signal-desktop/test/storage_test.js

1039 lines
35 KiB
JavaScript
Raw Normal View History

/* global _, textsecure, libsignal, storage, ConversationController */
2018-11-02 18:02:53 +00:00
'use strict';
2018-11-02 18:02:53 +00:00
describe('SignalProtocolStore', () => {
const number = '+5558675309';
let store;
let identityKey;
let testKey;
before(async () => {
store = textsecure.storage.protocol;
store.hydrateCaches();
identityKey = {
pubKey: libsignal.crypto.getRandomBytes(33),
privKey: libsignal.crypto.getRandomBytes(32),
};
testKey = {
pubKey: libsignal.crypto.getRandomBytes(33),
privKey: libsignal.crypto.getRandomBytes(32),
};
storage.put('registrationId', 1337);
storage.put('identityKey', identityKey);
await storage.fetch();
ConversationController.reset();
await ConversationController.load();
await ConversationController.getOrCreateAndWait(number, 'private');
});
2018-11-02 18:02:53 +00:00
describe('getLocalRegistrationId', () => {
it('retrieves my registration id', async () => {
2019-09-26 19:56:31 +00:00
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
const id = await store.getLocalRegistrationId();
assert.strictEqual(id, 1337);
});
});
2018-11-02 18:02:53 +00:00
describe('getIdentityKeyPair', () => {
it('retrieves my identity key', async () => {
2019-09-26 19:56:31 +00:00
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
const key = await store.getIdentityKeyPair();
assertEqualArrayBuffers(key.pubKey, identityKey.pubKey);
assertEqualArrayBuffers(key.privKey, identityKey.privKey);
});
});
2017-06-13 20:57:46 +00:00
2018-11-02 18:02:53 +00:00
describe('saveIdentity', () => {
const address = new libsignal.SignalProtocolAddress(number, 1);
const identifier = address.toString();
2018-10-18 01:01:21 +00:00
2018-11-02 18:02:53 +00:00
it('stores identity keys', async () => {
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, testKey.pubKey);
const key = await store.loadIdentityKey(number);
assertEqualArrayBuffers(key, testKey.pubKey);
2015-07-22 19:48:08 +00:00
});
2018-11-02 18:02:53 +00:00
it('allows key changes', async () => {
const newIdentity = libsignal.crypto.getRandomBytes(33);
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, testKey.pubKey);
await store.saveIdentity(identifier, newIdentity);
2016-05-04 07:09:44 +00:00
});
2018-11-02 18:02:53 +00:00
describe('When there is no existing key (first use)', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await store.removeIdentityKey(number);
await store.saveIdentity(identifier, testKey.pubKey);
});
2018-11-02 18:02:53 +00:00
it('marks the key firstUse', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert(identity.firstUse);
});
2018-11-02 18:02:53 +00:00
it('sets the timestamp', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert(identity.timestamp);
});
2018-11-02 18:02:53 +00:00
it('sets the verified status to DEFAULT', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.verified, store.VerifiedStatus.DEFAULT);
2017-06-13 20:57:46 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('When there is a different existing key (non first use)', () => {
2018-10-18 01:01:21 +00:00
const newIdentity = libsignal.crypto.getRandomBytes(33);
const oldTimestamp = Date.now();
2018-11-02 18:02:53 +00:00
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: identifier,
publicKey: testKey.pubKey,
firstUse: true,
timestamp: oldTimestamp,
nonblockingApproval: false,
verified: store.VerifiedStatus.DEFAULT,
});
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, newIdentity);
});
2018-11-02 18:02:53 +00:00
it('marks the key not firstUse', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert(!identity.firstUse);
});
2018-11-02 18:02:53 +00:00
it('updates the timestamp', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.notEqual(identity.timestamp, oldTimestamp);
});
2018-11-02 18:02:53 +00:00
describe('The previous verified status was DEFAULT', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: oldTimestamp,
nonblockingApproval: false,
verified: store.VerifiedStatus.DEFAULT,
});
await store.hydrateCaches();
2017-06-13 20:57:46 +00:00
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, newIdentity);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('sets the new key to default', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.verified, store.VerifiedStatus.DEFAULT);
2017-06-13 20:57:46 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('The previous verified status was VERIFIED', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
publicKey: testKey.pubKey,
firstUse: true,
timestamp: oldTimestamp,
nonblockingApproval: false,
verified: store.VerifiedStatus.VERIFIED,
});
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, newIdentity);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('sets the new key to unverified', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
2018-04-27 21:25:04 +00:00
assert.strictEqual(
2018-10-18 01:01:21 +00:00
identity.verified,
2018-04-27 21:25:04 +00:00
store.VerifiedStatus.UNVERIFIED
);
2017-06-13 20:57:46 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('The previous verified status was UNVERIFIED', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
publicKey: testKey.pubKey,
firstUse: true,
timestamp: oldTimestamp,
nonblockingApproval: false,
verified: store.VerifiedStatus.UNVERIFIED,
});
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, newIdentity);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('sets the new key to unverified', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
2018-04-27 21:25:04 +00:00
assert.strictEqual(
2018-10-18 01:01:21 +00:00
identity.verified,
2018-04-27 21:25:04 +00:00
store.VerifiedStatus.UNVERIFIED
);
2017-06-13 20:57:46 +00:00
});
});
});
2018-11-02 18:02:53 +00:00
describe('When the key has not changed', () => {
const oldTimestamp = Date.now();
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
publicKey: testKey.pubKey,
timestamp: oldTimestamp,
nonblockingApproval: false,
verified: store.VerifiedStatus.DEFAULT,
});
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
describe('If it is marked firstUse', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
identity.firstUse = true;
await window.Signal.Data.createOrUpdateIdentityKey(identity);
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('nothing changes', async () => {
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, testKey.pubKey, true);
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert(!identity.nonblockingApproval);
assert.strictEqual(identity.timestamp, oldTimestamp);
});
});
2018-11-02 18:02:53 +00:00
describe('If it is not marked firstUse', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
identity.firstUse = false;
await window.Signal.Data.createOrUpdateIdentityKey(identity);
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
describe('If nonblocking approval is required', () => {
2018-10-18 01:01:21 +00:00
let now;
2018-11-02 18:02:53 +00:00
before(async () => {
now = Date.now();
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(
number
);
identity.timestamp = now;
await window.Signal.Data.createOrUpdateIdentityKey(identity);
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('sets non-blocking approval', async () => {
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, testKey.pubKey, true);
const identity = await window.Signal.Data.getIdentityKeyById(
number
);
assert.strictEqual(identity.nonblockingApproval, true);
assert.strictEqual(identity.timestamp, now);
assert.strictEqual(identity.firstUse, false);
});
});
});
});
});
2018-11-02 18:02:53 +00:00
describe('saveIdentityWithAttributes', () => {
let now;
let validAttributes;
2018-11-02 18:02:53 +00:00
before(async () => {
now = Date.now();
validAttributes = {
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: now,
verified: store.VerifiedStatus.VERIFIED,
nonblockingApproval: false,
};
2018-10-18 01:01:21 +00:00
await store.removeIdentityKey(number);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
describe('with valid attributes', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await store.saveIdentityWithAttributes(number, validAttributes);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('publicKey is saved', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assertEqualArrayBuffers(identity.publicKey, testKey.pubKey);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('firstUse is saved', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.firstUse, true);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('timestamp is saved', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.timestamp, now);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('verified is saved', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.verified, store.VerifiedStatus.VERIFIED);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('nonblockingApproval is saved', async () => {
2018-10-18 01:01:21 +00:00
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.nonblockingApproval, false);
2017-06-13 20:57:46 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('with invalid attributes', () => {
let attributes;
beforeEach(() => {
2017-06-13 20:57:46 +00:00
attributes = _.clone(validAttributes);
});
2018-10-18 01:01:21 +00:00
async function testInvalidAttributes() {
try {
await store.saveIdentityWithAttributes(number, attributes);
throw new Error('saveIdentityWithAttributes should have failed');
} catch (error) {
// good. we expect to fail with invalid attributes.
}
2017-06-13 20:57:46 +00:00
}
2018-11-02 18:02:53 +00:00
it('rejects an invalid publicKey', async () => {
2017-06-13 20:57:46 +00:00
attributes.publicKey = 'a string';
2018-10-18 01:01:21 +00:00
await testInvalidAttributes();
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('rejects invalid firstUse', async () => {
2017-06-13 20:57:46 +00:00
attributes.firstUse = 0;
2018-10-18 01:01:21 +00:00
await testInvalidAttributes();
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('rejects invalid timestamp', async () => {
2017-06-13 20:57:46 +00:00
attributes.timestamp = NaN;
2018-10-18 01:01:21 +00:00
await testInvalidAttributes();
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('rejects invalid verified', async () => {
2017-06-13 20:57:46 +00:00
attributes.verified = null;
2018-10-18 01:01:21 +00:00
await testInvalidAttributes();
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('rejects invalid nonblockingApproval', async () => {
2017-06-13 20:57:46 +00:00
attributes.nonblockingApproval = 0;
2018-10-18 01:01:21 +00:00
await testInvalidAttributes();
2017-06-13 20:57:46 +00:00
});
});
});
2018-11-02 18:02:53 +00:00
describe('setApproval', () => {
it('sets nonblockingApproval', async () => {
2018-10-18 01:01:21 +00:00
await store.setApproval(number, true);
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.nonblockingApproval, true);
2017-06-13 20:57:46 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('setVerified', () => {
2018-10-18 01:01:21 +00:00
async function saveRecordDefault() {
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.DEFAULT,
nonblockingApproval: false,
});
await store.hydrateCaches();
2017-06-13 20:57:46 +00:00
}
2018-11-02 18:02:53 +00:00
describe('with no public key argument', () => {
before(saveRecordDefault);
2018-11-02 18:02:53 +00:00
it('updates the verified status', async () => {
2018-10-18 01:01:21 +00:00
await store.setVerified(number, store.VerifiedStatus.VERIFIED);
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.verified, store.VerifiedStatus.VERIFIED);
assertEqualArrayBuffers(identity.publicKey, testKey.pubKey);
});
});
2018-11-02 18:02:53 +00:00
describe('with the current public key', () => {
before(saveRecordDefault);
2018-11-02 18:02:53 +00:00
it('updates the verified status', async () => {
2018-10-18 01:01:21 +00:00
await store.setVerified(
number,
store.VerifiedStatus.VERIFIED,
testKey.pubKey
);
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.verified, store.VerifiedStatus.VERIFIED);
assertEqualArrayBuffers(identity.publicKey, testKey.pubKey);
});
});
2018-11-02 18:02:53 +00:00
describe('with a mismatching public key', () => {
const newIdentity = libsignal.crypto.getRandomBytes(33);
before(saveRecordDefault);
2018-11-02 18:02:53 +00:00
it('does not change the record.', async () => {
2018-10-18 01:01:21 +00:00
await store.setVerified(
number,
store.VerifiedStatus.VERIFIED,
newIdentity
);
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.verified, store.VerifiedStatus.DEFAULT);
assertEqualArrayBuffers(identity.publicKey, testKey.pubKey);
});
2017-06-13 20:57:46 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('processContactSyncVerificationState', () => {
const newIdentity = libsignal.crypto.getRandomBytes(33);
let keychangeTriggered;
2018-11-02 18:02:53 +00:00
beforeEach(() => {
keychangeTriggered = 0;
2018-11-02 18:02:53 +00:00
store.bind('keychange', () => {
keychangeTriggered += 1;
});
});
2018-11-02 18:02:53 +00:00
afterEach(() => {
store.unbind('keychange');
});
2018-11-02 18:02:53 +00:00
describe('when the new verified status is DEFAULT', () => {
describe('when there is no existing record', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.removeIdentityKeyById(number);
await store.hydrateCaches();
});
2017-06-17 03:56:06 +00:00
2018-11-02 18:02:53 +00:00
it('does nothing', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.DEFAULT,
newIdentity
);
const identity = await window.Signal.Data.getIdentityKeyById(number);
if (identity) {
// fetchRecord resolved so there is a record.
// Bad.
throw new Error(
'processContactSyncVerificationState should not save new records'
2018-04-27 21:25:04 +00:00
);
2018-10-18 01:01:21 +00:00
}
assert.strictEqual(keychangeTriggered, 0);
2017-06-17 03:56:06 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('when the record exists', () => {
describe('when the existing key is different', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.VERIFIED,
nonblockingApproval: false,
});
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('does not save the new identity (because this is a less secure state)', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.DEFAULT,
newIdentity
);
const identity = await window.Signal.Data.getIdentityKeyById(
number
);
assert.strictEqual(
identity.verified,
store.VerifiedStatus.VERIFIED
);
assertEqualArrayBuffers(identity.publicKey, testKey.pubKey);
assert.strictEqual(keychangeTriggered, 0);
});
});
2018-11-02 18:02:53 +00:00
describe('when the existing key is the same but VERIFIED', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.VERIFIED,
nonblockingApproval: false,
});
await store.hydrateCaches();
2017-06-17 03:56:06 +00:00
});
2018-11-02 18:02:53 +00:00
it('updates the verified status', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.DEFAULT,
testKey.pubKey
);
const identity = await window.Signal.Data.getIdentityKeyById(
number
);
assert.strictEqual(identity.verified, store.VerifiedStatus.DEFAULT);
assertEqualArrayBuffers(identity.publicKey, testKey.pubKey);
assert.strictEqual(keychangeTriggered, 0);
2017-06-17 03:56:06 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('when the existing key is the same and already DEFAULT', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.DEFAULT,
nonblockingApproval: false,
});
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('does not hang', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.DEFAULT,
testKey.pubKey
);
assert.strictEqual(keychangeTriggered, 0);
});
});
});
});
2018-11-02 18:02:53 +00:00
describe('when the new verified status is UNVERIFIED', () => {
describe('when there is no existing record', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.removeIdentityKeyById(number);
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('saves the new identity and marks it verified', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.UNVERIFIED,
newIdentity
);
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(
identity.verified,
store.VerifiedStatus.UNVERIFIED
);
assertEqualArrayBuffers(identity.publicKey, newIdentity);
assert.strictEqual(keychangeTriggered, 0);
2017-06-17 03:56:06 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('when the record exists', () => {
describe('when the existing key is different', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.VERIFIED,
nonblockingApproval: false,
});
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('saves the new identity and marks it UNVERIFIED', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.UNVERIFIED,
newIdentity
);
const identity = await window.Signal.Data.getIdentityKeyById(
number
);
assert.strictEqual(
identity.verified,
store.VerifiedStatus.UNVERIFIED
);
assertEqualArrayBuffers(identity.publicKey, newIdentity);
assert.strictEqual(keychangeTriggered, 1);
});
});
2018-11-02 18:02:53 +00:00
describe('when the key exists and is DEFAULT', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.DEFAULT,
nonblockingApproval: false,
});
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('updates the verified status', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.UNVERIFIED,
testKey.pubKey
);
const identity = await window.Signal.Data.getIdentityKeyById(
number
);
assert.strictEqual(
identity.verified,
store.VerifiedStatus.UNVERIFIED
);
assertEqualArrayBuffers(identity.publicKey, testKey.pubKey);
assert.strictEqual(keychangeTriggered, 0);
});
});
2018-11-02 18:02:53 +00:00
describe('when the key exists and is already UNVERIFIED', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.UNVERIFIED,
nonblockingApproval: false,
});
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('does not hang', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.UNVERIFIED,
testKey.pubKey
);
assert.strictEqual(keychangeTriggered, 0);
});
});
});
2017-06-17 03:56:06 +00:00
});
2018-11-02 18:02:53 +00:00
describe('when the new verified status is VERIFIED', () => {
describe('when there is no existing record', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.removeIdentityKeyById(number);
await store.hydrateCaches();
2017-06-17 03:56:06 +00:00
});
2018-11-02 18:02:53 +00:00
it('saves the new identity and marks it verified', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.VERIFIED,
newIdentity
);
const identity = await window.Signal.Data.getIdentityKeyById(number);
assert.strictEqual(identity.verified, store.VerifiedStatus.VERIFIED);
assertEqualArrayBuffers(identity.publicKey, newIdentity);
assert.strictEqual(keychangeTriggered, 0);
2017-06-17 03:56:06 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('when the record exists', () => {
describe('when the existing key is different', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.VERIFIED,
nonblockingApproval: false,
2017-06-17 03:56:06 +00:00
});
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('saves the new identity and marks it VERIFIED', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.VERIFIED,
newIdentity
);
const identity = await window.Signal.Data.getIdentityKeyById(
number
);
assert.strictEqual(
identity.verified,
store.VerifiedStatus.VERIFIED
);
assertEqualArrayBuffers(identity.publicKey, newIdentity);
assert.strictEqual(keychangeTriggered, 1);
2017-06-17 03:56:06 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('when the existing key is the same but UNVERIFIED', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.UNVERIFIED,
nonblockingApproval: false,
2017-06-17 03:56:06 +00:00
});
await store.hydrateCaches();
});
2017-06-17 03:56:06 +00:00
2018-11-02 18:02:53 +00:00
it('saves the identity and marks it verified', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.VERIFIED,
testKey.pubKey
);
const identity = await window.Signal.Data.getIdentityKeyById(
number
);
assert.strictEqual(
identity.verified,
store.VerifiedStatus.VERIFIED
);
assertEqualArrayBuffers(identity.publicKey, testKey.pubKey);
assert.strictEqual(keychangeTriggered, 0);
2017-06-17 03:56:06 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('when the existing key is the same and already VERIFIED', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
firstUse: true,
timestamp: Date.now(),
verified: store.VerifiedStatus.VERIFIED,
nonblockingApproval: false,
});
await store.hydrateCaches();
});
2018-11-02 18:02:53 +00:00
it('does not hang', async () => {
2018-10-18 01:01:21 +00:00
await store.processContactSyncVerificationState(
number,
store.VerifiedStatus.VERIFIED,
testKey.pubKey
);
assert.strictEqual(keychangeTriggered, 0);
});
});
2017-06-17 03:56:06 +00:00
});
});
});
2018-11-02 18:02:53 +00:00
describe('isUntrusted', () => {
it('returns false if identity key old enough', async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
timestamp: Date.now() - 10 * 1000 * 60,
verified: store.VerifiedStatus.DEFAULT,
firstUse: false,
nonblockingApproval: false,
});
2018-10-18 01:01:21 +00:00
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
const untrusted = await store.isUntrusted(number);
assert.strictEqual(untrusted, false);
});
2018-11-02 18:02:53 +00:00
it('returns false if new but nonblockingApproval is true', async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
timestamp: Date.now(),
verified: store.VerifiedStatus.DEFAULT,
firstUse: false,
nonblockingApproval: true,
});
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
const untrusted = await store.isUntrusted(number);
assert.strictEqual(untrusted, false);
});
2018-11-02 18:02:53 +00:00
it('returns false if new but firstUse is true', async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
timestamp: Date.now(),
verified: store.VerifiedStatus.DEFAULT,
firstUse: true,
nonblockingApproval: false,
});
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
const untrusted = await store.isUntrusted(number);
assert.strictEqual(untrusted, false);
});
2018-11-02 18:02:53 +00:00
it('returns true if new, and no flags are set', async () => {
2018-10-18 01:01:21 +00:00
await window.Signal.Data.createOrUpdateIdentityKey({
id: number,
2018-04-27 21:25:04 +00:00
publicKey: testKey.pubKey,
timestamp: Date.now(),
verified: store.VerifiedStatus.DEFAULT,
firstUse: false,
nonblockingApproval: false,
});
await store.hydrateCaches();
2018-10-18 01:01:21 +00:00
const untrusted = await store.isUntrusted(number);
assert.strictEqual(untrusted, true);
});
});
2018-11-02 18:02:53 +00:00
describe('getVerified', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await store.setVerified(number, store.VerifiedStatus.VERIFIED);
2017-06-13 20:57:46 +00:00
});
2018-11-02 18:02:53 +00:00
it('resolves to the verified status', async () => {
2018-10-18 01:01:21 +00:00
const result = await store.getVerified(number);
assert.strictEqual(result, store.VerifiedStatus.VERIFIED);
2017-06-13 20:57:46 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('isTrustedIdentity', () => {
2018-10-18 01:01:21 +00:00
const address = new libsignal.SignalProtocolAddress(number, 1);
const identifier = address.toString();
2018-11-02 18:02:53 +00:00
describe('When invalid direction is given', () => {
it('should fail', async () => {
2018-10-18 01:01:21 +00:00
try {
await store.isTrustedIdentity(number, testKey.pubKey);
throw new Error('isTrustedIdentity should have failed');
} catch (error) {
// good
}
});
2016-05-04 07:09:44 +00:00
});
2018-11-02 18:02:53 +00:00
describe('When direction is RECEIVING', () => {
it('always returns true', async () => {
const newIdentity = libsignal.crypto.getRandomBytes(33);
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, testKey.pubKey);
const trusted = await store.isTrustedIdentity(
identifier,
newIdentity,
store.Direction.RECEIVING
);
if (!trusted) {
throw new Error('isTrusted returned false when receiving');
}
});
});
2018-11-02 18:02:53 +00:00
describe('When direction is SENDING', () => {
describe('When there is no existing key (first use)', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await store.removeIdentityKey(number);
});
2018-11-02 18:02:53 +00:00
it('returns true', async () => {
2018-10-18 01:01:21 +00:00
const newIdentity = libsignal.crypto.getRandomBytes(33);
const trusted = await store.isTrustedIdentity(
identifier,
newIdentity,
store.Direction.SENDING
);
if (!trusted) {
throw new Error('isTrusted returned false on first use');
}
});
});
2018-11-02 18:02:53 +00:00
describe('When there is an existing key', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, testKey.pubKey);
});
2018-11-02 18:02:53 +00:00
describe('When the existing key is different', () => {
it('returns false', async () => {
2018-10-18 01:01:21 +00:00
const newIdentity = libsignal.crypto.getRandomBytes(33);
const trusted = await store.isTrustedIdentity(
identifier,
newIdentity,
store.Direction.SENDING
);
if (trusted) {
throw new Error('isTrusted returned true on untrusted key');
}
});
2016-05-04 07:30:42 +00:00
});
2018-11-02 18:02:53 +00:00
describe('When the existing key matches the new key', () => {
2018-10-18 01:01:21 +00:00
const newIdentity = libsignal.crypto.getRandomBytes(33);
2018-11-02 18:02:53 +00:00
before(async () => {
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, newIdentity);
});
2018-11-02 18:02:53 +00:00
it('returns false if keys match but we just received this new identiy', async () => {
2018-10-18 01:01:21 +00:00
const trusted = await store.isTrustedIdentity(
identifier,
newIdentity,
store.Direction.SENDING
);
if (trusted) {
throw new Error('isTrusted returned true on untrusted key');
}
2018-04-27 21:25:04 +00:00
});
2018-11-02 18:02:53 +00:00
it('returns true if we have already approved identity', async () => {
2018-10-18 01:01:21 +00:00
await store.saveIdentity(identifier, newIdentity, true);
const trusted = await store.isTrustedIdentity(
identifier,
newIdentity,
store.Direction.SENDING
);
if (!trusted) {
throw new Error('isTrusted returned false on an approved key');
}
});
});
});
});
});
2018-11-02 18:02:53 +00:00
describe('storePreKey', () => {
it('stores prekeys', async () => {
2018-10-18 01:01:21 +00:00
await store.storePreKey(1, testKey);
const key = await store.loadPreKey(1);
assertEqualArrayBuffers(key.pubKey, testKey.pubKey);
assertEqualArrayBuffers(key.privKey, testKey.privKey);
2016-05-04 07:30:42 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('removePreKey', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await store.storePreKey(2, testKey);
});
2018-11-02 18:02:53 +00:00
it('deletes prekeys', async () => {
2018-10-18 01:01:21 +00:00
await store.removePreKey(2, testKey);
const key = await store.loadPreKey(2);
assert.isUndefined(key);
});
});
2018-11-02 18:02:53 +00:00
describe('storeSignedPreKey', () => {
it('stores signed prekeys', async () => {
2018-10-18 01:01:21 +00:00
await store.storeSignedPreKey(3, testKey);
const key = await store.loadSignedPreKey(3);
assertEqualArrayBuffers(key.pubKey, testKey.pubKey);
assertEqualArrayBuffers(key.privKey, testKey.privKey);
});
});
2018-11-02 18:02:53 +00:00
describe('removeSignedPreKey', () => {
before(async () => {
2018-10-18 01:01:21 +00:00
await store.storeSignedPreKey(4, testKey);
});
2018-11-02 18:02:53 +00:00
it('deletes signed prekeys', async () => {
2018-10-18 01:01:21 +00:00
await store.removeSignedPreKey(4, testKey);
const key = await store.loadSignedPreKey(4);
assert.isUndefined(key);
});
});
2018-11-02 18:02:53 +00:00
describe('storeSession', () => {
it('stores sessions', async () => {
2018-10-18 01:01:21 +00:00
const testRecord = 'an opaque string';
2018-11-02 18:02:53 +00:00
await store.storeSession(`${number}.1`, testRecord);
const record = await store.loadSession(`${number}.1`);
2018-10-18 01:01:21 +00:00
assert.deepEqual(record, testRecord);
2016-05-04 07:30:42 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('removeAllSessions', () => {
it('removes all sessions for a number', async () => {
2018-10-18 01:01:21 +00:00
const testRecord = 'an opaque string';
2018-11-02 18:02:53 +00:00
const devices = [1, 2, 3].map(deviceId => {
2018-10-18 01:01:21 +00:00
return [number, deviceId].join('.');
});
2018-10-18 01:01:21 +00:00
await Promise.all(
2018-11-02 18:02:53 +00:00
devices.map(async encodedNumber => {
2018-10-18 01:01:21 +00:00
await store.storeSession(encodedNumber, testRecord + encodedNumber);
2018-04-27 21:25:04 +00:00
})
2018-10-18 01:01:21 +00:00
);
await store.removeAllSessions(number);
const records = await Promise.all(
devices.map(store.loadSession.bind(store))
);
2018-11-02 18:02:53 +00:00
for (let i = 0, max = records.length; i < max; i += 1) {
2018-10-18 01:01:21 +00:00
assert.isUndefined(records[i]);
}
});
});
2018-11-02 18:02:53 +00:00
describe('clearSessionStore', () => {
it('clears the session store', async () => {
2018-10-18 01:01:21 +00:00
const testRecord = 'an opaque string';
2018-11-02 18:02:53 +00:00
await store.storeSession(`${number}.1`, testRecord);
2018-10-18 01:01:21 +00:00
await store.clearSessionStore();
2018-11-02 18:02:53 +00:00
const record = await store.loadSession(`${number}.1`);
2018-10-18 01:01:21 +00:00
assert.isUndefined(record);
2016-05-04 07:30:42 +00:00
});
});
2018-11-02 18:02:53 +00:00
describe('getDeviceIds', () => {
it('returns deviceIds for a number', async () => {
2018-10-18 01:01:21 +00:00
const testRecord = 'an opaque string';
const devices = [1, 2, 3, 10].map(deviceId => {
2018-10-18 01:01:21 +00:00
return [number, deviceId].join('.');
});
2018-10-18 01:01:21 +00:00
await Promise.all(
2018-11-02 18:02:53 +00:00
devices.map(async encodedNumber => {
2018-10-18 01:01:21 +00:00
await store.storeSession(encodedNumber, testRecord + encodedNumber);
2018-04-27 21:25:04 +00:00
})
2018-10-18 01:01:21 +00:00
);
const deviceIds = await store.getDeviceIds(number);
assert.sameMembers(deviceIds, [1, 2, 3, 10]);
});
2018-11-02 18:02:53 +00:00
it('returns empty array for a number with no device ids', async () => {
2018-10-18 01:01:21 +00:00
const deviceIds = await store.getDeviceIds('foo');
assert.sameMembers(deviceIds, []);
});
});
2018-11-02 18:02:53 +00:00
describe('Not yet processed messages', () => {
beforeEach(async () => {
2018-10-18 01:01:21 +00:00
await store.removeAllUnprocessed();
const items = await store.getAllUnprocessed();
assert.strictEqual(items.length, 0);
});
it('adds three and gets them back', async () => {
2018-10-18 01:01:21 +00:00
await Promise.all([
store.addUnprocessed({ id: 2, envelope: 'second', timestamp: 2 }),
store.addUnprocessed({ id: 3, envelope: 'third', timestamp: 3 }),
store.addUnprocessed({ id: 1, envelope: 'first', timestamp: 1 }),
2018-10-18 01:01:21 +00:00
]);
2018-10-18 01:01:21 +00:00
const items = await store.getAllUnprocessed();
assert.strictEqual(items.length, 3);
// they are in the proper order because the collection comparator is 'timestamp'
assert.strictEqual(items[0].envelope, 'first');
assert.strictEqual(items[1].envelope, 'second');
assert.strictEqual(items[2].envelope, 'third');
});
2018-11-02 18:02:53 +00:00
it('saveUnprocessed successfully updates item', async () => {
2018-10-18 01:01:21 +00:00
const id = 1;
await store.addUnprocessed({ id, envelope: 'first', timestamp: 1 });
await store.updateUnprocessedWithData(id, { decrypted: 'updated' });
2018-10-18 01:01:21 +00:00
const items = await store.getAllUnprocessed();
assert.strictEqual(items.length, 1);
assert.strictEqual(items[0].decrypted, 'updated');
2018-10-18 01:01:21 +00:00
assert.strictEqual(items[0].timestamp, 1);
});
2018-11-02 18:02:53 +00:00
it('removeUnprocessed successfully deletes item', async () => {
2018-10-18 01:01:21 +00:00
const id = 1;
await store.addUnprocessed({ id, envelope: 'first', timestamp: 1 });
2018-10-18 01:01:21 +00:00
await store.removeUnprocessed(id);
const items = await store.getAllUnprocessed();
assert.strictEqual(items.length, 0);
});
});
});