mirror of
https://github.com/element-hq/element-web.git
synced 2024-12-22 22:40:17 +03:00
0337bd1b0a
* Ensure backup settings in playwright * Fix verification by pass causing backup reset * fix force backup setup by default * fix test * clarify when we need to bootstrap * jslint * post merge fix * post rebase missing files * fix bad merge * update test * Fix import * test user forgot passkey * better usage of locator * fix snapshot * remove getDialogByTitle * Update src/async-components/views/dialogs/security/CreateKeyBackupDialog.tsx Co-authored-by: Richard van der Hoff <1389908+richvdh@users.noreply.github.com> * unneeded permission * code review * cleaning --------- Co-authored-by: Richard van der Hoff <1389908+richvdh@users.noreply.github.com>
62 lines
2.4 KiB
TypeScript
62 lines
2.4 KiB
TypeScript
/*
|
|
Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
import { mocked } from "jest-mock";
|
|
import { CryptoApi } from "matrix-js-sdk/src/crypto-api";
|
|
|
|
import { accessSecretStorage } from "../src/SecurityManager";
|
|
import { filterConsole, stubClient } from "./test-utils";
|
|
|
|
describe("SecurityManager", () => {
|
|
describe("accessSecretStorage", () => {
|
|
filterConsole("Not setting dehydration key: no SSSS key found");
|
|
|
|
it("runs the function passed in", async () => {
|
|
// Given a client
|
|
const crypto = {
|
|
bootstrapCrossSigning: () => {},
|
|
bootstrapSecretStorage: () => {},
|
|
} as unknown as CryptoApi;
|
|
const client = stubClient();
|
|
mocked(client.hasSecretStorageKey).mockResolvedValue(true);
|
|
mocked(client.getCrypto).mockReturnValue(crypto);
|
|
|
|
// When I run accessSecretStorage
|
|
const func = jest.fn();
|
|
await accessSecretStorage(func);
|
|
|
|
// Then we call the passed-in function
|
|
expect(func).toHaveBeenCalledTimes(1);
|
|
});
|
|
|
|
describe("expecting errors", () => {
|
|
filterConsole("End-to-end encryption is disabled - unable to access secret storage");
|
|
|
|
it("throws if crypto is unavailable", async () => {
|
|
// Given a client with no crypto
|
|
const client = stubClient();
|
|
mocked(client.hasSecretStorageKey).mockResolvedValue(true);
|
|
mocked(client.getCrypto).mockReturnValue(undefined);
|
|
|
|
// When I run accessSecretStorage
|
|
// Then we throw an error
|
|
await expect(async () => {
|
|
await accessSecretStorage(jest.fn());
|
|
}).rejects.toThrow("End-to-end encryption is disabled - unable to access secret storage");
|
|
});
|
|
});
|
|
});
|
|
});
|