vector Ltd.
|
|
* Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
*
|
|
* SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
|
|
* Please see LICENSE files in the repository root for full details.
|
|
*/
|
|
|
|
import React from "react";
|
|
import { render } from "@testing-library/react";
|
|
import { MatrixEvent } from "matrix-js-sdk/src/matrix";
|
|
import { mkDecryptionFailureMatrixEvent } from "matrix-js-sdk/src/testing";
|
|
import { DecryptionFailureCode } from "matrix-js-sdk/src/crypto-api";
|
|
|
|
import { mkEvent } from "../../../test-utils";
|
|
import { DecryptionFailureBody } from "../../../../src/components/views/messages/DecryptionFailureBody";
|
|
import { LocalDeviceVerificationStateContext } from "../../../../src/contexts/LocalDeviceVerificationStateContext";
|
|
|
|
describe("DecryptionFailureBody", () => {
|
|
function customRender(event: MatrixEvent, localDeviceVerified: boolean = false) {
|
|
return render(
|
|
<LocalDeviceVerificationStateContext.Provider value={localDeviceVerified}>
|
|
<DecryptionFailureBody mxEvent={event} />
|
|
</LocalDeviceVerificationStateContext.Provider>,
|
|
);
|
|
}
|
|
|
|
it(`Should display "Unable to decrypt message"`, () => {
|
|
// When
|
|
const event = mkEvent({
|
|
type: "m.room.message",
|
|
room: "myfakeroom",
|
|
user: "myfakeuser",
|
|
content: {
|
|
msgtype: "m.bad.encrypted",
|
|
},
|
|
event: true,
|
|
});
|
|
const { container } = customRender(event);
|
|
|
|
// Then
|
|
expect(container).toMatchSnapshot();
|
|
});
|
|
|
|
it(`Should display "The sender has blocked you from receiving this message"`, async () => {
|
|
// When
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
code: DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE,
|
|
msg: "withheld",
|
|
roomId: "myfakeroom",
|
|
sender: "myfakeuser",
|
|
});
|
|
|
|
const { container } = customRender(event);
|
|
|
|
// Then
|
|
expect(container).toMatchSnapshot();
|
|
});
|
|
|
|
it("should handle historical messages with no key backup", async () => {
|
|
// When
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
code: DecryptionFailureCode.HISTORICAL_MESSAGE_NO_KEY_BACKUP,
|
|
msg: "No backup",
|
|
roomId: "fakeroom",
|
|
sender: "fakesender",
|
|
});
|
|
const { container } = customRender(event);
|
|
|
|
// Then
|
|
expect(container).toHaveTextContent("Historical messages are not available on this device");
|
|
});
|
|
|
|
it.each([true, false])(
|
|
"should handle historical messages when there is a backup and device verification is %s",
|
|
async (verified) => {
|
|
// When
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
code: DecryptionFailureCode.HISTORICAL_MESSAGE_BACKUP_UNCONFIGURED,
|
|
msg: "Failure",
|
|
roomId: "fakeroom",
|
|
sender: "fakesender",
|
|
});
|
|
const { container } = customRender(event, verified);
|
|
|
|
// Then
|
|
expect(container).toHaveTextContent(
|
|
verified ? "Unable to decrypt" : "You need to verify this device for access to historical messages",
|
|
);
|
|
},
|
|
);
|
|
|
|
it("should handle undecryptable pre-join messages", async () => {
|
|
// When
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
code: DecryptionFailureCode.HISTORICAL_MESSAGE_USER_NOT_JOINED,
|
|
msg: "Not joined",
|
|
roomId: "fakeroom",
|
|
sender: "fakesender",
|
|
});
|
|
const { container } = customRender(event);
|
|
|
|
// Then
|
|
expect(container).toHaveTextContent("You don't have access to this message");
|
|
});
|
|
|
|
it("should handle messages from users who change identities after verification", async () => {
|
|
// When
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
code: DecryptionFailureCode.SENDER_IDENTITY_PREVIOUSLY_VERIFIED,
|
|
msg: "User previously verified",
|
|
roomId: "fakeroom",
|
|
sender: "fakesender",
|
|
});
|
|
const { container } = customRender(event);
|
|
|
|
// Then
|
|
expect(container).toMatchSnapshot();
|
|
});
|
|
|
|
it("should handle messages from unverified devices", async () => {
|
|
// When
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
code: DecryptionFailureCode.UNSIGNED_SENDER_DEVICE,
|
|
msg: "Unsigned device",
|
|
roomId: "fakeroom",
|
|
sender: "fakesender",
|
|
});
|
|
const { container } = customRender(event);
|
|
|
|
// Then
|
|
expect(container).toHaveTextContent("Encrypted by a device not verified by its owner");
|
|
});
|
|
});
|