mirror of
https://github.com/vector-im/element-web.git
synced 2024-11-25 01:48:43 +08:00
27a43e860a
* Use React Suspense when rendering async modals Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Fix test Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Improve coverage Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Improve coverage Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Improve coverage Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Update src/Modal.tsx --------- Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
78 lines
2.9 KiB
TypeScript
78 lines
2.9 KiB
TypeScript
/*
|
|
Copyright 2024 New Vector Ltd.
|
|
Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
|
|
Please see LICENSE files in the repository root for full details.
|
|
*/
|
|
|
|
import { mocked } from "jest-mock";
|
|
import { CryptoApi } from "matrix-js-sdk/src/crypto-api";
|
|
|
|
import { accessSecretStorage } from "../../src/SecurityManager";
|
|
import { filterConsole, stubClient } from "../test-utils";
|
|
import Modal from "../../src/Modal.tsx";
|
|
|
|
jest.mock("react", () => {
|
|
const React = jest.requireActual("react");
|
|
React.lazy = (children: any) => children(); // stub out lazy for dialog test
|
|
return React;
|
|
});
|
|
|
|
describe("SecurityManager", () => {
|
|
describe("accessSecretStorage", () => {
|
|
filterConsole("Not setting dehydration key: no SSSS key found");
|
|
|
|
it("runs the function passed in", async () => {
|
|
// Given a client
|
|
const crypto = {
|
|
bootstrapCrossSigning: () => {},
|
|
bootstrapSecretStorage: () => {},
|
|
} as unknown as CryptoApi;
|
|
const client = stubClient();
|
|
client.secretStorage.hasKey = jest.fn().mockResolvedValue(true);
|
|
mocked(client.getCrypto).mockReturnValue(crypto);
|
|
|
|
// When I run accessSecretStorage
|
|
const func = jest.fn();
|
|
await accessSecretStorage(func);
|
|
|
|
// Then we call the passed-in function
|
|
expect(func).toHaveBeenCalledTimes(1);
|
|
});
|
|
|
|
describe("expecting errors", () => {
|
|
filterConsole("End-to-end encryption is disabled - unable to access secret storage");
|
|
|
|
it("throws if crypto is unavailable", async () => {
|
|
// Given a client with no crypto
|
|
const client = stubClient();
|
|
client.secretStorage.hasKey = jest.fn().mockResolvedValue(true);
|
|
mocked(client.getCrypto).mockReturnValue(undefined);
|
|
|
|
// When I run accessSecretStorage
|
|
// Then we throw an error
|
|
await expect(async () => {
|
|
await accessSecretStorage(jest.fn());
|
|
}).rejects.toThrow("End-to-end encryption is disabled - unable to access secret storage");
|
|
});
|
|
});
|
|
|
|
it("should show CreateSecretStorageDialog if forceReset=true", async () => {
|
|
jest.mock("../../src/async-components/views/dialogs/security/CreateSecretStorageDialog", () => ({
|
|
__test: true,
|
|
__esModule: true,
|
|
default: () => jest.fn(),
|
|
}));
|
|
const spy = jest.spyOn(Modal, "createDialog");
|
|
stubClient();
|
|
|
|
const func = jest.fn();
|
|
accessSecretStorage(func, true);
|
|
|
|
expect(spy).toHaveBeenCalledTimes(1);
|
|
await expect(spy.mock.lastCall![0]).resolves.toEqual(expect.objectContaining({ __test: true }));
|
|
});
|
|
});
|
|
});
|