2024-01-10 11:34:03 +01:00
|
|
|
/*
|
2024-09-09 15:57:16 +02:00
|
|
|
Copyright 2024 New Vector Ltd.
|
2024-01-10 11:34:03 +01:00
|
|
|
Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
|
|
|
2024-09-09 15:57:16 +02:00
|
|
|
SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
|
|
|
|
Please see LICENSE files in the repository root for full details.
|
2024-01-10 11:34:03 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
import { mocked } from "jest-mock";
|
|
|
|
import { CryptoApi } from "matrix-js-sdk/src/crypto-api";
|
|
|
|
|
2024-10-15 15:57:26 +02:00
|
|
|
import { accessSecretStorage } from "../../src/SecurityManager";
|
|
|
|
import { filterConsole, stubClient } from "../test-utils";
|
2024-11-12 22:19:11 +01:00
|
|
|
import Modal from "../../src/Modal.tsx";
|
|
|
|
|
|
|
|
jest.mock("react", () => {
|
|
|
|
const React = jest.requireActual("react");
|
|
|
|
React.lazy = (children: any) => children(); // stub out lazy for dialog test
|
|
|
|
return React;
|
|
|
|
});
|
2024-01-10 11:34:03 +01:00
|
|
|
|
|
|
|
describe("SecurityManager", () => {
|
|
|
|
describe("accessSecretStorage", () => {
|
|
|
|
filterConsole("Not setting dehydration key: no SSSS key found");
|
|
|
|
|
|
|
|
it("runs the function passed in", async () => {
|
|
|
|
// Given a client
|
|
|
|
const crypto = {
|
|
|
|
bootstrapCrossSigning: () => {},
|
|
|
|
bootstrapSecretStorage: () => {},
|
|
|
|
} as unknown as CryptoApi;
|
|
|
|
const client = stubClient();
|
2024-07-13 14:36:45 +02:00
|
|
|
client.secretStorage.hasKey = jest.fn().mockResolvedValue(true);
|
2024-01-10 11:34:03 +01:00
|
|
|
mocked(client.getCrypto).mockReturnValue(crypto);
|
|
|
|
|
|
|
|
// When I run accessSecretStorage
|
|
|
|
const func = jest.fn();
|
|
|
|
await accessSecretStorage(func);
|
|
|
|
|
|
|
|
// Then we call the passed-in function
|
|
|
|
expect(func).toHaveBeenCalledTimes(1);
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("expecting errors", () => {
|
|
|
|
filterConsole("End-to-end encryption is disabled - unable to access secret storage");
|
|
|
|
|
|
|
|
it("throws if crypto is unavailable", async () => {
|
|
|
|
// Given a client with no crypto
|
|
|
|
const client = stubClient();
|
2024-07-13 14:36:45 +02:00
|
|
|
client.secretStorage.hasKey = jest.fn().mockResolvedValue(true);
|
2024-01-10 11:34:03 +01:00
|
|
|
mocked(client.getCrypto).mockReturnValue(undefined);
|
|
|
|
|
|
|
|
// When I run accessSecretStorage
|
|
|
|
// Then we throw an error
|
|
|
|
await expect(async () => {
|
|
|
|
await accessSecretStorage(jest.fn());
|
|
|
|
}).rejects.toThrow("End-to-end encryption is disabled - unable to access secret storage");
|
|
|
|
});
|
|
|
|
});
|
2024-11-12 22:19:11 +01:00
|
|
|
|
|
|
|
it("should show CreateSecretStorageDialog if forceReset=true", async () => {
|
|
|
|
jest.mock("../../src/async-components/views/dialogs/security/CreateSecretStorageDialog", () => ({
|
|
|
|
__test: true,
|
|
|
|
__esModule: true,
|
|
|
|
default: () => jest.fn(),
|
|
|
|
}));
|
|
|
|
const spy = jest.spyOn(Modal, "createDialog");
|
|
|
|
stubClient();
|
|
|
|
|
|
|
|
const func = jest.fn();
|
2024-11-19 04:17:24 +01:00
|
|
|
accessSecretStorage(func, { forceReset: true });
|
2024-11-12 22:19:11 +01:00
|
|
|
|
|
|
|
expect(spy).toHaveBeenCalledTimes(1);
|
|
|
|
await expect(spy.mock.lastCall![0]).resolves.toEqual(expect.objectContaining({ __test: true }));
|
|
|
|
});
|
2024-01-10 11:34:03 +01:00
|
|
|
});
|
|
|
|
});
|