mirror of
https://github.com/element-hq/element-web.git
synced 2025-12-27 23:11:21 +00:00
Some checks failed
Build / Build on ${{ matrix.image }} (macos-14, ${{ github.event_name == 'push' && github.ref_name == 'develop' }}, ${{ github.event_name == 'pull_request' }}) (push) Has been cancelled
Build / Build on ${{ matrix.image }} (ubuntu-24.04, ${{ github.event_name == 'push' && github.ref_name == 'develop' }}, ${{ github.event_name == 'pull_request' }}) (push) Has been cancelled
Build / Build on ${{ matrix.image }} (windows-2022, ${{ github.event_name == 'push' && github.ref_name == 'develop' }}, ${{ github.event_name == 'pull_request' }}) (push) Has been cancelled
Build and Deploy develop / Build & Deploy develop.element.io (push) Has been cancelled
Deploy documentation / GitHub Pages (push) Has been cancelled
Localazy Upload / upload (push) Has been cancelled
Shared Component Visual Tests / Run Visual Tests (push) Has been cancelled
Static Analysis / Typescript Syntax Check (push) Has been cancelled
Static Analysis / i18n Check (push) Has been cancelled
Static Analysis / Rethemendex Check (push) Has been cancelled
Static Analysis / ESLint (push) Has been cancelled
Static Analysis / Style Lint (push) Has been cancelled
Static Analysis / Workflow Lint (push) Has been cancelled
Static Analysis / Analyse Dead Code (push) Has been cancelled
Deploy documentation / deploy (push) Has been cancelled
Update Jitsi / update (push) Has been cancelled
Localazy Download / download (push) Has been cancelled
* show correct toast when cross-signing keys missing If cross-signing keys are missing both locally and in 4S, show a new toast saying that identity needs resetting, rather than saying that the device needs to be verified. * refactor: make DeviceListener in charge of device state - move enum from SetupEncryptionToast to DeviceListener - DeviceListener has public method to get device state - DeviceListener emits events to update device state * reset key backup when needed in RecoveryPanelOutOfSync brings RecoveryPanelOutOfSync in line with SetupEncryptionToast behaviour * update strings to agree with designs from Figma * use DeviceListener to determine EncryptionUserSettingsTab display rather than using its own logic * prompt to reset identity in Encryption Settings when needed * fix type * calculate device state even if we aren't going to show a toast * update snapshot * make logs more accurate * add tests * make the bot use a different access token/device * only log in a new session when requested * Mark properties as read-only Co-authored-by: Skye Elliot <actuallyori@gmail.com> * remove some duplicate strings * make accessToken optional instead of using empty string * switch from enum to string union as per review * apply other changes from review * handle errors in accessSecretStorage * remove incorrect testid --------- Co-authored-by: Skye Elliot <actuallyori@gmail.com>
136 lines
5.2 KiB
TypeScript
136 lines
5.2 KiB
TypeScript
/*
|
|
* Copyright 2025 New Vector Ltd.
|
|
*
|
|
* SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only OR LicenseRef-Element-Commercial
|
|
* Please see LICENSE files in the repository root for full details.
|
|
*/
|
|
|
|
import React from "react";
|
|
import { render, screen } from "jest-matrix-react";
|
|
import userEvent from "@testing-library/user-event";
|
|
import { mocked } from "jest-mock";
|
|
import { type MatrixClient } from "matrix-js-sdk/src/matrix";
|
|
|
|
import { RecoveryPanelOutOfSync } from "../../../../../../src/components/views/settings/encryption/RecoveryPanelOutOfSync";
|
|
import { AccessCancelledError, accessSecretStorage } from "../../../../../../src/SecurityManager";
|
|
import DeviceListener from "../../../../../../src/DeviceListener";
|
|
import { createTestClient, withClientContextRenderOptions } from "../../../../../test-utils";
|
|
|
|
jest.mock("../../../../../../src/SecurityManager", () => {
|
|
const originalModule = jest.requireActual("../../../../../../src/SecurityManager");
|
|
|
|
return {
|
|
...originalModule,
|
|
accessSecretStorage: jest.fn(),
|
|
};
|
|
});
|
|
|
|
describe("<RecoveyPanelOutOfSync />", () => {
|
|
let matrixClient: MatrixClient;
|
|
|
|
function renderComponent(
|
|
onFinish = jest.fn(),
|
|
onForgotRecoveryKey = jest.fn(),
|
|
onAccessSecretStorageFailed = jest.fn(),
|
|
) {
|
|
matrixClient = createTestClient();
|
|
return render(
|
|
<RecoveryPanelOutOfSync
|
|
onFinish={onFinish}
|
|
onForgotRecoveryKey={onForgotRecoveryKey}
|
|
onAccessSecretStorageFailed={onAccessSecretStorageFailed}
|
|
/>,
|
|
withClientContextRenderOptions(matrixClient),
|
|
);
|
|
}
|
|
|
|
afterEach(() => {
|
|
jest.clearAllMocks();
|
|
});
|
|
|
|
it("should render", () => {
|
|
const { asFragment } = renderComponent();
|
|
expect(asFragment()).toMatchSnapshot();
|
|
});
|
|
|
|
it("should call onForgotRecoveryKey when the 'Forgot recovery key?' is clicked", async () => {
|
|
const user = userEvent.setup();
|
|
|
|
const onForgotRecoveryKey = jest.fn();
|
|
renderComponent(jest.fn(), onForgotRecoveryKey);
|
|
|
|
await user.click(screen.getByRole("button", { name: "Forgot recovery key?" }));
|
|
expect(onForgotRecoveryKey).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should access to 4S and call onFinish when 'Enter recovery key' is clicked", async () => {
|
|
jest.spyOn(DeviceListener.sharedInstance(), "keyStorageOutOfSyncNeedsBackupReset").mockResolvedValue(false);
|
|
|
|
const user = userEvent.setup();
|
|
mocked(accessSecretStorage).mockImplementation(async (func = async (): Promise<void> => {}) => {
|
|
return await func();
|
|
});
|
|
|
|
const onFinish = jest.fn();
|
|
renderComponent(onFinish);
|
|
|
|
await user.click(screen.getByRole("button", { name: "Enter recovery key" }));
|
|
expect(accessSecretStorage).toHaveBeenCalled();
|
|
expect(onFinish).toHaveBeenCalled();
|
|
|
|
expect(matrixClient.getCrypto()!.resetKeyBackup).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("should reset key backup if needed", async () => {
|
|
jest.spyOn(DeviceListener.sharedInstance(), "keyStorageOutOfSyncNeedsBackupReset").mockResolvedValue(true);
|
|
|
|
const user = userEvent.setup();
|
|
mocked(accessSecretStorage).mockImplementation(async (func = async (): Promise<void> => {}) => {
|
|
return await func();
|
|
});
|
|
|
|
const onFinish = jest.fn();
|
|
renderComponent(onFinish);
|
|
|
|
await user.click(screen.getByRole("button", { name: "Enter recovery key" }));
|
|
expect(accessSecretStorage).toHaveBeenCalled();
|
|
expect(onFinish).toHaveBeenCalled();
|
|
|
|
expect(matrixClient.getCrypto()!.resetKeyBackup).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should call onAccessSecretStorageFailed on failure", async () => {
|
|
jest.spyOn(DeviceListener.sharedInstance(), "keyStorageOutOfSyncNeedsBackupReset").mockResolvedValue(true);
|
|
|
|
const user = userEvent.setup();
|
|
mocked(accessSecretStorage).mockImplementation(async (func = async (): Promise<void> => {}) => {
|
|
throw new Error("Error");
|
|
});
|
|
|
|
const onAccessSecretStorageFailed = jest.fn();
|
|
renderComponent(jest.fn(), jest.fn(), onAccessSecretStorageFailed);
|
|
|
|
await user.click(screen.getByRole("button", { name: "Enter recovery key" }));
|
|
expect(accessSecretStorage).toHaveBeenCalled();
|
|
expect(onAccessSecretStorageFailed).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should not call onAccessSecretStorageFailed when cancelled", async () => {
|
|
jest.spyOn(DeviceListener.sharedInstance(), "keyStorageOutOfSyncNeedsBackupReset").mockResolvedValue(true);
|
|
|
|
const user = userEvent.setup();
|
|
mocked(accessSecretStorage).mockImplementation(async (func = async (): Promise<void> => {}) => {
|
|
throw new AccessCancelledError();
|
|
});
|
|
|
|
const onFinish = jest.fn();
|
|
const onAccessSecretStorageFailed = jest.fn();
|
|
renderComponent(onFinish, jest.fn(), onAccessSecretStorageFailed);
|
|
|
|
await user.click(screen.getByRole("button", { name: "Enter recovery key" }));
|
|
expect(accessSecretStorage).toHaveBeenCalled();
|
|
expect(onFinish).not.toHaveBeenCalled();
|
|
expect(onAccessSecretStorageFailed).not.toHaveBeenCalled();
|
|
});
|
|
});
|