2020-06-04 11:39:51 +00:00
|
|
|
/*
|
|
|
|
* Ansible inventory script used at Famedly GmbH for managing many hosts
|
2020-06-04 15:51:49 +00:00
|
|
|
* Copyright (C) 2020 Famedly GmbH
|
2020-06-04 11:39:51 +00:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
import 'dart:convert';
|
|
|
|
import 'package:famedlysdk/famedlysdk.dart';
|
|
|
|
import 'package:test/test.dart';
|
2020-06-05 07:59:37 +00:00
|
|
|
import 'package:olm/olm.dart' as olm;
|
2020-06-04 11:39:51 +00:00
|
|
|
|
2020-06-05 07:59:37 +00:00
|
|
|
import '../fake_client.dart';
|
2020-06-04 11:39:51 +00:00
|
|
|
import '../fake_matrix_api.dart';
|
|
|
|
|
|
|
|
Map<String, dynamic> jsonDecode(dynamic payload) {
|
|
|
|
if (payload is String) {
|
|
|
|
try {
|
|
|
|
return json.decode(payload);
|
|
|
|
} catch (e) {
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (payload is Map<String, dynamic>) return payload;
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
void main() {
|
|
|
|
/// All Tests related to device keys
|
|
|
|
group('Key Request', () {
|
2020-06-05 07:59:37 +00:00
|
|
|
var olmEnabled = true;
|
|
|
|
try {
|
|
|
|
olm.init();
|
|
|
|
olm.Account();
|
|
|
|
} catch (_) {
|
|
|
|
olmEnabled = false;
|
|
|
|
print('[LibOlm] Failed to load LibOlm: ' + _.toString());
|
|
|
|
}
|
|
|
|
print('[LibOlm] Enabled: $olmEnabled');
|
|
|
|
|
|
|
|
if (!olmEnabled) return;
|
|
|
|
|
2020-06-04 11:39:51 +00:00
|
|
|
final validSessionId = 'ciM/JWTPrmiWPPZNkRLDPQYf9AW/I46bxyLSr+Bx5oU';
|
|
|
|
final validSenderKey = '3C5BFWi2Y8MaVvjM8M22DBmh24PmgR0nPvJOIArzgyI';
|
|
|
|
test('Create Request', () async {
|
2020-06-05 07:59:37 +00:00
|
|
|
var matrix = await getClient();
|
2020-06-04 11:39:51 +00:00
|
|
|
final requestRoom = matrix.getRoomById('!726s6s6q:example.com');
|
2020-06-13 17:48:38 +00:00
|
|
|
await matrix.encryption.keyManager.request(
|
|
|
|
requestRoom, 'sessionId', validSenderKey,
|
|
|
|
tryOnlineBackup: false);
|
2020-06-04 11:39:51 +00:00
|
|
|
var foundEvent = false;
|
|
|
|
for (var entry in FakeMatrixApi.calledEndpoints.entries) {
|
|
|
|
final payload = jsonDecode(entry.value.first);
|
|
|
|
if (entry.key
|
|
|
|
.startsWith('/client/r0/sendToDevice/m.room_key_request') &&
|
|
|
|
(payload['messages'] is Map) &&
|
|
|
|
(payload['messages']['@alice:example.com'] is Map) &&
|
|
|
|
(payload['messages']['@alice:example.com']['*'] is Map)) {
|
|
|
|
final content = payload['messages']['@alice:example.com']['*'];
|
|
|
|
if (content['action'] == 'request' &&
|
|
|
|
content['body']['room_id'] == '!726s6s6q:example.com' &&
|
|
|
|
content['body']['sender_key'] == validSenderKey &&
|
|
|
|
content['body']['session_id'] == 'sessionId') {
|
|
|
|
foundEvent = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
expect(foundEvent, true);
|
|
|
|
await matrix.dispose(closeDatabase: true);
|
|
|
|
});
|
|
|
|
test('Reply To Request', () async {
|
2020-06-05 07:59:37 +00:00
|
|
|
var matrix = await getClient();
|
2020-06-04 11:39:51 +00:00
|
|
|
matrix.setUserId('@alice:example.com'); // we need to pretend to be alice
|
|
|
|
FakeMatrixApi.calledEndpoints.clear();
|
|
|
|
await matrix
|
|
|
|
.userDeviceKeys['@alice:example.com'].deviceKeys['OTHERDEVICE']
|
2020-06-05 20:03:28 +00:00
|
|
|
.setBlocked(false);
|
2020-06-04 11:39:51 +00:00
|
|
|
await matrix
|
|
|
|
.userDeviceKeys['@alice:example.com'].deviceKeys['OTHERDEVICE']
|
2020-06-05 20:03:28 +00:00
|
|
|
.setVerified(true);
|
2020-06-04 11:39:51 +00:00
|
|
|
// test a successful share
|
|
|
|
var event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.room_key_request',
|
|
|
|
content: {
|
|
|
|
'action': 'request',
|
|
|
|
'body': {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!726s6s6q:example.com',
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'session_id': validSessionId,
|
|
|
|
},
|
|
|
|
'request_id': 'request_1',
|
|
|
|
'requesting_device_id': 'OTHERDEVICE',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
print(FakeMatrixApi.calledEndpoints.keys.toString());
|
|
|
|
expect(
|
|
|
|
FakeMatrixApi.calledEndpoints.keys.any(
|
|
|
|
(k) => k.startsWith('/client/r0/sendToDevice/m.room.encrypted')),
|
|
|
|
true);
|
|
|
|
|
|
|
|
// test various fail scenarios
|
|
|
|
|
|
|
|
// no body
|
|
|
|
FakeMatrixApi.calledEndpoints.clear();
|
|
|
|
event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.room_key_request',
|
|
|
|
content: {
|
|
|
|
'action': 'request',
|
|
|
|
'request_id': 'request_2',
|
|
|
|
'requesting_device_id': 'OTHERDEVICE',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
FakeMatrixApi.calledEndpoints.keys.any(
|
|
|
|
(k) => k.startsWith('/client/r0/sendToDevice/m.room.encrypted')),
|
|
|
|
false);
|
|
|
|
|
|
|
|
// request by ourself
|
|
|
|
FakeMatrixApi.calledEndpoints.clear();
|
|
|
|
event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.room_key_request',
|
|
|
|
content: {
|
|
|
|
'action': 'request',
|
|
|
|
'body': {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!726s6s6q:example.com',
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'session_id': validSessionId,
|
|
|
|
},
|
|
|
|
'request_id': 'request_3',
|
|
|
|
'requesting_device_id': 'JLAFKJWSCS',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
FakeMatrixApi.calledEndpoints.keys.any(
|
|
|
|
(k) => k.startsWith('/client/r0/sendToDevice/m.room.encrypted')),
|
|
|
|
false);
|
|
|
|
|
|
|
|
// device not found
|
|
|
|
FakeMatrixApi.calledEndpoints.clear();
|
|
|
|
event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.room_key_request',
|
|
|
|
content: {
|
|
|
|
'action': 'request',
|
|
|
|
'body': {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!726s6s6q:example.com',
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'session_id': validSessionId,
|
|
|
|
},
|
|
|
|
'request_id': 'request_4',
|
|
|
|
'requesting_device_id': 'blubb',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
FakeMatrixApi.calledEndpoints.keys.any(
|
|
|
|
(k) => k.startsWith('/client/r0/sendToDevice/m.room.encrypted')),
|
|
|
|
false);
|
|
|
|
|
|
|
|
// unknown room
|
|
|
|
FakeMatrixApi.calledEndpoints.clear();
|
|
|
|
event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.room_key_request',
|
|
|
|
content: {
|
|
|
|
'action': 'request',
|
|
|
|
'body': {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!invalid:example.com',
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'session_id': validSessionId,
|
|
|
|
},
|
|
|
|
'request_id': 'request_5',
|
|
|
|
'requesting_device_id': 'OTHERDEVICE',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
FakeMatrixApi.calledEndpoints.keys.any(
|
|
|
|
(k) => k.startsWith('/client/r0/sendToDevice/m.room.encrypted')),
|
|
|
|
false);
|
|
|
|
|
|
|
|
// unknwon session
|
|
|
|
FakeMatrixApi.calledEndpoints.clear();
|
|
|
|
event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.room_key_request',
|
|
|
|
content: {
|
|
|
|
'action': 'request',
|
|
|
|
'body': {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!726s6s6q:example.com',
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'session_id': 'invalid',
|
|
|
|
},
|
|
|
|
'request_id': 'request_6',
|
|
|
|
'requesting_device_id': 'OTHERDEVICE',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
FakeMatrixApi.calledEndpoints.keys.any(
|
|
|
|
(k) => k.startsWith('/client/r0/sendToDevice/m.room.encrypted')),
|
|
|
|
false);
|
|
|
|
|
|
|
|
FakeMatrixApi.calledEndpoints.clear();
|
|
|
|
await matrix.dispose(closeDatabase: true);
|
|
|
|
});
|
|
|
|
test('Receive shared keys', () async {
|
2020-06-05 07:59:37 +00:00
|
|
|
var matrix = await getClient();
|
2020-06-04 11:39:51 +00:00
|
|
|
final requestRoom = matrix.getRoomById('!726s6s6q:example.com');
|
2020-06-13 17:48:38 +00:00
|
|
|
await matrix.encryption.keyManager.request(
|
|
|
|
requestRoom, validSessionId, validSenderKey,
|
|
|
|
tryOnlineBackup: false);
|
2020-06-04 11:39:51 +00:00
|
|
|
|
|
|
|
final session = await matrix.encryption.keyManager
|
|
|
|
.loadInboundGroupSession(
|
|
|
|
requestRoom.id, validSessionId, validSenderKey);
|
|
|
|
final sessionKey = session.inboundGroupSession
|
|
|
|
.export_session(session.inboundGroupSession.first_known_index());
|
|
|
|
matrix.encryption.keyManager.clearInboundGroupSessions();
|
|
|
|
var event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.forwarded_room_key',
|
|
|
|
content: {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!726s6s6q:example.com',
|
|
|
|
'session_id': validSessionId,
|
|
|
|
'session_key': sessionKey,
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'forwarding_curve25519_key_chain': [],
|
|
|
|
},
|
|
|
|
encryptedContent: {
|
|
|
|
'sender_key': '3C5BFWi2Y8MaVvjM8M22DBmh24PmgR0nPvJOIArzgyI',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
matrix.encryption.keyManager.getInboundGroupSession(
|
|
|
|
requestRoom.id, validSessionId, validSenderKey) !=
|
|
|
|
null,
|
|
|
|
true);
|
|
|
|
|
|
|
|
// now test a few invalid scenarios
|
|
|
|
|
|
|
|
// request not found
|
|
|
|
matrix.encryption.keyManager.clearInboundGroupSessions();
|
|
|
|
event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.forwarded_room_key',
|
|
|
|
content: {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!726s6s6q:example.com',
|
|
|
|
'session_id': validSessionId,
|
|
|
|
'session_key': sessionKey,
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'forwarding_curve25519_key_chain': [],
|
|
|
|
},
|
|
|
|
encryptedContent: {
|
|
|
|
'sender_key': '3C5BFWi2Y8MaVvjM8M22DBmh24PmgR0nPvJOIArzgyI',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
matrix.encryption.keyManager.getInboundGroupSession(
|
|
|
|
requestRoom.id, validSessionId, validSenderKey) !=
|
|
|
|
null,
|
|
|
|
false);
|
|
|
|
|
|
|
|
// unknown device
|
2020-06-13 17:48:38 +00:00
|
|
|
await matrix.encryption.keyManager.request(
|
|
|
|
requestRoom, validSessionId, validSenderKey,
|
|
|
|
tryOnlineBackup: false);
|
2020-06-04 11:39:51 +00:00
|
|
|
matrix.encryption.keyManager.clearInboundGroupSessions();
|
|
|
|
event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.forwarded_room_key',
|
|
|
|
content: {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!726s6s6q:example.com',
|
|
|
|
'session_id': validSessionId,
|
|
|
|
'session_key': sessionKey,
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'forwarding_curve25519_key_chain': [],
|
|
|
|
},
|
|
|
|
encryptedContent: {
|
|
|
|
'sender_key': 'invalid',
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
matrix.encryption.keyManager.getInboundGroupSession(
|
|
|
|
requestRoom.id, validSessionId, validSenderKey) !=
|
|
|
|
null,
|
|
|
|
false);
|
|
|
|
|
|
|
|
// no encrypted content
|
2020-06-13 17:48:38 +00:00
|
|
|
await matrix.encryption.keyManager.request(
|
|
|
|
requestRoom, validSessionId, validSenderKey,
|
|
|
|
tryOnlineBackup: false);
|
2020-06-04 11:39:51 +00:00
|
|
|
matrix.encryption.keyManager.clearInboundGroupSessions();
|
|
|
|
event = ToDeviceEvent(
|
|
|
|
sender: '@alice:example.com',
|
|
|
|
type: 'm.forwarded_room_key',
|
|
|
|
content: {
|
|
|
|
'algorithm': 'm.megolm.v1.aes-sha2',
|
|
|
|
'room_id': '!726s6s6q:example.com',
|
|
|
|
'session_id': validSessionId,
|
|
|
|
'session_key': sessionKey,
|
|
|
|
'sender_key': validSenderKey,
|
|
|
|
'forwarding_curve25519_key_chain': [],
|
|
|
|
});
|
|
|
|
await matrix.encryption.keyManager.handleToDeviceEvent(event);
|
|
|
|
expect(
|
|
|
|
matrix.encryption.keyManager.getInboundGroupSession(
|
|
|
|
requestRoom.id, validSessionId, validSenderKey) !=
|
|
|
|
null,
|
|
|
|
false);
|
|
|
|
|
|
|
|
await matrix.dispose(closeDatabase: true);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|