2023-07-27 11:21:20 +02:00
|
|
|
/*
|
|
|
|
Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
import React from "react";
|
|
|
|
import { screen, fireEvent, render, waitFor } from "@testing-library/react";
|
|
|
|
import userEvent from "@testing-library/user-event";
|
2024-02-06 15:46:15 +01:00
|
|
|
import { CryptoApi, IMegolmSessionData } from "matrix-js-sdk/src/matrix";
|
2023-07-27 11:21:20 +02:00
|
|
|
|
2024-02-06 15:46:15 +01:00
|
|
|
import * as MegolmExportEncryption from "../../../../../src/utils/MegolmExportEncryption";
|
2023-07-27 11:21:20 +02:00
|
|
|
import ExportE2eKeysDialog from "../../../../../src/async-components/views/dialogs/security/ExportE2eKeysDialog";
|
|
|
|
import { createTestClient } from "../../../../test-utils";
|
|
|
|
|
|
|
|
describe("ExportE2eKeysDialog", () => {
|
|
|
|
it("renders", () => {
|
|
|
|
const cli = createTestClient();
|
|
|
|
const onFinished = jest.fn();
|
|
|
|
const { asFragment } = render(<ExportE2eKeysDialog matrixClient={cli} onFinished={onFinished} />);
|
|
|
|
expect(asFragment()).toMatchSnapshot();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should have disabled submit button initially", () => {
|
|
|
|
const cli = createTestClient();
|
|
|
|
const onFinished = jest.fn();
|
|
|
|
const { container } = render(<ExportE2eKeysDialog matrixClient={cli} onFinished={onFinished} />);
|
|
|
|
fireEvent.click(container.querySelector("[type=submit]")!);
|
|
|
|
expect(screen.getByText("Enter passphrase")).toBeInTheDocument();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should complain about weak passphrases", async () => {
|
|
|
|
const cli = createTestClient();
|
|
|
|
const onFinished = jest.fn();
|
|
|
|
|
|
|
|
const { container } = render(<ExportE2eKeysDialog matrixClient={cli} onFinished={onFinished} />);
|
|
|
|
const input = screen.getByLabelText("Enter passphrase");
|
|
|
|
await userEvent.type(input, "password");
|
|
|
|
fireEvent.click(container.querySelector("[type=submit]")!);
|
|
|
|
await expect(screen.findByText("This is a top-10 common password")).resolves.toBeInTheDocument();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should complain if passphrases don't match", async () => {
|
|
|
|
const cli = createTestClient();
|
|
|
|
const onFinished = jest.fn();
|
|
|
|
|
|
|
|
const { container } = render(<ExportE2eKeysDialog matrixClient={cli} onFinished={onFinished} />);
|
|
|
|
await userEvent.type(screen.getByLabelText("Enter passphrase"), "ThisIsAMoreSecurePW123$$");
|
|
|
|
await userEvent.type(screen.getByLabelText("Confirm passphrase"), "ThisIsAMoreSecurePW124$$");
|
|
|
|
fireEvent.click(container.querySelector("[type=submit]")!);
|
|
|
|
await expect(screen.findByText("Passphrases must match")).resolves.toBeInTheDocument();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should export if everything is fine", async () => {
|
2024-02-06 15:46:15 +01:00
|
|
|
// Given a client able to export keys
|
2023-07-27 11:21:20 +02:00
|
|
|
const cli = createTestClient();
|
2024-02-06 15:46:15 +01:00
|
|
|
const keys: IMegolmSessionData[] = [];
|
|
|
|
const passphrase = "ThisIsAMoreSecurePW123$$";
|
2024-02-14 11:33:39 +01:00
|
|
|
const exportRoomKeysAsJson = jest.fn().mockResolvedValue(JSON.stringify(keys));
|
2024-02-06 15:46:15 +01:00
|
|
|
cli.getCrypto = () => {
|
|
|
|
return {
|
2024-02-14 11:33:39 +01:00
|
|
|
exportRoomKeysAsJson,
|
2024-02-06 15:46:15 +01:00
|
|
|
} as unknown as CryptoApi;
|
|
|
|
};
|
2023-07-27 11:21:20 +02:00
|
|
|
|
2024-02-06 15:46:15 +01:00
|
|
|
// Mock the result of encrypting the sessions. If we don't do this, the
|
|
|
|
// encryption process fails, possibly because we didn't initialise
|
|
|
|
// something.
|
|
|
|
jest.spyOn(MegolmExportEncryption, "encryptMegolmKeyFile").mockResolvedValue(new ArrayBuffer(3));
|
|
|
|
|
|
|
|
// When we tell the dialog to export
|
|
|
|
const { container } = render(<ExportE2eKeysDialog matrixClient={cli} onFinished={jest.fn()} />);
|
|
|
|
await userEvent.type(screen.getByLabelText("Enter passphrase"), passphrase);
|
|
|
|
await userEvent.type(screen.getByLabelText("Confirm passphrase"), passphrase);
|
2023-07-27 11:21:20 +02:00
|
|
|
fireEvent.click(container.querySelector("[type=submit]")!);
|
2024-02-06 15:46:15 +01:00
|
|
|
|
|
|
|
// Then it exports keys and encrypts them
|
2024-02-14 11:33:39 +01:00
|
|
|
await waitFor(() => expect(exportRoomKeysAsJson).toHaveBeenCalled());
|
2024-02-06 15:46:15 +01:00
|
|
|
await waitFor(() =>
|
|
|
|
expect(MegolmExportEncryption.encryptMegolmKeyFile).toHaveBeenCalledWith(JSON.stringify(keys), passphrase),
|
|
|
|
);
|
2023-07-27 11:21:20 +02:00
|
|
|
});
|
|
|
|
});
|