signal-desktop/ts/test-electron/textsecure/AccountManager_test.ts

614 lines
16 KiB
TypeScript
Raw Normal View History

2023-01-03 19:55:46 +00:00
// Copyright 2017 Signal Messenger, LLC
2020-10-30 20:34:04 +00:00
// SPDX-License-Identifier: AGPL-3.0-only
import { assert } from 'chai';
import { range } from 'lodash';
import * as sinon from 'sinon';
import { getRandomBytes } from '../../Crypto';
import AccountManager from '../../textsecure/AccountManager';
import type {
KyberPreKeyType,
OuterSignedPrekeyType,
PreKeyType,
} from '../../textsecure/Types.d';
import { ServiceIdKind, generateAci, generatePni } from '../../types/ServiceId';
import { DAY } from '../../util/durations';
/* eslint-disable @typescript-eslint/no-explicit-any */
2018-07-21 21:51:20 +00:00
describe('AccountManager', () => {
let sandbox: sinon.SinonSandbox;
let accountManager: AccountManager;
const ourAci = generateAci();
const ourPni = generatePni();
const identityKey = window.Signal.Curve.generateKeyPair();
const pubKey = getRandomBytes(33);
const privKey = getRandomBytes(32);
2018-07-21 21:51:20 +00:00
beforeEach(() => {
sandbox = sinon.createSandbox();
const server: any = {};
accountManager = new AccountManager(server);
const { storage } = window.textsecure;
sandbox.stub(storage.protocol, 'getIdentityKeyPair').returns(identityKey);
const { user } = storage;
sandbox.stub(user, 'getAci').returns(ourAci);
sandbox.stub(user, 'getPni').returns(ourPni);
sandbox.stub(user, 'getServiceId').returns(ourAci);
sandbox.stub(user, 'getCheckedAci').returns(ourAci);
sandbox.stub(user, 'getCheckedPni').returns(ourPni);
sandbox.stub(user, 'getCheckedServiceId').returns(ourAci);
});
afterEach(() => {
sandbox.restore();
});
describe('encrypted device name', () => {
it('roundtrips', async () => {
const deviceName = 'v2.5.0 on Ubunto 20.04';
const encrypted = accountManager.encryptDeviceName(
deviceName,
identityKey
);
if (!encrypted) {
throw new Error('failed to encrypt!');
}
assert.strictEqual(typeof encrypted, 'string');
const decrypted = await accountManager.decryptDeviceName(encrypted);
assert.strictEqual(decrypted, deviceName);
});
it('handles falsey deviceName', () => {
const encrypted = accountManager.encryptDeviceName('', identityKey);
2023-08-29 00:41:32 +00:00
assert.strictEqual(encrypted, undefined);
});
});
describe('#_cleanSignedPreKeys', () => {
let originalLoadSignedPreKeys: any;
let originalRemoveSignedPreKey: any;
let signedPreKeys: Array<OuterSignedPrekeyType>;
beforeEach(async () => {
originalLoadSignedPreKeys =
window.textsecure.storage.protocol.loadSignedPreKeys;
originalRemoveSignedPreKey =
window.textsecure.storage.protocol.removeSignedPreKeys;
window.textsecure.storage.protocol.loadSignedPreKeys = () =>
signedPreKeys;
// removeSignedPreKeys is updated per-test, below
});
2018-07-21 21:51:20 +00:00
afterEach(() => {
2021-11-11 22:43:05 +00:00
window.textsecure.storage.protocol.loadSignedPreKeys =
originalLoadSignedPreKeys;
window.textsecure.storage.protocol.removeSignedPreKeys =
2021-11-11 22:43:05 +00:00
originalRemoveSignedPreKey;
});
it('keeps no keys if five or less, even if over a month old', () => {
const now = Date.now();
2018-05-02 16:51:22 +00:00
signedPreKeys = [
{
keyId: 1,
created_at: now - DAY * 32,
2018-05-02 16:51:22 +00:00
confirmed: true,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
{
keyId: 2,
created_at: now - DAY * 34,
2018-05-02 16:51:22 +00:00
confirmed: true,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
{
keyId: 3,
created_at: now - DAY * 38,
2018-05-02 16:51:22 +00:00
confirmed: true,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
{
keyId: 4,
created_at: now - DAY * 39,
confirmed: true,
pubKey,
privKey,
},
{
keyId: 5,
created_at: now - DAY * 40,
confirmed: false,
pubKey,
privKey,
},
2018-05-02 16:51:22 +00:00
];
// should be no calls to store.removeSignedPreKey, would cause crash
return accountManager._cleanSignedPreKeys(ServiceIdKind.ACI);
});
it('eliminates oldest keys, even if recent key is unconfirmed', async () => {
const now = Date.now();
2018-05-02 16:51:22 +00:00
signedPreKeys = [
{
keyId: 1,
created_at: now - DAY * 32,
2018-05-02 16:51:22 +00:00
confirmed: true,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
{
keyId: 2,
created_at: now - DAY * 31,
confirmed: false,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
{
keyId: 3,
created_at: now - DAY * 24,
2018-05-02 16:51:22 +00:00
confirmed: true,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
{
// Oldest, should be dropped
2018-05-02 16:51:22 +00:00
keyId: 4,
created_at: now - DAY * 38,
2018-05-02 16:51:22 +00:00
confirmed: true,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
{
keyId: 5,
created_at: now - DAY,
confirmed: true,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
{
keyId: 6,
created_at: now - DAY * 5,
confirmed: true,
pubKey,
privKey,
2018-05-02 16:51:22 +00:00
},
];
let removedKeys: Array<number> = [];
window.textsecure.storage.protocol.removeSignedPreKeys = async (
_,
keyIds
) => {
removedKeys = removedKeys.concat(keyIds);
};
await accountManager._cleanSignedPreKeys(ServiceIdKind.ACI);
assert.deepEqual(removedKeys, [4]);
});
});
describe('#_cleanLastResortKeys', () => {
let originalLoadKyberPreKeys: any;
let originalRemoveKyberPreKey: any;
let kyberPreKeys: Array<KyberPreKeyType>;
beforeEach(async () => {
originalLoadKyberPreKeys =
window.textsecure.storage.protocol.loadKyberPreKeys;
originalRemoveKyberPreKey =
window.textsecure.storage.protocol.removeKyberPreKeys;
window.textsecure.storage.protocol.loadKyberPreKeys = () => kyberPreKeys;
// removeKyberPreKeys is updated per-test, below
});
afterEach(() => {
window.textsecure.storage.protocol.loadKyberPreKeys =
originalLoadKyberPreKeys;
window.textsecure.storage.protocol.removeKyberPreKeys =
originalRemoveKyberPreKey;
});
it('keeps five keys even if over a month old', () => {
const now = Date.now();
kyberPreKeys = [
{
id: `${ourAci}:1`,
createdAt: now - DAY * 32,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: true,
keyId: 1,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:2`,
createdAt: now - DAY * 34,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: true,
keyId: 2,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:3`,
createdAt: now - DAY * 38,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: true,
keyId: 3,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:4`,
createdAt: now - DAY * 39,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: false,
keyId: 4,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:5`,
createdAt: now - DAY * 40,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: false,
keyId: 5,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
];
// should be no calls to store.removeKyberPreKey, would cause crash
return accountManager._cleanLastResortKeys(ServiceIdKind.ACI);
});
it('eliminates oldest keys, even if recent key is unconfirmed', async () => {
const now = Date.now();
kyberPreKeys = [
{
id: `${ourAci}:1`,
createdAt: now - DAY * 32,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: true,
keyId: 1,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:2`,
createdAt: now - DAY * 31,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: false,
keyId: 2,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:3`,
createdAt: now - DAY * 24,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: true,
keyId: 3,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
// Oldest, should be dropped
id: `${ourAci}:4`,
createdAt: now - DAY * 38,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: true,
keyId: 4,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:5`,
createdAt: now - DAY * 5,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: true,
keyId: 5,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:6`,
createdAt: now - DAY * 5,
data: getRandomBytes(32),
isLastResort: true,
isConfirmed: true,
keyId: 6,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
];
let removedKeys: Array<number> = [];
window.textsecure.storage.protocol.removeKyberPreKeys = async (
_,
keyIds
) => {
removedKeys = removedKeys.concat(keyIds);
};
await accountManager._cleanLastResortKeys(ServiceIdKind.ACI);
assert.deepEqual(removedKeys, [4]);
});
});
describe('#_cleanPreKeys', () => {
let originalLoadPreKeys: any;
let originalRemovePreKeys: any;
let preKeys: Array<PreKeyType>;
beforeEach(async () => {
originalLoadPreKeys = window.textsecure.storage.protocol.loadPreKeys;
originalRemovePreKeys = window.textsecure.storage.protocol.removePreKeys;
window.textsecure.storage.protocol.loadPreKeys = () => preKeys;
// removePreKeys is updated per-test, below
});
afterEach(() => {
window.textsecure.storage.protocol.loadPreKeys = originalLoadPreKeys;
window.textsecure.storage.protocol.removePreKeys = originalRemovePreKeys;
});
it('keeps five keys even if over 90 days old, but all latest batch', () => {
const now = Date.now();
preKeys = [
2018-05-02 16:51:22 +00:00
{
id: `${ourAci}:1`,
createdAt: now - DAY * 92,
2018-05-02 16:51:22 +00:00
keyId: 1,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
privateKey: privKey,
publicKey: pubKey,
2018-05-02 16:51:22 +00:00
},
{
id: `${ourAci}:2`,
createdAt: now - DAY * 93,
2018-05-02 16:51:22 +00:00
keyId: 2,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
privateKey: privKey,
publicKey: pubKey,
2018-05-02 16:51:22 +00:00
},
{
id: `${ourAci}:3`,
createdAt: now - DAY * 93,
2018-05-02 16:51:22 +00:00
keyId: 3,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
privateKey: privKey,
publicKey: pubKey,
2018-05-02 16:51:22 +00:00
},
{
id: `${ourAci}:4`,
createdAt: now - DAY * 93,
2018-05-02 16:51:22 +00:00
keyId: 4,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
privateKey: privKey,
publicKey: pubKey,
},
{
id: `${ourAci}:5`,
createdAt: now - DAY * 94,
keyId: 5,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
privateKey: privKey,
publicKey: pubKey,
2018-05-02 16:51:22 +00:00
},
];
// should be no calls to store.removeKyberPreKey, would cause crash
return accountManager._cleanPreKeys(ServiceIdKind.ACI);
});
it('eliminates keys not in the 200 newest, over 90 days old', async () => {
const now = Date.now();
preKeys = [
// The latest batch
...range(0, 100).map(
(id): PreKeyType => ({
id: `${ourAci}:${id}`,
createdAt: now - DAY,
keyId: 1,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
privateKey: privKey,
publicKey: pubKey,
})
),
// Second-oldest batch, won't be dropped
...range(100, 200).map(
(id): PreKeyType => ({
id: `${ourAci}:${id}`,
createdAt: now - DAY * 40,
keyId: 1,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
privateKey: privKey,
publicKey: pubKey,
})
),
// Oldest batch, will be dropped
{
id: `${ourAci}:6`,
createdAt: now - DAY * 92,
keyId: 6,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
privateKey: privKey,
publicKey: pubKey,
},
];
let removedKeys: Array<number> = [];
window.textsecure.storage.protocol.removePreKeys = async (_, keyIds) => {
removedKeys = removedKeys.concat(keyIds);
};
await accountManager._cleanPreKeys(ServiceIdKind.ACI);
assert.deepEqual(removedKeys, [6]);
});
});
describe('#_cleanKyberPreKeys', () => {
let originalLoadKyberPreKeys: any;
let originalRemoveKyberPreKeys: any;
let kyberPreKeys: Array<KyberPreKeyType>;
beforeEach(async () => {
originalLoadKyberPreKeys =
window.textsecure.storage.protocol.loadKyberPreKeys;
originalRemoveKyberPreKeys =
window.textsecure.storage.protocol.removeKyberPreKeys;
window.textsecure.storage.protocol.loadKyberPreKeys = () => kyberPreKeys;
// removeKyberPreKeys is updated per-test, below
});
afterEach(() => {
window.textsecure.storage.protocol.loadKyberPreKeys =
originalLoadKyberPreKeys;
window.textsecure.storage.protocol.removeKyberPreKeys =
originalRemoveKyberPreKeys;
});
it('keeps five keys even if over 90 days old', () => {
const now = Date.now();
kyberPreKeys = [
{
id: `${ourAci}:1`,
createdAt: now - DAY * 93,
data: getRandomBytes(32),
isConfirmed: false,
isLastResort: false,
keyId: 1,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:2`,
createdAt: now - DAY * 93,
data: getRandomBytes(32),
isConfirmed: false,
isLastResort: false,
keyId: 2,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:3`,
createdAt: now - DAY * 93,
data: getRandomBytes(32),
isConfirmed: false,
isLastResort: false,
keyId: 3,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:4`,
createdAt: now - DAY * 93,
data: getRandomBytes(32),
isConfirmed: false,
isLastResort: false,
keyId: 4,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
{
id: `${ourAci}:5`,
createdAt: now - DAY * 93,
data: getRandomBytes(32),
isConfirmed: false,
isLastResort: false,
keyId: 5,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
];
// should be no calls to store.removeKyberPreKey, would cause crash
return accountManager._cleanKyberPreKeys(ServiceIdKind.ACI);
});
it('eliminates keys not in the newest 200, over 90 days old', async () => {
const now = Date.now();
kyberPreKeys = [
// The latest batch
...range(0, 100).map(
(id): KyberPreKeyType => ({
id: `${ourAci}:${id}`,
createdAt: now - DAY,
data: getRandomBytes(32),
isConfirmed: false,
isLastResort: false,
keyId: 1,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
})
),
// Second-oldest batch, won't be dropped
...range(100, 200).map(
(id): KyberPreKeyType => ({
id: `${ourAci}:${id}`,
createdAt: now - DAY * 45,
data: getRandomBytes(32),
isConfirmed: false,
isLastResort: false,
keyId: 4,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
})
),
// Oldest batch, will be dropped
{
id: `${ourAci}:6`,
createdAt: now - DAY * 93,
data: getRandomBytes(32),
isConfirmed: false,
isLastResort: false,
keyId: 6,
2023-08-16 20:54:39 +00:00
ourServiceId: ourAci,
},
];
let removedKeys: Array<number> = [];
window.textsecure.storage.protocol.removeKyberPreKeys = async (
_,
keyIds
) => {
removedKeys = removedKeys.concat(keyIds);
};
await accountManager._cleanKyberPreKeys(ServiceIdKind.ACI);
assert.deepEqual(removedKeys, [6]);
});
});
});