mirror of
https://github.com/vector-im/element-web.git
synced 2024-11-30 06:21:09 +08:00
27a43e860a
* Use React Suspense when rendering async modals Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Fix test Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Improve coverage Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Improve coverage Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Improve coverage Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Update src/Modal.tsx --------- Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
1556 lines
66 KiB
TypeScript
1556 lines
66 KiB
TypeScript
/*
|
|
Copyright 2024 New Vector Ltd.
|
|
Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
|
|
Please see LICENSE files in the repository root for full details.
|
|
*/
|
|
|
|
// fake-indexeddb needs this and the tests crash without it
|
|
// https://github.com/dumbmatter/fakeIndexedDB?tab=readme-ov-file#jsdom-often-used-with-jest
|
|
import "core-js/stable/structured-clone";
|
|
import "fake-indexeddb/auto";
|
|
import React, { ComponentProps } from "react";
|
|
import { fireEvent, render, RenderResult, screen, waitFor, within } from "jest-matrix-react";
|
|
import fetchMock from "fetch-mock-jest";
|
|
import { Mocked, mocked } from "jest-mock";
|
|
import { ClientEvent, MatrixClient, MatrixEvent, Room, SyncState } from "matrix-js-sdk/src/matrix";
|
|
import { MediaHandler } from "matrix-js-sdk/src/webrtc/mediaHandler";
|
|
import * as MatrixJs from "matrix-js-sdk/src/matrix";
|
|
import { completeAuthorizationCodeGrant } from "matrix-js-sdk/src/oidc/authorize";
|
|
import { logger } from "matrix-js-sdk/src/logger";
|
|
import { OidcError } from "matrix-js-sdk/src/oidc/error";
|
|
import { BearerTokenResponse } from "matrix-js-sdk/src/oidc/validate";
|
|
import { defer, IDeferred, sleep } from "matrix-js-sdk/src/utils";
|
|
import { CryptoEvent, UserVerificationStatus } from "matrix-js-sdk/src/crypto-api";
|
|
|
|
import MatrixChat from "../../../../src/components/structures/MatrixChat";
|
|
import * as StorageAccess from "../../../../src/utils/StorageAccess";
|
|
import defaultDispatcher from "../../../../src/dispatcher/dispatcher";
|
|
import { Action } from "../../../../src/dispatcher/actions";
|
|
import { UserTab } from "../../../../src/components/views/dialogs/UserTab";
|
|
import {
|
|
clearAllModals,
|
|
createStubMatrixRTC,
|
|
filterConsole,
|
|
flushPromises,
|
|
getMockClientWithEventEmitter,
|
|
mockClientMethodsServer,
|
|
mockClientMethodsUser,
|
|
MockClientWithEventEmitter,
|
|
mockPlatformPeg,
|
|
resetJsDomAfterEach,
|
|
unmockClientPeg,
|
|
} from "../../../test-utils";
|
|
import * as leaveRoomUtils from "../../../../src/utils/leave-behaviour";
|
|
import { OidcClientError } from "../../../../src/utils/oidc/error";
|
|
import * as voiceBroadcastUtils from "../../../../src/voice-broadcast/utils/cleanUpBroadcasts";
|
|
import LegacyCallHandler from "../../../../src/LegacyCallHandler";
|
|
import { CallStore } from "../../../../src/stores/CallStore";
|
|
import { Call } from "../../../../src/models/Call";
|
|
import { PosthogAnalytics } from "../../../../src/PosthogAnalytics";
|
|
import PlatformPeg from "../../../../src/PlatformPeg";
|
|
import EventIndexPeg from "../../../../src/indexing/EventIndexPeg";
|
|
import * as Lifecycle from "../../../../src/Lifecycle";
|
|
import { SSO_HOMESERVER_URL_KEY, SSO_ID_SERVER_URL_KEY } from "../../../../src/BasePlatform";
|
|
import SettingsStore from "../../../../src/settings/SettingsStore";
|
|
import { SettingLevel } from "../../../../src/settings/SettingLevel";
|
|
import { MatrixClientPeg } from "../../../../src/MatrixClientPeg";
|
|
import DMRoomMap from "../../../../src/utils/DMRoomMap";
|
|
import { ReleaseAnnouncementStore } from "../../../../src/stores/ReleaseAnnouncementStore";
|
|
import { DRAFT_LAST_CLEANUP_KEY } from "../../../../src/DraftCleaner";
|
|
import { UIFeature } from "../../../../src/settings/UIFeature";
|
|
import AutoDiscoveryUtils from "../../../../src/utils/AutoDiscoveryUtils";
|
|
import { ValidatedServerConfig } from "../../../../src/utils/ValidatedServerConfig";
|
|
import Modal from "../../../../src/Modal.tsx";
|
|
|
|
jest.mock("matrix-js-sdk/src/oidc/authorize", () => ({
|
|
completeAuthorizationCodeGrant: jest.fn(),
|
|
}));
|
|
|
|
// Stub out ThemeWatcher as the necessary bits for themes are done in element-web's index.html and thus are lacking here,
|
|
// plus JSDOM's implementation of CSSStyleDeclaration has a bunch of differences to real browsers which cause issues.
|
|
jest.mock("../../../../src/settings/watchers/ThemeWatcher");
|
|
|
|
/** The matrix versions our mock server claims to support */
|
|
const SERVER_SUPPORTED_MATRIX_VERSIONS = ["v1.1", "v1.5", "v1.6", "v1.8", "v1.9"];
|
|
|
|
describe("<MatrixChat />", () => {
|
|
const userId = "@alice:server.org";
|
|
const deviceId = "qwertyui";
|
|
const accessToken = "abc123";
|
|
const refreshToken = "def456";
|
|
let bootstrapDeferred: IDeferred<void>;
|
|
// reused in createClient mock below
|
|
const getMockClientMethods = () => ({
|
|
...mockClientMethodsUser(userId),
|
|
...mockClientMethodsServer(),
|
|
getVersions: jest.fn().mockResolvedValue({ versions: SERVER_SUPPORTED_MATRIX_VERSIONS }),
|
|
startClient: function () {
|
|
// @ts-ignore
|
|
this.emit(ClientEvent.Sync, SyncState.Prepared, null);
|
|
},
|
|
stopClient: jest.fn(),
|
|
setCanResetTimelineCallback: jest.fn(),
|
|
isInitialSyncComplete: jest.fn(),
|
|
getSyncState: jest.fn(),
|
|
getSsoLoginUrl: jest.fn(),
|
|
getSyncStateData: jest.fn().mockReturnValue(null),
|
|
getThirdpartyProtocols: jest.fn().mockResolvedValue({}),
|
|
getClientWellKnown: jest.fn().mockReturnValue({}),
|
|
isVersionSupported: jest.fn().mockResolvedValue(false),
|
|
initRustCrypto: jest.fn(),
|
|
getRoom: jest.fn(),
|
|
getMediaHandler: jest.fn().mockReturnValue({
|
|
setVideoInput: jest.fn(),
|
|
setAudioInput: jest.fn(),
|
|
setAudioSettings: jest.fn(),
|
|
stopAllStreams: jest.fn(),
|
|
} as unknown as MediaHandler),
|
|
setAccountData: jest.fn(),
|
|
store: {
|
|
destroy: jest.fn(),
|
|
startup: jest.fn(),
|
|
},
|
|
login: jest.fn(),
|
|
loginFlows: jest.fn(),
|
|
isGuest: jest.fn().mockReturnValue(false),
|
|
clearStores: jest.fn(),
|
|
setGuest: jest.fn(),
|
|
setNotifTimelineSet: jest.fn(),
|
|
getAccountData: jest.fn(),
|
|
doesServerSupportUnstableFeature: jest.fn(),
|
|
getDevices: jest.fn().mockResolvedValue({ devices: [] }),
|
|
getProfileInfo: jest.fn().mockResolvedValue({
|
|
displayname: "Ernie",
|
|
}),
|
|
getVisibleRooms: jest.fn().mockReturnValue([]),
|
|
getRooms: jest.fn().mockReturnValue([]),
|
|
setGlobalErrorOnUnknownDevices: jest.fn(),
|
|
getCrypto: jest.fn().mockReturnValue({
|
|
getVerificationRequestsToDeviceInProgress: jest.fn().mockReturnValue([]),
|
|
isCrossSigningReady: jest.fn().mockReturnValue(false),
|
|
getUserDeviceInfo: jest.fn().mockReturnValue(new Map()),
|
|
getUserVerificationStatus: jest.fn().mockResolvedValue(new UserVerificationStatus(false, false, false)),
|
|
getVersion: jest.fn().mockReturnValue("1"),
|
|
setDeviceIsolationMode: jest.fn(),
|
|
userHasCrossSigningKeys: jest.fn(),
|
|
getActiveSessionBackupVersion: jest.fn().mockResolvedValue(null),
|
|
globalBlacklistUnverifiedDevices: false,
|
|
// This needs to not finish immediately because we need to test the screen appears
|
|
bootstrapCrossSigning: jest.fn().mockImplementation(() => bootstrapDeferred.promise),
|
|
}),
|
|
secretStorage: {
|
|
isStored: jest.fn().mockReturnValue(null),
|
|
},
|
|
matrixRTC: createStubMatrixRTC(),
|
|
getDehydratedDevice: jest.fn(),
|
|
whoami: jest.fn(),
|
|
isRoomEncrypted: jest.fn(),
|
|
logout: jest.fn(),
|
|
getDeviceId: jest.fn(),
|
|
getKeyBackupVersion: jest.fn().mockResolvedValue(null),
|
|
});
|
|
let mockClient: Mocked<MatrixClient>;
|
|
const serverConfig = {
|
|
hsUrl: "https://test.com",
|
|
hsName: "Test Server",
|
|
hsNameIsDifferent: false,
|
|
isUrl: "https://is.com",
|
|
isDefault: true,
|
|
isNameResolvable: true,
|
|
warning: "",
|
|
};
|
|
let initPromise: Promise<void> | undefined;
|
|
let defaultProps: ComponentProps<typeof MatrixChat>;
|
|
const getComponent = (props: Partial<ComponentProps<typeof MatrixChat>> = {}) =>
|
|
render(<MatrixChat {...defaultProps} {...props} />);
|
|
|
|
// make test results readable
|
|
filterConsole(
|
|
"Failed to parse localStorage object",
|
|
"Sync store cannot be used on this browser",
|
|
"Crypto store cannot be used on this browser",
|
|
"Storage consistency checks failed",
|
|
"LegacyCallHandler: missing <audio",
|
|
);
|
|
|
|
/** populate storage with details of a persisted session */
|
|
async function populateStorageForSession() {
|
|
localStorage.setItem("mx_hs_url", serverConfig.hsUrl);
|
|
localStorage.setItem("mx_is_url", serverConfig.isUrl);
|
|
// TODO: nowadays the access token lives (encrypted) in indexedDB, and localstorage is only used as a fallback.
|
|
localStorage.setItem("mx_access_token", accessToken);
|
|
localStorage.setItem("mx_user_id", userId);
|
|
localStorage.setItem("mx_device_id", deviceId);
|
|
}
|
|
|
|
/**
|
|
* Wait for a bunch of stuff to happen
|
|
* between deciding we are logged in and removing the spinner
|
|
* including waiting for initial sync
|
|
*/
|
|
const waitForSyncAndLoad = async (client: MatrixClient, withoutSecuritySetup?: boolean): Promise<void> => {
|
|
// need to wait for different elements depending on which flow
|
|
// without security setup we go to a loading page
|
|
if (withoutSecuritySetup) {
|
|
// wait for logged in view to load
|
|
await screen.findByLabelText("User menu");
|
|
|
|
// otherwise we stay on login and load from there for longer
|
|
} else {
|
|
// we are logged in, but are still waiting for the /sync to complete
|
|
await screen.findByText("Syncing…");
|
|
// initial sync
|
|
client.emit(ClientEvent.Sync, SyncState.Prepared, null);
|
|
}
|
|
|
|
// let things settle
|
|
await flushPromises();
|
|
// and some more for good measure
|
|
// this proved to be a little flaky
|
|
await flushPromises();
|
|
};
|
|
|
|
beforeEach(async () => {
|
|
defaultProps = {
|
|
config: {
|
|
brand: "Test",
|
|
help_url: "help_url",
|
|
help_encryption_url: "help_encryption_url",
|
|
element_call: {},
|
|
feedback: {
|
|
existing_issues_url: "https://feedback.org/existing",
|
|
new_issue_url: "https://feedback.org/new",
|
|
},
|
|
validated_server_config: serverConfig,
|
|
},
|
|
onNewScreen: jest.fn(),
|
|
onTokenLoginCompleted: jest.fn(),
|
|
realQueryParams: {},
|
|
initPromiseCallback: (p: Promise<void>) => (initPromise = p),
|
|
};
|
|
|
|
initPromise = undefined;
|
|
mockClient = getMockClientWithEventEmitter(getMockClientMethods());
|
|
jest.spyOn(MatrixJs, "createClient").mockReturnValue(mockClient);
|
|
|
|
jest.spyOn(defaultDispatcher, "dispatch").mockClear();
|
|
jest.spyOn(defaultDispatcher, "fire").mockClear();
|
|
|
|
DMRoomMap.makeShared(mockClient);
|
|
|
|
jest.spyOn(AutoDiscoveryUtils, "validateServerConfigWithStaticUrls").mockResolvedValue(
|
|
{} as ValidatedServerConfig,
|
|
);
|
|
|
|
bootstrapDeferred = defer();
|
|
|
|
await clearAllModals();
|
|
});
|
|
|
|
afterEach(async () => {
|
|
// Wait for the promise that MatrixChat gives us to complete so that we know
|
|
// it's finished running its login code. We either need to do this or make the
|
|
// login code abort halfway through once the test finishes testing whatever it
|
|
// needs to test. If we do nothing, the login code will just continue running
|
|
// and interfere with the subsequent tests.
|
|
await initPromise;
|
|
|
|
// @ts-ignore
|
|
DMRoomMap.setShared(null);
|
|
|
|
jest.restoreAllMocks();
|
|
|
|
// emit a loggedOut event so that all of the Store singletons forget about their references to the mock client
|
|
// (must be sync otherwise the next test will start before it happens)
|
|
defaultDispatcher.dispatch({ action: Action.OnLoggedOut }, true);
|
|
|
|
localStorage.clear();
|
|
});
|
|
|
|
resetJsDomAfterEach();
|
|
|
|
it("should render spinner while app is loading", () => {
|
|
const { container } = getComponent();
|
|
|
|
expect(container).toMatchSnapshot();
|
|
});
|
|
|
|
it("should fire to focus the message composer", async () => {
|
|
getComponent();
|
|
defaultDispatcher.dispatch({ action: Action.ViewRoom, room_id: "!room:server.org", focusNext: "composer" });
|
|
await waitFor(() => {
|
|
expect(defaultDispatcher.fire).toHaveBeenCalledWith(Action.FocusSendMessageComposer);
|
|
});
|
|
});
|
|
|
|
it("should fire to focus the threads panel", async () => {
|
|
getComponent();
|
|
defaultDispatcher.dispatch({ action: Action.ViewRoom, room_id: "!room:server.org", focusNext: "threadsPanel" });
|
|
await waitFor(() => {
|
|
expect(defaultDispatcher.fire).toHaveBeenCalledWith(Action.FocusThreadsPanel);
|
|
});
|
|
});
|
|
|
|
describe("when query params have a OIDC params", () => {
|
|
const issuer = "https://auth.com/";
|
|
const homeserverUrl = "https://matrix.org";
|
|
const identityServerUrl = "https://is.org";
|
|
const clientId = "xyz789";
|
|
|
|
const code = "test-oidc-auth-code";
|
|
const state = "test-oidc-state";
|
|
const realQueryParams = {
|
|
code,
|
|
state: state,
|
|
};
|
|
|
|
const userId = "@alice:server.org";
|
|
const deviceId = "test-device-id";
|
|
const accessToken = "test-access-token-from-oidc";
|
|
|
|
const tokenResponse: BearerTokenResponse = {
|
|
access_token: accessToken,
|
|
refresh_token: "def456",
|
|
id_token: "ghi789",
|
|
scope: "test",
|
|
token_type: "Bearer",
|
|
expires_at: 12345,
|
|
};
|
|
|
|
let loginClient!: ReturnType<typeof getMockClientWithEventEmitter>;
|
|
|
|
const expectOIDCError = async (
|
|
errorMessage = "Something went wrong during authentication. Go to the sign in page and try again.",
|
|
): Promise<void> => {
|
|
await flushPromises();
|
|
const dialog = await screen.findByRole("dialog");
|
|
|
|
expect(within(dialog).getByText(errorMessage)).toBeInTheDocument();
|
|
// just check we're back on welcome page
|
|
await expect(await screen.findByTestId("mx_welcome_screen")).toBeInTheDocument();
|
|
};
|
|
|
|
beforeEach(() => {
|
|
mocked(completeAuthorizationCodeGrant)
|
|
.mockClear()
|
|
.mockResolvedValue({
|
|
oidcClientSettings: {
|
|
clientId,
|
|
issuer,
|
|
},
|
|
tokenResponse,
|
|
homeserverUrl,
|
|
identityServerUrl,
|
|
idTokenClaims: {
|
|
aud: "123",
|
|
iss: issuer,
|
|
sub: "123",
|
|
exp: 123,
|
|
iat: 456,
|
|
},
|
|
});
|
|
|
|
jest.spyOn(logger, "error").mockClear();
|
|
});
|
|
|
|
beforeEach(() => {
|
|
loginClient = getMockClientWithEventEmitter(getMockClientMethods());
|
|
// this is used to create a temporary client during login
|
|
jest.spyOn(MatrixJs, "createClient").mockReturnValue(loginClient);
|
|
|
|
jest.spyOn(logger, "error").mockClear();
|
|
jest.spyOn(logger, "log").mockClear();
|
|
|
|
loginClient.whoami.mockResolvedValue({
|
|
user_id: userId,
|
|
device_id: deviceId,
|
|
is_guest: false,
|
|
});
|
|
});
|
|
|
|
it("should fail when query params do not include valid code and state", async () => {
|
|
const queryParams = {
|
|
code: 123,
|
|
state: "abc",
|
|
};
|
|
getComponent({ realQueryParams: queryParams });
|
|
|
|
await flushPromises();
|
|
|
|
expect(logger.error).toHaveBeenCalledWith(
|
|
"Failed to login via OIDC",
|
|
new Error(OidcClientError.InvalidQueryParameters),
|
|
);
|
|
|
|
await expectOIDCError();
|
|
});
|
|
|
|
it("should make correct request to complete authorization", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
expect(completeAuthorizationCodeGrant).toHaveBeenCalledWith(code, state);
|
|
});
|
|
|
|
it("should look up userId using access token", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
// check we used a client with the correct accesstoken
|
|
expect(MatrixJs.createClient).toHaveBeenCalledWith({
|
|
baseUrl: homeserverUrl,
|
|
accessToken,
|
|
idBaseUrl: identityServerUrl,
|
|
});
|
|
expect(loginClient.whoami).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should log error and return to welcome page when userId lookup fails", async () => {
|
|
loginClient.whoami.mockRejectedValue(new Error("oups"));
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
expect(logger.error).toHaveBeenCalledWith(
|
|
"Failed to login via OIDC",
|
|
new Error("Failed to retrieve userId using accessToken"),
|
|
);
|
|
await expectOIDCError();
|
|
});
|
|
|
|
it("should call onTokenLoginCompleted", async () => {
|
|
const onTokenLoginCompleted = jest.fn();
|
|
getComponent({ realQueryParams, onTokenLoginCompleted });
|
|
|
|
await waitFor(() => expect(onTokenLoginCompleted).toHaveBeenCalled());
|
|
});
|
|
|
|
describe("when login fails", () => {
|
|
beforeEach(() => {
|
|
mocked(completeAuthorizationCodeGrant).mockRejectedValue(new Error(OidcError.CodeExchangeFailed));
|
|
});
|
|
|
|
it("should log and return to welcome page with correct error when login state is not found", async () => {
|
|
mocked(completeAuthorizationCodeGrant).mockRejectedValue(
|
|
new Error(OidcError.MissingOrInvalidStoredState),
|
|
);
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
expect(logger.error).toHaveBeenCalledWith(
|
|
"Failed to login via OIDC",
|
|
new Error(OidcError.MissingOrInvalidStoredState),
|
|
);
|
|
|
|
await expectOIDCError(
|
|
"We asked the browser to remember which homeserver you use to let you sign in, but unfortunately your browser has forgotten it. Go to the sign in page and try again.",
|
|
);
|
|
});
|
|
|
|
it("should log and return to welcome page", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
expect(logger.error).toHaveBeenCalledWith(
|
|
"Failed to login via OIDC",
|
|
new Error(OidcError.CodeExchangeFailed),
|
|
);
|
|
|
|
// warning dialog
|
|
await expectOIDCError();
|
|
});
|
|
|
|
it("should not clear storage", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
expect(loginClient.clearStores).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it("should not store clientId or issuer", async () => {
|
|
const sessionStorageSetSpy = jest.spyOn(sessionStorage.__proto__, "setItem");
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
expect(sessionStorageSetSpy).not.toHaveBeenCalledWith("mx_oidc_client_id", clientId);
|
|
expect(sessionStorageSetSpy).not.toHaveBeenCalledWith("mx_oidc_token_issuer", issuer);
|
|
});
|
|
});
|
|
|
|
describe("when login succeeds", () => {
|
|
beforeEach(() => {
|
|
jest.spyOn(StorageAccess, "idbLoad").mockImplementation(
|
|
async (_table: string, key: string | string[]) => (key === "mx_access_token" ? accessToken : null),
|
|
);
|
|
});
|
|
|
|
it("should persist login credentials", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await waitFor(() => expect(localStorage.getItem("mx_hs_url")).toEqual(homeserverUrl));
|
|
expect(localStorage.getItem("mx_user_id")).toEqual(userId);
|
|
expect(localStorage.getItem("mx_has_access_token")).toEqual("true");
|
|
expect(localStorage.getItem("mx_device_id")).toEqual(deviceId);
|
|
});
|
|
|
|
it("should store clientId and issuer in session storage", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await waitFor(() => expect(localStorage.getItem("mx_oidc_client_id")).toEqual(clientId));
|
|
expect(localStorage.getItem("mx_oidc_token_issuer")).toEqual(issuer);
|
|
});
|
|
|
|
it("should set logged in and start MatrixClient", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
// client successfully started
|
|
await waitFor(() =>
|
|
expect(defaultDispatcher.dispatch).toHaveBeenCalledWith({ action: "client_started" }),
|
|
);
|
|
|
|
// check we get to logged in view
|
|
await waitForSyncAndLoad(loginClient, true);
|
|
});
|
|
|
|
it("should persist device language when available", async () => {
|
|
await SettingsStore.setValue("language", null, SettingLevel.DEVICE, "en");
|
|
const languageBefore = SettingsStore.getValueAt(SettingLevel.DEVICE, "language", null, true, true);
|
|
|
|
jest.spyOn(Lifecycle, "attemptDelegatedAuthLogin");
|
|
|
|
getComponent({ realQueryParams });
|
|
await flushPromises();
|
|
|
|
expect(Lifecycle.attemptDelegatedAuthLogin).toHaveBeenCalled();
|
|
const languageAfter = SettingsStore.getValueAt(SettingLevel.DEVICE, "language", null, true, true);
|
|
expect(languageBefore).toEqual(languageAfter);
|
|
});
|
|
|
|
it("should not persist device language when not available", async () => {
|
|
await SettingsStore.setValue("language", null, SettingLevel.DEVICE, undefined);
|
|
const languageBefore = SettingsStore.getValueAt(SettingLevel.DEVICE, "language", null, true, true);
|
|
|
|
jest.spyOn(Lifecycle, "attemptDelegatedAuthLogin");
|
|
|
|
getComponent({ realQueryParams });
|
|
await flushPromises();
|
|
|
|
expect(Lifecycle.attemptDelegatedAuthLogin).toHaveBeenCalled();
|
|
const languageAfter = SettingsStore.getValueAt(SettingLevel.DEVICE, "language", null, true, true);
|
|
expect(languageBefore).toEqual(languageAfter);
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("with an existing session", () => {
|
|
const mockidb: Record<string, Record<string, string>> = {
|
|
account: {
|
|
mx_access_token: accessToken,
|
|
mx_refresh_token: refreshToken,
|
|
},
|
|
};
|
|
|
|
beforeEach(async () => {
|
|
await populateStorageForSession();
|
|
jest.spyOn(StorageAccess, "idbLoad").mockImplementation(async (table, key) => {
|
|
const safeKey = Array.isArray(key) ? key[0] : key;
|
|
return mockidb[table]?.[safeKey];
|
|
});
|
|
});
|
|
|
|
const getComponentAndWaitForReady = async (): Promise<RenderResult> => {
|
|
const renderResult = getComponent();
|
|
|
|
// we think we are logged in, but are still waiting for the /sync to complete
|
|
await screen.findByText("Logout");
|
|
// initial sync
|
|
mockClient.emit(ClientEvent.Sync, SyncState.Prepared, null);
|
|
// wait for logged in view to load
|
|
await screen.findByLabelText("User menu");
|
|
// let things settle
|
|
await flushPromises();
|
|
// and some more for good measure
|
|
// this proved to be a little flaky
|
|
await flushPromises();
|
|
|
|
return renderResult;
|
|
};
|
|
|
|
it("should render welcome page after login", async () => {
|
|
getComponent();
|
|
|
|
// wait for logged in view to load
|
|
await screen.findByLabelText("User menu");
|
|
|
|
expect(screen.queryByRole("progressbar")).not.toBeInTheDocument();
|
|
const h1Element = screen.getByRole("heading", { level: 1 });
|
|
expect(h1Element).toHaveTextContent(`Welcome Ernie`);
|
|
});
|
|
|
|
describe("clean up drafts", () => {
|
|
const roomId = "!room:server.org";
|
|
const unknownRoomId = "!room2:server.org";
|
|
const room = new Room(roomId, mockClient, userId);
|
|
const timestamp = 2345678901234;
|
|
beforeEach(() => {
|
|
localStorage.setItem(`mx_cider_state_${unknownRoomId}`, "fake_content");
|
|
localStorage.setItem(`mx_cider_state_${roomId}`, "fake_content");
|
|
mockClient.getRoom.mockImplementation((id) => [room].find((room) => room.roomId === id) || null);
|
|
});
|
|
afterEach(() => {
|
|
jest.restoreAllMocks();
|
|
});
|
|
it("should clean up drafts", async () => {
|
|
Date.now = jest.fn(() => timestamp);
|
|
localStorage.setItem(`mx_cider_state_${roomId}`, "fake_content");
|
|
localStorage.setItem(`mx_cider_state_${unknownRoomId}`, "fake_content");
|
|
await getComponentAndWaitForReady();
|
|
mockClient.emit(ClientEvent.Sync, SyncState.Syncing, SyncState.Syncing);
|
|
// let things settle
|
|
await flushPromises();
|
|
expect(localStorage.getItem(`mx_cider_state_${roomId}`)).not.toBeNull();
|
|
expect(localStorage.getItem(`mx_cider_state_${unknownRoomId}`)).toBeNull();
|
|
});
|
|
|
|
it("should clean up wysiwyg drafts", async () => {
|
|
Date.now = jest.fn(() => timestamp);
|
|
localStorage.setItem(`mx_wysiwyg_state_${roomId}`, "fake_content");
|
|
localStorage.setItem(`mx_wysiwyg_state_${unknownRoomId}`, "fake_content");
|
|
await getComponentAndWaitForReady();
|
|
mockClient.emit(ClientEvent.Sync, SyncState.Syncing, SyncState.Syncing);
|
|
// let things settle
|
|
await flushPromises();
|
|
expect(localStorage.getItem(`mx_wysiwyg_state_${roomId}`)).not.toBeNull();
|
|
expect(localStorage.getItem(`mx_wysiwyg_state_${unknownRoomId}`)).toBeNull();
|
|
});
|
|
|
|
it("should not clean up drafts before expiry", async () => {
|
|
// Set the last cleanup to the recent past
|
|
localStorage.setItem(`mx_cider_state_${unknownRoomId}`, "fake_content");
|
|
localStorage.setItem(DRAFT_LAST_CLEANUP_KEY, String(timestamp - 100));
|
|
await getComponentAndWaitForReady();
|
|
mockClient.emit(ClientEvent.Sync, SyncState.Syncing, SyncState.Syncing);
|
|
expect(localStorage.getItem(`mx_cider_state_${unknownRoomId}`)).not.toBeNull();
|
|
});
|
|
});
|
|
|
|
describe("onAction()", () => {
|
|
beforeEach(() => {
|
|
jest.spyOn(defaultDispatcher, "dispatch").mockClear();
|
|
jest.spyOn(defaultDispatcher, "fire").mockClear();
|
|
});
|
|
it("should open user device settings", async () => {
|
|
await getComponentAndWaitForReady();
|
|
|
|
defaultDispatcher.dispatch({
|
|
action: Action.ViewUserDeviceSettings,
|
|
});
|
|
|
|
await flushPromises();
|
|
|
|
expect(defaultDispatcher.dispatch).toHaveBeenCalledWith({
|
|
action: Action.ViewUserSettings,
|
|
initialTabId: UserTab.SessionManager,
|
|
});
|
|
});
|
|
|
|
describe("room actions", () => {
|
|
const roomId = "!room:server.org";
|
|
const spaceId = "!spaceRoom:server.org";
|
|
const room = new Room(roomId, mockClient, userId);
|
|
const spaceRoom = new Room(spaceId, mockClient, userId);
|
|
|
|
beforeEach(() => {
|
|
mockClient.getRoom.mockImplementation(
|
|
(id) => [room, spaceRoom].find((room) => room.roomId === id) || null,
|
|
);
|
|
jest.spyOn(spaceRoom, "isSpaceRoom").mockReturnValue(true);
|
|
|
|
jest.spyOn(ReleaseAnnouncementStore.instance, "getReleaseAnnouncement").mockReturnValue(null);
|
|
});
|
|
|
|
afterEach(() => {
|
|
jest.restoreAllMocks();
|
|
});
|
|
|
|
describe("leave_room", () => {
|
|
beforeEach(async () => {
|
|
await clearAllModals();
|
|
await getComponentAndWaitForReady();
|
|
// this is thoroughly unit tested elsewhere
|
|
jest.spyOn(leaveRoomUtils, "leaveRoomBehaviour").mockClear().mockResolvedValue(undefined);
|
|
});
|
|
const dispatchAction = () =>
|
|
defaultDispatcher.dispatch({
|
|
action: "leave_room",
|
|
room_id: roomId,
|
|
});
|
|
const publicJoinRule = new MatrixEvent({
|
|
type: "m.room.join_rules",
|
|
content: {
|
|
join_rule: "public",
|
|
},
|
|
});
|
|
const inviteJoinRule = new MatrixEvent({
|
|
type: "m.room.join_rules",
|
|
content: {
|
|
join_rule: "invite",
|
|
},
|
|
});
|
|
describe("for a room", () => {
|
|
beforeEach(() => {
|
|
jest.spyOn(room.currentState, "getJoinedMemberCount").mockReturnValue(2);
|
|
jest.spyOn(room.currentState, "getStateEvents").mockReturnValue(publicJoinRule);
|
|
});
|
|
it("should launch a confirmation modal", async () => {
|
|
dispatchAction();
|
|
const dialog = await screen.findByRole("dialog");
|
|
expect(dialog).toMatchSnapshot();
|
|
});
|
|
it("should warn when room has only one joined member", async () => {
|
|
jest.spyOn(room.currentState, "getJoinedMemberCount").mockReturnValue(1);
|
|
dispatchAction();
|
|
await screen.findByRole("dialog");
|
|
expect(
|
|
screen.getByText(
|
|
"You are the only person here. If you leave, no one will be able to join in the future, including you.",
|
|
),
|
|
).toBeInTheDocument();
|
|
});
|
|
it("should warn when room is not public", async () => {
|
|
jest.spyOn(room.currentState, "getStateEvents").mockReturnValue(inviteJoinRule);
|
|
dispatchAction();
|
|
await screen.findByRole("dialog");
|
|
expect(
|
|
screen.getByText(
|
|
"This room is not public. You will not be able to rejoin without an invite.",
|
|
),
|
|
).toBeInTheDocument();
|
|
});
|
|
it("should do nothing on cancel", async () => {
|
|
dispatchAction();
|
|
const dialog = await screen.findByRole("dialog");
|
|
fireEvent.click(within(dialog).getByText("Cancel"));
|
|
|
|
await flushPromises();
|
|
|
|
expect(leaveRoomUtils.leaveRoomBehaviour).not.toHaveBeenCalled();
|
|
expect(defaultDispatcher.dispatch).not.toHaveBeenCalledWith({
|
|
action: Action.AfterLeaveRoom,
|
|
room_id: roomId,
|
|
});
|
|
});
|
|
it("should leave room and dispatch after leave action", async () => {
|
|
dispatchAction();
|
|
const dialog = await screen.findByRole("dialog");
|
|
fireEvent.click(within(dialog).getByText("Leave"));
|
|
|
|
await flushPromises();
|
|
|
|
expect(leaveRoomUtils.leaveRoomBehaviour).toHaveBeenCalled();
|
|
expect(defaultDispatcher.dispatch).toHaveBeenCalledWith({
|
|
action: Action.AfterLeaveRoom,
|
|
room_id: roomId,
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("for a space", () => {
|
|
const dispatchAction = () =>
|
|
defaultDispatcher.dispatch({
|
|
action: "leave_room",
|
|
room_id: spaceId,
|
|
});
|
|
beforeEach(() => {
|
|
jest.spyOn(spaceRoom.currentState, "getStateEvents").mockReturnValue(publicJoinRule);
|
|
});
|
|
it("should launch a confirmation modal", async () => {
|
|
dispatchAction();
|
|
const dialog = await screen.findByRole("dialog");
|
|
expect(dialog).toMatchSnapshot();
|
|
});
|
|
it("should warn when space is not public", async () => {
|
|
jest.spyOn(spaceRoom.currentState, "getStateEvents").mockReturnValue(inviteJoinRule);
|
|
dispatchAction();
|
|
await screen.findByRole("dialog");
|
|
expect(
|
|
screen.getByText(
|
|
"This space is not public. You will not be able to rejoin without an invite.",
|
|
),
|
|
).toBeInTheDocument();
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("logout", () => {
|
|
let logoutClient!: ReturnType<typeof getMockClientWithEventEmitter>;
|
|
const call1 = { disconnect: jest.fn() } as unknown as Call;
|
|
const call2 = { disconnect: jest.fn() } as unknown as Call;
|
|
|
|
const dispatchLogoutAndWait = async (): Promise<void> => {
|
|
defaultDispatcher.dispatch({
|
|
action: "logout",
|
|
});
|
|
|
|
await flushPromises();
|
|
};
|
|
|
|
beforeEach(() => {
|
|
// stub out various cleanup functions
|
|
jest.spyOn(LegacyCallHandler.instance, "hangupAllCalls")
|
|
.mockClear()
|
|
.mockImplementation(() => {});
|
|
jest.spyOn(voiceBroadcastUtils, "cleanUpBroadcasts").mockImplementation(async () => {});
|
|
jest.spyOn(PosthogAnalytics.instance, "logout").mockImplementation(() => {});
|
|
jest.spyOn(EventIndexPeg, "deleteEventIndex").mockImplementation(async () => {});
|
|
|
|
jest.spyOn(CallStore.instance, "connectedCalls", "get").mockReturnValue(new Set([call1, call2]));
|
|
|
|
mockPlatformPeg({
|
|
destroyPickleKey: jest.fn(),
|
|
});
|
|
|
|
logoutClient = getMockClientWithEventEmitter(getMockClientMethods());
|
|
mockClient = getMockClientWithEventEmitter(getMockClientMethods());
|
|
mockClient.logout.mockResolvedValue({});
|
|
mockClient.getDeviceId.mockReturnValue(deviceId);
|
|
// this is used to create a temporary client to cleanup after logout
|
|
jest.spyOn(MatrixJs, "createClient").mockClear().mockReturnValue(logoutClient);
|
|
|
|
jest.spyOn(logger, "warn").mockClear();
|
|
});
|
|
|
|
afterAll(() => {
|
|
jest.spyOn(voiceBroadcastUtils, "cleanUpBroadcasts").mockRestore();
|
|
});
|
|
|
|
it("should hangup all legacy calls", async () => {
|
|
await getComponentAndWaitForReady();
|
|
await dispatchLogoutAndWait();
|
|
expect(LegacyCallHandler.instance.hangupAllCalls).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should cleanup broadcasts", async () => {
|
|
await getComponentAndWaitForReady();
|
|
await dispatchLogoutAndWait();
|
|
expect(voiceBroadcastUtils.cleanUpBroadcasts).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should disconnect all calls", async () => {
|
|
await getComponentAndWaitForReady();
|
|
await dispatchLogoutAndWait();
|
|
expect(call1.disconnect).toHaveBeenCalled();
|
|
expect(call2.disconnect).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should logout of posthog", async () => {
|
|
await getComponentAndWaitForReady();
|
|
await dispatchLogoutAndWait();
|
|
|
|
expect(PosthogAnalytics.instance.logout).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should destroy pickle key", async () => {
|
|
await getComponentAndWaitForReady();
|
|
await dispatchLogoutAndWait();
|
|
|
|
expect(PlatformPeg.get()!.destroyPickleKey).toHaveBeenCalledWith(userId, deviceId);
|
|
});
|
|
|
|
describe("without delegated auth", () => {
|
|
it("should call /logout", async () => {
|
|
await getComponentAndWaitForReady();
|
|
await dispatchLogoutAndWait();
|
|
|
|
expect(mockClient.logout).toHaveBeenCalledWith(true);
|
|
});
|
|
|
|
it("should warn and do post-logout cleanup anyway when logout fails", async () => {
|
|
const error = new Error("test logout failed");
|
|
mockClient.logout.mockRejectedValue(error);
|
|
await getComponentAndWaitForReady();
|
|
await dispatchLogoutAndWait();
|
|
|
|
expect(logger.warn).toHaveBeenCalledWith(
|
|
"Failed to call logout API: token will not be invalidated",
|
|
error,
|
|
);
|
|
|
|
// stuff that happens in onloggedout
|
|
expect(defaultDispatcher.fire).toHaveBeenCalledWith(Action.OnLoggedOut, true);
|
|
await waitFor(() => expect(logoutClient.clearStores).toHaveBeenCalled());
|
|
});
|
|
|
|
it("should do post-logout cleanup", async () => {
|
|
await getComponentAndWaitForReady();
|
|
await dispatchLogoutAndWait();
|
|
|
|
// stuff that happens in onloggedout
|
|
expect(defaultDispatcher.fire).toHaveBeenCalledWith(Action.OnLoggedOut, true);
|
|
await waitFor(() => expect(EventIndexPeg.deleteEventIndex).toHaveBeenCalled());
|
|
expect(logoutClient.clearStores).toHaveBeenCalled();
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("unskippable verification", () => {
|
|
it("should show the complete security screen if unskippable verification is enabled", async () => {
|
|
defaultProps.config.force_verification = true;
|
|
localStorage.setItem("must_verify_device", "true");
|
|
getComponent();
|
|
|
|
await screen.findByRole("heading", { name: "Unable to verify this device", level: 1 });
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("with a soft-logged-out session", () => {
|
|
const mockidb: Record<string, Record<string, string>> = {};
|
|
|
|
beforeEach(async () => {
|
|
await populateStorageForSession();
|
|
localStorage.setItem("mx_soft_logout", "true");
|
|
|
|
mockClient.loginFlows.mockResolvedValue({ flows: [{ type: "m.login.password" }] });
|
|
|
|
jest.spyOn(StorageAccess, "idbLoad").mockImplementation(async (table, key) => {
|
|
const safeKey = Array.isArray(key) ? key[0] : key;
|
|
return mockidb[table]?.[safeKey];
|
|
});
|
|
});
|
|
|
|
it("should show the soft-logout page", async () => {
|
|
// XXX This test is strange, it was working with legacy crypto
|
|
// without mocking the following but the initCrypto call was failing
|
|
// but as the exception was swallowed, the test was passing (see in `initClientCrypto`).
|
|
// There are several uses of the peg in the app, so during all these tests you might end-up
|
|
// with a real client instead of the mocked one. Not sure how reliable all these tests are.
|
|
jest.spyOn(MatrixClientPeg, "replaceUsingCreds");
|
|
jest.spyOn(MatrixClientPeg, "get").mockReturnValue(mockClient);
|
|
|
|
const result = getComponent();
|
|
|
|
await result.findByText("You're signed out");
|
|
expect(result.container).toMatchSnapshot();
|
|
});
|
|
});
|
|
|
|
describe("login via key/pass", () => {
|
|
let loginClient!: ReturnType<typeof getMockClientWithEventEmitter>;
|
|
|
|
const userName = "ernie";
|
|
const password = "ilovebert";
|
|
|
|
const getComponentAndWaitForReady = async (): Promise<RenderResult> => {
|
|
const renderResult = getComponent();
|
|
// wait for welcome page chrome render
|
|
await screen.findByText("Powered by Matrix");
|
|
|
|
// go to login page
|
|
defaultDispatcher.dispatch({
|
|
action: "start_login",
|
|
});
|
|
|
|
await flushPromises();
|
|
|
|
return renderResult;
|
|
};
|
|
|
|
const getComponentAndLogin = async (withoutSecuritySetup?: boolean): Promise<void> => {
|
|
await getComponentAndWaitForReady();
|
|
|
|
fireEvent.change(screen.getByLabelText("Username"), { target: { value: userName } });
|
|
fireEvent.change(screen.getByLabelText("Password"), { target: { value: password } });
|
|
|
|
// sign in button is an input
|
|
fireEvent.click(screen.getByDisplayValue("Sign in"));
|
|
|
|
await waitForSyncAndLoad(loginClient, withoutSecuritySetup);
|
|
};
|
|
|
|
beforeEach(() => {
|
|
loginClient = getMockClientWithEventEmitter(getMockClientMethods());
|
|
// this is used to create a temporary client during login
|
|
// FIXME: except it is *also* used as the permanent client for the rest of the test.
|
|
jest.spyOn(MatrixJs, "createClient").mockClear().mockReturnValue(loginClient);
|
|
|
|
loginClient.login.mockClear().mockResolvedValue({
|
|
access_token: "TOKEN",
|
|
device_id: "IMADEVICE",
|
|
user_id: userId,
|
|
});
|
|
loginClient.loginFlows.mockClear().mockResolvedValue({ flows: [{ type: "m.login.password" }] });
|
|
});
|
|
|
|
it("should render login page", async () => {
|
|
await getComponentAndWaitForReady();
|
|
|
|
expect(screen.getAllByText("Sign in")[0]).toBeInTheDocument();
|
|
});
|
|
|
|
describe("post login setup", () => {
|
|
beforeEach(() => {
|
|
const mockCrypto = {
|
|
getVersion: jest.fn().mockReturnValue("Version 0"),
|
|
getVerificationRequestsToDeviceInProgress: jest.fn().mockReturnValue([]),
|
|
getUserDeviceInfo: jest.fn().mockResolvedValue(new Map()),
|
|
getUserVerificationStatus: jest
|
|
.fn()
|
|
.mockResolvedValue(new UserVerificationStatus(false, false, false)),
|
|
setDeviceIsolationMode: jest.fn(),
|
|
userHasCrossSigningKeys: jest.fn().mockResolvedValue(false),
|
|
// This needs to not finish immediately because we need to test the screen appears
|
|
bootstrapCrossSigning: jest.fn().mockImplementation(() => bootstrapDeferred.promise),
|
|
};
|
|
loginClient.getCrypto.mockReturnValue(mockCrypto as any);
|
|
});
|
|
|
|
it("should go straight to logged in view when crypto is not enabled", async () => {
|
|
loginClient.getCrypto.mockReturnValue(undefined);
|
|
|
|
await getComponentAndLogin(true);
|
|
|
|
expect(screen.getByRole("heading", { name: "Welcome Ernie" })).toBeInTheDocument();
|
|
});
|
|
|
|
it("should go straight to logged in view when user does not have cross signing keys and server does not support cross signing", async () => {
|
|
loginClient.doesServerSupportUnstableFeature.mockResolvedValue(false);
|
|
|
|
await getComponentAndLogin(false);
|
|
|
|
expect(loginClient.doesServerSupportUnstableFeature).toHaveBeenCalledWith(
|
|
"org.matrix.e2e_cross_signing",
|
|
);
|
|
|
|
await flushPromises();
|
|
|
|
// logged in
|
|
await screen.findByLabelText("User menu");
|
|
});
|
|
|
|
describe("when server supports cross signing and user does not have cross signing setup", () => {
|
|
beforeEach(() => {
|
|
loginClient.doesServerSupportUnstableFeature.mockResolvedValue(true);
|
|
jest.spyOn(loginClient.getCrypto()!, "userHasCrossSigningKeys").mockResolvedValue(false);
|
|
});
|
|
|
|
describe("when encryption is force disabled", () => {
|
|
let unencryptedRoom: Room;
|
|
let encryptedRoom: Room;
|
|
|
|
beforeEach(() => {
|
|
unencryptedRoom = new Room("!unencrypted:server.org", loginClient, userId);
|
|
encryptedRoom = new Room("!encrypted:server.org", loginClient, userId);
|
|
|
|
loginClient.getClientWellKnown.mockReturnValue({
|
|
"io.element.e2ee": {
|
|
force_disable: true,
|
|
},
|
|
});
|
|
|
|
loginClient.isRoomEncrypted.mockImplementation((roomId) => {
|
|
return roomId === encryptedRoom.roomId;
|
|
});
|
|
});
|
|
|
|
it("should go straight to logged in view when user is not in any encrypted rooms", async () => {
|
|
loginClient.getRooms.mockReturnValue([unencryptedRoom]);
|
|
await getComponentAndLogin(false);
|
|
|
|
await flushPromises();
|
|
|
|
// logged in, did not setup keys
|
|
await screen.findByLabelText("User menu");
|
|
});
|
|
|
|
it("should go to setup e2e screen when user is in encrypted rooms", async () => {
|
|
loginClient.getRooms.mockReturnValue([unencryptedRoom, encryptedRoom]);
|
|
await getComponentAndLogin();
|
|
await flushPromises();
|
|
// set up keys screen is rendered
|
|
expect(screen.getByText("Setting up keys")).toBeInTheDocument();
|
|
});
|
|
});
|
|
|
|
it("should go to setup e2e screen", async () => {
|
|
loginClient.doesServerSupportUnstableFeature.mockResolvedValue(true);
|
|
|
|
await getComponentAndLogin();
|
|
|
|
expect(loginClient.getCrypto()!.userHasCrossSigningKeys).toHaveBeenCalled();
|
|
|
|
// set up keys screen is rendered
|
|
await expect(await screen.findByText("Setting up keys")).toBeInTheDocument();
|
|
});
|
|
});
|
|
|
|
it("should show complete security screen when user has cross signing setup", async () => {
|
|
jest.spyOn(loginClient.getCrypto()!, "userHasCrossSigningKeys").mockResolvedValue(true);
|
|
|
|
await getComponentAndLogin();
|
|
|
|
expect(loginClient.getCrypto()!.userHasCrossSigningKeys).toHaveBeenCalled();
|
|
|
|
await flushPromises();
|
|
|
|
// Complete security begin screen is rendered
|
|
expect(screen.getByText("Unable to verify this device")).toBeInTheDocument();
|
|
});
|
|
|
|
it("should setup e2e when server supports cross signing", async () => {
|
|
loginClient.doesServerSupportUnstableFeature.mockResolvedValue(true);
|
|
|
|
await getComponentAndLogin();
|
|
|
|
expect(loginClient.getCrypto()!.userHasCrossSigningKeys).toHaveBeenCalled();
|
|
|
|
// set up keys screen is rendered
|
|
expect(screen.getByText("Setting up keys")).toBeInTheDocument();
|
|
});
|
|
|
|
it("should go to use case selection if user just registered", async () => {
|
|
loginClient.doesServerSupportUnstableFeature.mockResolvedValue(true);
|
|
MatrixClientPeg.setJustRegisteredUserId(userId);
|
|
|
|
await getComponentAndLogin();
|
|
|
|
bootstrapDeferred.resolve();
|
|
|
|
await expect(await screen.findByRole("heading", { name: "You're in", level: 1 })).toBeInTheDocument();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("when query params have a loginToken", () => {
|
|
const loginToken = "test-login-token";
|
|
const realQueryParams = {
|
|
loginToken,
|
|
};
|
|
|
|
let loginClient!: ReturnType<typeof getMockClientWithEventEmitter>;
|
|
const userId = "@alice:server.org";
|
|
const deviceId = "test-device-id";
|
|
const accessToken = "test-access-token";
|
|
const clientLoginResponse = {
|
|
user_id: userId,
|
|
device_id: deviceId,
|
|
access_token: accessToken,
|
|
};
|
|
|
|
beforeEach(() => {
|
|
localStorage.setItem("mx_sso_hs_url", serverConfig.hsUrl);
|
|
localStorage.setItem("mx_sso_is_url", serverConfig.isUrl);
|
|
loginClient = getMockClientWithEventEmitter(getMockClientMethods());
|
|
// this is used to create a temporary client during login
|
|
jest.spyOn(MatrixJs, "createClient").mockReturnValue(loginClient);
|
|
|
|
loginClient.login.mockClear().mockResolvedValue(clientLoginResponse);
|
|
});
|
|
|
|
it("should show an error dialog when no homeserver is found in local storage", async () => {
|
|
localStorage.removeItem("mx_sso_hs_url");
|
|
const localStorageGetSpy = jest.spyOn(localStorage.__proto__, "getItem");
|
|
getComponent({ realQueryParams });
|
|
await flushPromises();
|
|
|
|
expect(localStorageGetSpy).toHaveBeenCalledWith("mx_sso_hs_url");
|
|
expect(localStorageGetSpy).toHaveBeenCalledWith("mx_sso_is_url");
|
|
|
|
const dialog = await screen.findByRole("dialog");
|
|
|
|
// warning dialog
|
|
expect(
|
|
within(dialog).getByText(
|
|
"We asked the browser to remember which homeserver you use to let you sign in, " +
|
|
"but unfortunately your browser has forgotten it. Go to the sign in page and try again.",
|
|
),
|
|
).toBeInTheDocument();
|
|
});
|
|
|
|
it("should attempt token login", async () => {
|
|
getComponent({ realQueryParams });
|
|
await flushPromises();
|
|
|
|
expect(loginClient.login).toHaveBeenCalledWith("m.login.token", {
|
|
initial_device_display_name: undefined,
|
|
token: loginToken,
|
|
});
|
|
});
|
|
|
|
it("should call onTokenLoginCompleted", async () => {
|
|
const onTokenLoginCompleted = jest.fn();
|
|
getComponent({ realQueryParams, onTokenLoginCompleted });
|
|
|
|
await waitFor(() => expect(onTokenLoginCompleted).toHaveBeenCalled());
|
|
});
|
|
|
|
describe("when login fails", () => {
|
|
beforeEach(() => {
|
|
loginClient.login.mockRejectedValue(new Error("oups"));
|
|
});
|
|
it("should show a dialog", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
const dialog = await screen.findByRole("dialog");
|
|
|
|
// warning dialog
|
|
expect(
|
|
within(dialog).getByText(
|
|
"There was a problem communicating with the homeserver, please try again later.",
|
|
),
|
|
).toBeInTheDocument();
|
|
});
|
|
|
|
it("should not clear storage", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await flushPromises();
|
|
|
|
expect(loginClient.clearStores).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe("when login succeeds", () => {
|
|
beforeEach(() => {
|
|
jest.spyOn(StorageAccess, "idbLoad").mockImplementation(
|
|
async (_table: string, key: string | string[]) => {
|
|
if (key === "mx_access_token") {
|
|
return accessToken as any;
|
|
}
|
|
},
|
|
);
|
|
});
|
|
it("should clear storage", async () => {
|
|
const localStorageClearSpy = jest.spyOn(localStorage.__proto__, "clear");
|
|
|
|
getComponent({ realQueryParams });
|
|
|
|
// just check we called the clearStorage function
|
|
await waitFor(() => expect(loginClient.clearStores).toHaveBeenCalled());
|
|
expect(localStorage.getItem("mx_sso_hs_url")).toBe(null);
|
|
expect(localStorageClearSpy).toHaveBeenCalled();
|
|
});
|
|
|
|
it("should persist login credentials", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
await waitFor(() => expect(localStorage.getItem("mx_hs_url")).toEqual(serverConfig.hsUrl));
|
|
expect(localStorage.getItem("mx_user_id")).toEqual(userId);
|
|
expect(localStorage.getItem("mx_has_access_token")).toEqual("true");
|
|
expect(localStorage.getItem("mx_device_id")).toEqual(deviceId);
|
|
});
|
|
|
|
it("should set fresh login flag in session storage", async () => {
|
|
const sessionStorageSetSpy = jest.spyOn(sessionStorage.__proto__, "setItem");
|
|
getComponent({ realQueryParams });
|
|
|
|
await waitFor(() => expect(sessionStorageSetSpy).toHaveBeenCalledWith("mx_fresh_login", "true"));
|
|
});
|
|
|
|
it("should override hsUrl in creds when login response wellKnown differs from config", async () => {
|
|
const hsUrlFromWk = "https://hsfromwk.org";
|
|
const loginResponseWithWellKnown = {
|
|
...clientLoginResponse,
|
|
well_known: {
|
|
"m.homeserver": {
|
|
base_url: hsUrlFromWk,
|
|
},
|
|
},
|
|
};
|
|
loginClient.login.mockResolvedValue(loginResponseWithWellKnown);
|
|
getComponent({ realQueryParams });
|
|
|
|
await waitFor(() => expect(localStorage.getItem("mx_hs_url")).toEqual(hsUrlFromWk));
|
|
});
|
|
|
|
it("should continue to post login setup when no session is found in local storage", async () => {
|
|
getComponent({ realQueryParams });
|
|
|
|
// logged in but waiting for sync screen
|
|
await screen.findByText("Logout");
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("automatic SSO selection", () => {
|
|
let ssoClient: ReturnType<typeof getMockClientWithEventEmitter>;
|
|
let hrefSetter: jest.Mock<void, [string]>;
|
|
beforeEach(() => {
|
|
ssoClient = getMockClientWithEventEmitter({
|
|
...getMockClientMethods(),
|
|
getHomeserverUrl: jest.fn().mockReturnValue("matrix.example.com"),
|
|
getIdentityServerUrl: jest.fn().mockReturnValue("ident.example.com"),
|
|
getSsoLoginUrl: jest.fn().mockReturnValue("http://my-sso-url"),
|
|
});
|
|
// this is used to create a temporary client to cleanup after logout
|
|
jest.spyOn(MatrixJs, "createClient").mockClear().mockReturnValue(ssoClient);
|
|
mockPlatformPeg();
|
|
// Ensure we don't have a client peg as we aren't logged in.
|
|
unmockClientPeg();
|
|
|
|
hrefSetter = jest.fn();
|
|
const originalHref = window.location.href.toString();
|
|
Object.defineProperty(window, "location", {
|
|
value: {
|
|
get href() {
|
|
return originalHref;
|
|
},
|
|
set href(href) {
|
|
hrefSetter(href);
|
|
},
|
|
},
|
|
writable: true,
|
|
});
|
|
});
|
|
|
|
it("should automatically setup and redirect to SSO login", async () => {
|
|
getComponent({
|
|
initialScreenAfterLogin: {
|
|
screen: "start_sso",
|
|
},
|
|
});
|
|
|
|
await waitFor(() =>
|
|
expect(ssoClient.getSsoLoginUrl).toHaveBeenCalledWith("http://localhost/", "sso", undefined, undefined),
|
|
);
|
|
expect(window.localStorage.getItem(SSO_HOMESERVER_URL_KEY)).toEqual("matrix.example.com");
|
|
expect(window.localStorage.getItem(SSO_ID_SERVER_URL_KEY)).toEqual("ident.example.com");
|
|
expect(hrefSetter).toHaveBeenCalledWith("http://my-sso-url");
|
|
});
|
|
|
|
it("should automatically setup and redirect to CAS login", async () => {
|
|
getComponent({
|
|
initialScreenAfterLogin: {
|
|
screen: "start_cas",
|
|
},
|
|
});
|
|
|
|
await waitFor(() =>
|
|
expect(ssoClient.getSsoLoginUrl).toHaveBeenCalledWith("http://localhost/", "cas", undefined, undefined),
|
|
);
|
|
expect(window.localStorage.getItem(SSO_HOMESERVER_URL_KEY)).toEqual("matrix.example.com");
|
|
expect(window.localStorage.getItem(SSO_ID_SERVER_URL_KEY)).toEqual("ident.example.com");
|
|
expect(hrefSetter).toHaveBeenCalledWith("http://my-sso-url");
|
|
});
|
|
});
|
|
|
|
describe("Multi-tab lockout", () => {
|
|
afterEach(() => {
|
|
Lifecycle.setSessionLockNotStolen();
|
|
});
|
|
|
|
it("waits for other tab to stop during startup", async () => {
|
|
fetchMock.get("/welcome.html", { body: "<h1>Hello</h1>" });
|
|
jest.spyOn(Lifecycle, "attemptDelegatedAuthLogin");
|
|
|
|
// simulate an active window
|
|
localStorage.setItem("react_sdk_session_lock_ping", String(Date.now()));
|
|
|
|
const rendered = getComponent({});
|
|
await flushPromises();
|
|
expect(rendered.container).toMatchSnapshot();
|
|
|
|
// user confirms
|
|
rendered.getByRole("button", { name: "Continue" }).click();
|
|
await flushPromises();
|
|
|
|
// we should have claimed the session, but gone no further
|
|
expect(Lifecycle.attemptDelegatedAuthLogin).not.toHaveBeenCalled();
|
|
const sessionId = localStorage.getItem("react_sdk_session_lock_claimant");
|
|
expect(sessionId).toEqual(expect.stringMatching(/./));
|
|
expect(rendered.container).toMatchSnapshot();
|
|
|
|
// the other tab shuts down
|
|
localStorage.removeItem("react_sdk_session_lock_ping");
|
|
// fire the storage event manually, because writes to localStorage from the same javascript context don't
|
|
// fire it automatically
|
|
window.dispatchEvent(new StorageEvent("storage", { key: "react_sdk_session_lock_ping" }));
|
|
|
|
// startup continues
|
|
await flushPromises();
|
|
expect(Lifecycle.attemptDelegatedAuthLogin).toHaveBeenCalled();
|
|
|
|
// should just show the welcome screen
|
|
await rendered.findByText("Hello");
|
|
expect(rendered.container).toMatchSnapshot();
|
|
});
|
|
|
|
describe("shows the lockout page when a second tab opens", () => {
|
|
beforeEach(() => {
|
|
// make sure we start from a clean DOM for each of these tests
|
|
document.body.replaceChildren();
|
|
});
|
|
|
|
function simulateSessionLockClaim() {
|
|
localStorage.setItem("react_sdk_session_lock_claimant", "testtest");
|
|
window.dispatchEvent(new StorageEvent("storage", { key: "react_sdk_session_lock_claimant" }));
|
|
}
|
|
|
|
it("after a session is restored", async () => {
|
|
await populateStorageForSession();
|
|
|
|
const client = getMockClientWithEventEmitter(getMockClientMethods());
|
|
jest.spyOn(MatrixJs, "createClient").mockReturnValue(client);
|
|
|
|
const rendered = getComponent({});
|
|
await waitForSyncAndLoad(client, true);
|
|
rendered.getByText("Welcome Ernie");
|
|
|
|
// we're now at the welcome page. Another session wants the lock...
|
|
simulateSessionLockClaim();
|
|
await flushPromises();
|
|
expect(rendered.container).toMatchSnapshot();
|
|
});
|
|
|
|
it("while we were waiting for the lock ourselves", async () => {
|
|
// simulate there already being one session
|
|
localStorage.setItem("react_sdk_session_lock_ping", String(Date.now()));
|
|
|
|
const rendered = getComponent({});
|
|
await flushPromises();
|
|
|
|
// user confirms continue
|
|
rendered.getByRole("button", { name: "Continue" }).click();
|
|
await flushPromises();
|
|
expect(rendered.getByTestId("spinner")).toBeInTheDocument();
|
|
|
|
// now a third session starts
|
|
simulateSessionLockClaim();
|
|
await flushPromises();
|
|
expect(rendered.container).toMatchSnapshot();
|
|
});
|
|
|
|
it("while we are checking the sync store", async () => {
|
|
const rendered = getComponent({});
|
|
expect(rendered.getByTestId("spinner")).toBeInTheDocument();
|
|
|
|
// now a third session starts
|
|
simulateSessionLockClaim();
|
|
await flushPromises();
|
|
expect(rendered.container).toMatchSnapshot();
|
|
});
|
|
|
|
it("during crypto init", async () => {
|
|
await populateStorageForSession();
|
|
|
|
const client = new MockClientWithEventEmitter({
|
|
...getMockClientMethods(),
|
|
}) as unknown as Mocked<MatrixClient>;
|
|
jest.spyOn(MatrixJs, "createClient").mockReturnValue(client);
|
|
|
|
// intercept initCrypto and have it block until we complete the deferred
|
|
const initCryptoCompleteDefer = defer();
|
|
const initCryptoCalled = new Promise<void>((resolve) => {
|
|
client.initRustCrypto.mockImplementation(() => {
|
|
resolve();
|
|
return initCryptoCompleteDefer.promise;
|
|
});
|
|
});
|
|
|
|
const rendered = getComponent({});
|
|
await initCryptoCalled;
|
|
console.log("initCrypto called");
|
|
|
|
simulateSessionLockClaim();
|
|
await flushPromises();
|
|
|
|
// now we should see the error page
|
|
rendered.getByText("Test is connected in another tab");
|
|
|
|
// let initCrypto complete, and check we don't get a modal
|
|
initCryptoCompleteDefer.resolve();
|
|
await sleep(10); // Modals take a few ms to appear
|
|
expect(document.body).toMatchSnapshot();
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("mobile registration", () => {
|
|
const getComponentAndWaitForReady = async (): Promise<RenderResult> => {
|
|
const renderResult = getComponent();
|
|
// wait for welcome page chrome render
|
|
await screen.findByText("Powered by Matrix");
|
|
|
|
// go to mobile_register page
|
|
defaultDispatcher.dispatch({
|
|
action: "start_mobile_registration",
|
|
});
|
|
|
|
return renderResult;
|
|
};
|
|
|
|
const enabledMobileRegistration = (): void => {
|
|
jest.spyOn(SettingsStore, "getValue").mockImplementation((settingName: string) => {
|
|
if (settingName === "Registration.mobileRegistrationHelper") return true;
|
|
if (settingName === UIFeature.Registration) return true;
|
|
});
|
|
};
|
|
|
|
it("should render welcome screen if mobile registration is not enabled in settings", async () => {
|
|
await getComponentAndWaitForReady();
|
|
|
|
await screen.findByText("Powered by Matrix");
|
|
});
|
|
|
|
it("should render mobile registration", async () => {
|
|
enabledMobileRegistration();
|
|
|
|
await getComponentAndWaitForReady();
|
|
await flushPromises();
|
|
|
|
expect(screen.getByTestId("mobile-register")).toBeInTheDocument();
|
|
});
|
|
});
|
|
|
|
describe("when key backup failed", () => {
|
|
it("should show the new recovery method dialog", async () => {
|
|
const spy = jest.spyOn(Modal, "createDialog");
|
|
jest.mock("../../../../src/async-components/views/dialogs/security/NewRecoveryMethodDialog", () => ({
|
|
__test: true,
|
|
__esModule: true,
|
|
default: () => <span>mocked dialog</span>,
|
|
}));
|
|
jest.spyOn(mockClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("version");
|
|
|
|
getComponent({});
|
|
defaultDispatcher.dispatch({
|
|
action: "will_start_client",
|
|
});
|
|
await flushPromises();
|
|
mockClient.emit(CryptoEvent.KeyBackupFailed, "error code");
|
|
await waitFor(() => expect(spy).toHaveBeenCalledTimes(1));
|
|
expect((spy.mock.lastCall![0] as any)._payload._result).toEqual(expect.objectContaining({ __test: true }));
|
|
});
|
|
|
|
it("should show the recovery method removed dialog", async () => {
|
|
const spy = jest.spyOn(Modal, "createDialog");
|
|
jest.mock("../../../../src/async-components/views/dialogs/security/RecoveryMethodRemovedDialog", () => ({
|
|
__test: true,
|
|
__esModule: true,
|
|
default: () => <span>mocked dialog</span>,
|
|
}));
|
|
|
|
getComponent({});
|
|
defaultDispatcher.dispatch({
|
|
action: "will_start_client",
|
|
});
|
|
await flushPromises();
|
|
mockClient.emit(CryptoEvent.KeyBackupFailed, "error code");
|
|
await waitFor(() => expect(spy).toHaveBeenCalledTimes(1));
|
|
expect((spy.mock.lastCall![0] as any)._payload._result).toEqual(expect.objectContaining({ __test: true }));
|
|
});
|
|
});
|
|
});
|