mirror of
https://github.com/element-hq/element-web.git
synced 2025-12-28 07:14:20 +00:00
Some checks failed
Build / Build on ${{ matrix.image }} (macos-14, ${{ github.event_name == 'push' && github.ref_name == 'develop' }}, ${{ github.event_name == 'pull_request' }}) (push) Has been cancelled
Build / Build on ${{ matrix.image }} (ubuntu-24.04, ${{ github.event_name == 'push' && github.ref_name == 'develop' }}, ${{ github.event_name == 'pull_request' }}) (push) Has been cancelled
Build / Build on ${{ matrix.image }} (windows-2022, ${{ github.event_name == 'push' && github.ref_name == 'develop' }}, ${{ github.event_name == 'pull_request' }}) (push) Has been cancelled
Build and Deploy develop / Build & Deploy develop.element.io (push) Has been cancelled
Deploy documentation / GitHub Pages (push) Has been cancelled
Localazy Upload / upload (push) Has been cancelled
Shared Component Visual Tests / Run Visual Tests (push) Has been cancelled
Static Analysis / Typescript Syntax Check (push) Has been cancelled
Static Analysis / i18n Check (push) Has been cancelled
Static Analysis / Rethemendex Check (push) Has been cancelled
Static Analysis / ESLint (push) Has been cancelled
Static Analysis / Style Lint (push) Has been cancelled
Static Analysis / Workflow Lint (push) Has been cancelled
Static Analysis / Analyse Dead Code (push) Has been cancelled
Deploy documentation / deploy (push) Has been cancelled
Update Jitsi / update (push) Has been cancelled
Localazy Download / download (push) Has been cancelled
* show correct toast when cross-signing keys missing If cross-signing keys are missing both locally and in 4S, show a new toast saying that identity needs resetting, rather than saying that the device needs to be verified. * refactor: make DeviceListener in charge of device state - move enum from SetupEncryptionToast to DeviceListener - DeviceListener has public method to get device state - DeviceListener emits events to update device state * reset key backup when needed in RecoveryPanelOutOfSync brings RecoveryPanelOutOfSync in line with SetupEncryptionToast behaviour * update strings to agree with designs from Figma * use DeviceListener to determine EncryptionUserSettingsTab display rather than using its own logic * prompt to reset identity in Encryption Settings when needed * fix type * calculate device state even if we aren't going to show a toast * update snapshot * make logs more accurate * add tests * make the bot use a different access token/device * only log in a new session when requested * Mark properties as read-only Co-authored-by: Skye Elliot <actuallyori@gmail.com> * remove some duplicate strings * make accessToken optional instead of using empty string * switch from enum to string union as per review * apply other changes from review * handle errors in accessSecretStorage * remove incorrect testid --------- Co-authored-by: Skye Elliot <actuallyori@gmail.com>
217 lines
9.2 KiB
TypeScript
217 lines
9.2 KiB
TypeScript
/*
|
||
* Copyright 2024 New Vector Ltd.
|
||
*
|
||
* SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
|
||
* Please see LICENSE files in the repository root for full details.
|
||
*/
|
||
|
||
import { mocked } from "jest-mock";
|
||
import React from "react";
|
||
import { act, render, screen } from "jest-matrix-react";
|
||
import { type MatrixClient } from "matrix-js-sdk/src/matrix";
|
||
import { waitFor } from "@testing-library/dom";
|
||
import userEvent from "@testing-library/user-event";
|
||
import { CryptoEvent } from "matrix-js-sdk/src/crypto-api";
|
||
|
||
import {
|
||
EncryptionUserSettingsTab,
|
||
type State,
|
||
} from "../../../../../../../src/components/views/settings/tabs/user/EncryptionUserSettingsTab";
|
||
import { createTestClient, withClientContextRenderOptions } from "../../../../../../test-utils";
|
||
import Modal from "../../../../../../../src/Modal";
|
||
import DeviceListener from "../../../../../../../src/DeviceListener";
|
||
|
||
describe("<EncryptionUserSettingsTab />", () => {
|
||
let matrixClient: MatrixClient;
|
||
|
||
beforeEach(() => {
|
||
matrixClient = createTestClient();
|
||
jest.spyOn(matrixClient.getCrypto()!, "isCrossSigningReady").mockResolvedValue(true);
|
||
// Recovery key is available
|
||
jest.spyOn(matrixClient.secretStorage, "getDefaultKeyId").mockResolvedValue("default key");
|
||
// Secrets are cached
|
||
jest.spyOn(matrixClient.getCrypto()!, "getCrossSigningStatus").mockResolvedValue({
|
||
privateKeysInSecretStorage: true,
|
||
publicKeysOnDevice: true,
|
||
privateKeysCachedLocally: {
|
||
masterKey: true,
|
||
selfSigningKey: true,
|
||
userSigningKey: true,
|
||
},
|
||
});
|
||
|
||
jest.spyOn(DeviceListener.sharedInstance(), "getDeviceState").mockReturnValue("ok");
|
||
});
|
||
|
||
afterEach(() => {
|
||
jest.resetAllMocks();
|
||
});
|
||
|
||
function renderComponent(props: { initialState?: State } = {}) {
|
||
return render(<EncryptionUserSettingsTab {...props} />, withClientContextRenderOptions(matrixClient));
|
||
}
|
||
|
||
it("should display a verify button when the encryption is not set up", async () => {
|
||
const user = userEvent.setup();
|
||
mocked(DeviceListener.sharedInstance().getDeviceState).mockReturnValue("verify_this_session");
|
||
|
||
const { asFragment } = renderComponent();
|
||
await waitFor(() =>
|
||
expect(
|
||
screen.getByText("You need to verify this device in order to view your encryption settings."),
|
||
).toBeInTheDocument(),
|
||
);
|
||
expect(asFragment()).toMatchSnapshot();
|
||
|
||
const spy = jest.spyOn(Modal, "createDialog").mockReturnValue({ finished: new Promise(() => {}) } as any);
|
||
await user.click(screen.getByText("Verify this device"));
|
||
expect(spy).toHaveBeenCalled();
|
||
});
|
||
|
||
it("should display the recovery panel when key storage is enabled", async () => {
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("1");
|
||
renderComponent();
|
||
await waitFor(() => expect(screen.getByText("Recovery")).toBeInTheDocument());
|
||
});
|
||
|
||
it("should not display the recovery panel when key storage is not enabled", async () => {
|
||
jest.spyOn(matrixClient.getCrypto()!, "getKeyBackupInfo").mockResolvedValue(null);
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue(null);
|
||
renderComponent();
|
||
await expect(screen.queryByText("Recovery")).not.toBeInTheDocument();
|
||
});
|
||
|
||
it("should display the recovery out of sync panel when secrets are not cached", async () => {
|
||
mocked(DeviceListener.sharedInstance().getDeviceState).mockReturnValue("key_storage_out_of_sync");
|
||
|
||
const user = userEvent.setup();
|
||
const { asFragment } = renderComponent();
|
||
|
||
await waitFor(() => screen.getByRole("button", { name: "Enter recovery key" }));
|
||
expect(asFragment()).toMatchSnapshot();
|
||
|
||
await user.click(screen.getByRole("button", { name: "Forgot recovery key?" }));
|
||
expect(
|
||
screen.getByRole("heading", { name: "Forgot your recovery key? You’ll need to reset your identity." }),
|
||
).toBeVisible();
|
||
});
|
||
|
||
it("should display the change recovery key panel when the user clicks on the change recovery button", async () => {
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("1");
|
||
const user = userEvent.setup();
|
||
|
||
const { asFragment } = renderComponent();
|
||
await waitFor(() => {
|
||
const button = screen.getByRole("button", { name: "Change recovery key" });
|
||
expect(button).toBeInTheDocument();
|
||
user.click(button);
|
||
});
|
||
await waitFor(() => expect(screen.getByText("Change recovery key")).toBeInTheDocument());
|
||
expect(asFragment()).toMatchSnapshot();
|
||
});
|
||
|
||
it("should display the set up recovery key when the user clicks on the set up recovery key button", async () => {
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("1");
|
||
jest.spyOn(matrixClient.secretStorage, "getDefaultKeyId").mockResolvedValue(null);
|
||
const user = userEvent.setup();
|
||
|
||
const { asFragment } = renderComponent();
|
||
await waitFor(() => {
|
||
const button = screen.getByRole("button", { name: "Set up recovery" });
|
||
expect(button).toBeInTheDocument();
|
||
user.click(button);
|
||
});
|
||
await waitFor(() => expect(screen.getByText("Set up recovery")).toBeInTheDocument());
|
||
expect(asFragment()).toMatchSnapshot();
|
||
});
|
||
|
||
it("should display the reset identity panel when the user clicks on the reset cryptographic identity panel", async () => {
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("1");
|
||
|
||
const user = userEvent.setup();
|
||
|
||
const { asFragment } = renderComponent();
|
||
await waitFor(() => {
|
||
const button = screen.getByRole("button", { name: "Reset cryptographic identity" });
|
||
expect(button).toBeInTheDocument();
|
||
user.click(button);
|
||
});
|
||
await waitFor(() =>
|
||
expect(screen.getByText("Are you sure you want to reset your identity?")).toBeInTheDocument(),
|
||
);
|
||
expect(asFragment()).toMatchSnapshot();
|
||
});
|
||
|
||
it("should enter 'Forgot recovery' flow when initialState is set to 'reset_identity_forgot'", async () => {
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("1");
|
||
|
||
renderComponent({ initialState: "reset_identity_forgot" });
|
||
|
||
expect(
|
||
await screen.findByRole("heading", {
|
||
name: "Forgot your recovery key? You’ll need to reset your identity.",
|
||
}),
|
||
).toBeVisible();
|
||
});
|
||
|
||
it("should do 'Failed to sync' reset flow when initialState is set to 'reset_identity_sync_failed'", async () => {
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("1");
|
||
|
||
renderComponent({ initialState: "reset_identity_sync_failed" });
|
||
|
||
expect(
|
||
await screen.findByRole("heading", {
|
||
name: "Failed to sync key storage. You need to reset your identity.",
|
||
}),
|
||
).toBeVisible();
|
||
});
|
||
|
||
it("should update when key backup status event is fired", async () => {
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("1");
|
||
|
||
renderComponent();
|
||
|
||
await expect(await screen.findByRole("heading", { name: "Recovery" })).toBeVisible();
|
||
|
||
jest.spyOn(matrixClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue(null);
|
||
|
||
act(() => {
|
||
matrixClient.emit(CryptoEvent.KeyBackupStatus, false);
|
||
});
|
||
|
||
await waitFor(() => {
|
||
expect(screen.queryByRole("heading", { name: "Recovery" })).toBeNull();
|
||
});
|
||
});
|
||
|
||
it("should re-check the encryption state and displays the correct panel when the user clicks cancel the reset identity flow", async () => {
|
||
const user = userEvent.setup();
|
||
|
||
mocked(DeviceListener.sharedInstance().getDeviceState).mockReturnValue("key_storage_out_of_sync");
|
||
|
||
renderComponent({ initialState: "reset_identity_forgot" });
|
||
|
||
expect(
|
||
screen.getByRole("heading", { name: "Forgot your recovery key? You’ll need to reset your identity." }),
|
||
).toBeVisible();
|
||
|
||
await user.click(screen.getByRole("button", { name: "Back" }));
|
||
await waitFor(() =>
|
||
screen.getByText("Your key storage is out of sync. Click one of the buttons below to fix the problem."),
|
||
);
|
||
});
|
||
|
||
it("should display the identity needs reset panel when the user's identity needs resetting", async () => {
|
||
mocked(DeviceListener.sharedInstance().getDeviceState).mockReturnValue("identity_needs_reset");
|
||
|
||
const user = userEvent.setup();
|
||
const { asFragment } = renderComponent();
|
||
|
||
await waitFor(() => screen.getByRole("button", { name: "Continue with reset" }));
|
||
expect(asFragment()).toMatchSnapshot();
|
||
|
||
await user.click(screen.getByRole("button", { name: "Continue with reset" }));
|
||
expect(screen.getByRole("heading", { name: "You need to reset your identity" })).toBeVisible();
|
||
});
|
||
});
|