2023-02-22 13:39:09 +03:00
|
|
|
/*
|
2024-09-09 16:57:16 +03:00
|
|
|
* Copyright 2024 New Vector Ltd.
|
2023-02-22 13:39:09 +03:00
|
|
|
* Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
|
|
*
|
2024-09-09 16:57:16 +03:00
|
|
|
* SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only
|
|
|
|
* Please see LICENSE files in the repository root for full details.
|
2023-02-22 13:39:09 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
import React from "react";
|
|
|
|
import { render } from "@testing-library/react";
|
|
|
|
import { MatrixEvent } from "matrix-js-sdk/src/matrix";
|
2024-04-25 11:11:41 +03:00
|
|
|
import { mkDecryptionFailureMatrixEvent } from "matrix-js-sdk/src/testing";
|
|
|
|
import { DecryptionFailureCode } from "matrix-js-sdk/src/crypto-api";
|
2023-02-22 13:39:09 +03:00
|
|
|
|
|
|
|
import { mkEvent } from "../../../test-utils";
|
|
|
|
import { DecryptionFailureBody } from "../../../../src/components/views/messages/DecryptionFailureBody";
|
2024-04-25 11:11:41 +03:00
|
|
|
import { LocalDeviceVerificationStateContext } from "../../../../src/contexts/LocalDeviceVerificationStateContext";
|
2023-02-22 13:39:09 +03:00
|
|
|
|
|
|
|
describe("DecryptionFailureBody", () => {
|
2024-04-25 11:11:41 +03:00
|
|
|
function customRender(event: MatrixEvent, localDeviceVerified: boolean = false) {
|
|
|
|
return render(
|
|
|
|
<LocalDeviceVerificationStateContext.Provider value={localDeviceVerified}>
|
|
|
|
<DecryptionFailureBody mxEvent={event} />
|
|
|
|
</LocalDeviceVerificationStateContext.Provider>,
|
|
|
|
);
|
2023-02-22 13:39:09 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
it(`Should display "Unable to decrypt message"`, () => {
|
|
|
|
// When
|
|
|
|
const event = mkEvent({
|
|
|
|
type: "m.room.message",
|
|
|
|
room: "myfakeroom",
|
|
|
|
user: "myfakeuser",
|
|
|
|
content: {
|
|
|
|
msgtype: "m.bad.encrypted",
|
|
|
|
},
|
|
|
|
event: true,
|
|
|
|
});
|
|
|
|
const { container } = customRender(event);
|
|
|
|
|
|
|
|
// Then
|
|
|
|
expect(container).toMatchSnapshot();
|
|
|
|
});
|
|
|
|
|
2024-07-10 12:22:59 +03:00
|
|
|
it(`Should display "The sender has blocked you from receiving this message"`, async () => {
|
2023-02-22 13:39:09 +03:00
|
|
|
// When
|
2024-07-10 12:22:59 +03:00
|
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
|
|
code: DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE,
|
|
|
|
msg: "withheld",
|
|
|
|
roomId: "myfakeroom",
|
|
|
|
sender: "myfakeuser",
|
2023-02-22 13:39:09 +03:00
|
|
|
});
|
2024-07-10 12:22:59 +03:00
|
|
|
|
2023-02-22 13:39:09 +03:00
|
|
|
const { container } = customRender(event);
|
|
|
|
|
|
|
|
// Then
|
|
|
|
expect(container).toMatchSnapshot();
|
|
|
|
});
|
2024-04-25 11:11:41 +03:00
|
|
|
|
|
|
|
it("should handle historical messages with no key backup", async () => {
|
|
|
|
// When
|
|
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
|
|
code: DecryptionFailureCode.HISTORICAL_MESSAGE_NO_KEY_BACKUP,
|
|
|
|
msg: "No backup",
|
|
|
|
roomId: "fakeroom",
|
|
|
|
sender: "fakesender",
|
|
|
|
});
|
|
|
|
const { container } = customRender(event);
|
|
|
|
|
|
|
|
// Then
|
|
|
|
expect(container).toHaveTextContent("Historical messages are not available on this device");
|
|
|
|
});
|
|
|
|
|
|
|
|
it.each([true, false])(
|
|
|
|
"should handle historical messages when there is a backup and device verification is %s",
|
|
|
|
async (verified) => {
|
|
|
|
// When
|
|
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
|
|
code: DecryptionFailureCode.HISTORICAL_MESSAGE_BACKUP_UNCONFIGURED,
|
|
|
|
msg: "Failure",
|
|
|
|
roomId: "fakeroom",
|
|
|
|
sender: "fakesender",
|
|
|
|
});
|
|
|
|
const { container } = customRender(event, verified);
|
|
|
|
|
|
|
|
// Then
|
|
|
|
expect(container).toHaveTextContent(
|
|
|
|
verified ? "Unable to decrypt" : "You need to verify this device for access to historical messages",
|
|
|
|
);
|
|
|
|
},
|
|
|
|
);
|
2024-04-29 20:18:57 +03:00
|
|
|
|
|
|
|
it("should handle undecryptable pre-join messages", async () => {
|
|
|
|
// When
|
|
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
|
|
code: DecryptionFailureCode.HISTORICAL_MESSAGE_USER_NOT_JOINED,
|
|
|
|
msg: "Not joined",
|
|
|
|
roomId: "fakeroom",
|
|
|
|
sender: "fakesender",
|
|
|
|
});
|
|
|
|
const { container } = customRender(event);
|
|
|
|
|
|
|
|
// Then
|
|
|
|
expect(container).toHaveTextContent("You don't have access to this message");
|
|
|
|
});
|
2024-09-30 15:39:25 +03:00
|
|
|
|
|
|
|
it("should handle messages from users who change identities after verification", async () => {
|
|
|
|
// When
|
|
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
|
|
code: DecryptionFailureCode.SENDER_IDENTITY_PREVIOUSLY_VERIFIED,
|
|
|
|
msg: "User previously verified",
|
|
|
|
roomId: "fakeroom",
|
|
|
|
sender: "fakesender",
|
|
|
|
});
|
|
|
|
const { container } = customRender(event);
|
|
|
|
|
|
|
|
// Then
|
|
|
|
expect(container).toMatchSnapshot();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should handle messages from unverified devices", async () => {
|
|
|
|
// When
|
|
|
|
const event = await mkDecryptionFailureMatrixEvent({
|
|
|
|
code: DecryptionFailureCode.UNSIGNED_SENDER_DEVICE,
|
|
|
|
msg: "Unsigned device",
|
|
|
|
roomId: "fakeroom",
|
|
|
|
sender: "fakesender",
|
|
|
|
});
|
|
|
|
const { container } = customRender(event);
|
|
|
|
|
|
|
|
// Then
|
|
|
|
expect(container).toHaveTextContent("Encrypted by a device not verified by its owner");
|
|
|
|
});
|
2023-02-22 13:39:09 +03:00
|
|
|
});
|