2022-04-07 14:34:07 +03:00
|
|
|
/*
|
|
|
|
Copyright 2022 The Matrix.org Foundation C.I.C.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
import { mocked } from "jest-mock";
|
|
|
|
import { MatrixClient } from "matrix-js-sdk/src/matrix";
|
|
|
|
import { IDevice } from "matrix-js-sdk/src/crypto/deviceinfo";
|
|
|
|
import { RoomType } from "matrix-js-sdk/src/@types/event";
|
|
|
|
|
|
|
|
import { stubClient, setupAsyncStoreWithClient } from "./test-utils";
|
|
|
|
import { MatrixClientPeg } from "../src/MatrixClientPeg";
|
|
|
|
import WidgetStore from "../src/stores/WidgetStore";
|
|
|
|
import WidgetUtils from "../src/utils/WidgetUtils";
|
2022-06-02 16:10:22 +03:00
|
|
|
import { VIDEO_CHANNEL_MEMBER } from "../src/utils/VideoChannelUtils";
|
2022-04-07 14:34:07 +03:00
|
|
|
import createRoom, { canEncryptToAllUsers } from '../src/createRoom';
|
|
|
|
|
|
|
|
describe("createRoom", () => {
|
|
|
|
let client: MatrixClient;
|
|
|
|
beforeEach(() => {
|
|
|
|
stubClient();
|
|
|
|
client = MatrixClientPeg.get();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("sets up video rooms correctly", async () => {
|
|
|
|
setupAsyncStoreWithClient(WidgetStore.instance, client);
|
|
|
|
jest.spyOn(WidgetUtils, "waitForRoomWidget").mockResolvedValue();
|
|
|
|
|
2022-06-09 16:56:02 +03:00
|
|
|
const userId = client.getUserId();
|
2022-04-07 14:34:07 +03:00
|
|
|
const roomId = await createRoom({ roomType: RoomType.ElementVideo });
|
2022-06-09 16:56:02 +03:00
|
|
|
|
2022-04-07 14:34:07 +03:00
|
|
|
const [[{
|
|
|
|
power_level_content_override: {
|
2022-06-09 16:56:02 +03:00
|
|
|
users: {
|
|
|
|
[userId]: userPower,
|
|
|
|
},
|
|
|
|
events: {
|
|
|
|
"im.vector.modular.widgets": widgetPower,
|
|
|
|
[VIDEO_CHANNEL_MEMBER]: videoMemberPower,
|
|
|
|
},
|
2022-04-07 14:34:07 +03:00
|
|
|
},
|
2022-05-05 00:02:06 +03:00
|
|
|
}]] = mocked(client.createRoom).mock.calls as any; // no good type
|
2022-06-02 16:10:22 +03:00
|
|
|
const [[widgetRoomId, widgetStateKey]] = mocked(client.sendStateEvent).mock.calls;
|
2022-04-07 14:34:07 +03:00
|
|
|
|
2022-06-09 16:56:02 +03:00
|
|
|
// We should have had enough power to be able to set up the Jitsi widget
|
|
|
|
expect(userPower).toBeGreaterThanOrEqual(widgetPower);
|
|
|
|
// and should have actually set it up
|
2022-04-07 14:34:07 +03:00
|
|
|
expect(widgetRoomId).toEqual(roomId);
|
|
|
|
expect(widgetStateKey).toEqual("im.vector.modular.widgets");
|
|
|
|
|
|
|
|
// All members should be able to update their connected devices
|
|
|
|
expect(videoMemberPower).toEqual(0);
|
2022-06-09 16:56:02 +03:00
|
|
|
// Jitsi widget should be immutable for admins
|
|
|
|
expect(widgetPower).toBeGreaterThan(100);
|
|
|
|
// and we should have been reset back to admin
|
|
|
|
expect(client.setPowerLevel).toHaveBeenCalledWith(roomId, userId, 100, undefined);
|
2022-04-07 14:34:07 +03:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("canEncryptToAllUsers", () => {
|
|
|
|
const trueUser = {
|
|
|
|
"@goodUser:localhost": {
|
|
|
|
"DEV1": {} as unknown as IDevice,
|
|
|
|
"DEV2": {} as unknown as IDevice,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
const falseUser = {
|
|
|
|
"@badUser:localhost": {},
|
|
|
|
};
|
|
|
|
|
|
|
|
let client: MatrixClient;
|
|
|
|
beforeEach(() => {
|
|
|
|
stubClient();
|
|
|
|
client = MatrixClientPeg.get();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("returns true if all devices have crypto", async () => {
|
|
|
|
mocked(client.downloadKeys).mockResolvedValue(trueUser);
|
|
|
|
const response = await canEncryptToAllUsers(client, ["@goodUser:localhost"]);
|
|
|
|
expect(response).toBe(true);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("returns false if not all users have crypto", async () => {
|
|
|
|
mocked(client.downloadKeys).mockResolvedValue({ ...trueUser, ...falseUser });
|
|
|
|
const response = await canEncryptToAllUsers(client, ["@goodUser:localhost", "@badUser:localhost"]);
|
|
|
|
expect(response).toBe(false);
|
|
|
|
});
|
|
|
|
});
|