1
0
mirror of https://github.com/element-hq/element-web.git synced 2025-08-08 03:42:14 +03:00

Fix logic in DeviceListener (#30230)

* remove incorrect check for cross-signing

SETUP_ENCRYPTION tries to set up everything (4S, cross-signing and key backup),
rather than just setting up encryption, as its name would imply.
crossSigningReady == false happens when the user's device isn't verified, so it
should trigger VERIFY_THIS_SESSION rather than SETUP_ENCRYPTION

* reorder conditions in allSystemsReady to match the order in the if statements

* explicitly handle secrets missing from 4S

rather than falling back to the SETUP_ENCRYPTION catch-all.  Also, remove
SETUP_ENCRYPTION since it is no longer used.

* convert button handlers to switch statements for consistency

(almost) all the other functions that use make decisions based on Kind use
switch statements

* update i18n (remove obsolete string)
This commit is contained in:
Hubert Chathi
2025-06-30 10:01:06 -04:00
committed by GitHub
parent 58875e5cf2
commit 3d56aa7ff6
5 changed files with 176 additions and 93 deletions

View File

@@ -362,7 +362,7 @@ export default class DeviceListener {
// said we are OK with that. // said we are OK with that.
const keyBackupIsOk = keyBackupUploadActive || backupDisabled; const keyBackupIsOk = keyBackupUploadActive || backupDisabled;
const allSystemsReady = crossSigningReady && keyBackupIsOk && recoveryIsOk && allCrossSigningSecretsCached; const allSystemsReady = isCurrentDeviceTrusted && allCrossSigningSecretsCached && keyBackupIsOk && recoveryIsOk;
await this.reportCryptoSessionStateToAnalytics(cli); await this.reportCryptoSessionStateToAnalytics(cli);
@@ -375,13 +375,8 @@ export default class DeviceListener {
// make sure our keys are finished downloading // make sure our keys are finished downloading
await crypto.getUserDeviceInfo([cli.getSafeUserId()]); await crypto.getUserDeviceInfo([cli.getSafeUserId()]);
if (!crossSigningReady) { if (!isCurrentDeviceTrusted) {
// This account is legacy and doesn't have cross-signing set up at all. // the current device is not trusted: prompt the user to verify
// Prompt the user to set it up.
logSpan.info("Cross-signing not ready: showing SET_UP_ENCRYPTION toast");
showSetupEncryptionToast(SetupKind.SET_UP_ENCRYPTION);
} else if (!isCurrentDeviceTrusted) {
// cross signing is ready but the current device is not trusted: prompt the user to verify
logSpan.info("Current device not verified: showing VERIFY_THIS_SESSION toast"); logSpan.info("Current device not verified: showing VERIFY_THIS_SESSION toast");
showSetupEncryptionToast(SetupKind.VERIFY_THIS_SESSION); showSetupEncryptionToast(SetupKind.VERIFY_THIS_SESSION);
} else if (!allCrossSigningSecretsCached) { } else if (!allCrossSigningSecretsCached) {
@@ -410,16 +405,11 @@ export default class DeviceListener {
hideSetupEncryptionToast(); hideSetupEncryptionToast();
} }
} else { } else {
// some other condition... yikes! Show the 'set up encryption' toast: this is what we previously did // If we get here, then we are verified, have key backup, and
// in 'other' situations. Possibly we should consider prompting for a full reset in this case? // 4S, but crypto.isCrossSigningReady returned false, which
logSpan.warn("Couldn't match encryption state to a known case: showing 'setup encryption' prompt", { // means that 4S doesn't have all the secrets.
crossSigningReady, logSpan.warn("4S is missing secrets");
secretStorageReady, showSetupEncryptionToast(SetupKind.KEY_STORAGE_OUT_OF_SYNC_STORE);
allCrossSigningSecretsCached,
isCurrentDeviceTrusted,
defaultKeyId,
});
showSetupEncryptionToast(SetupKind.SET_UP_ENCRYPTION);
} }
} else { } else {
logSpan.info("Not yet ready, but shouldShowSetupEncryptionToast==false"); logSpan.info("Not yet ready, but shouldShowSetupEncryptionToast==false");

View File

@@ -969,7 +969,6 @@
"reset_all_button": "Forgotten or lost all recovery methods? <a>Reset all</a>", "reset_all_button": "Forgotten or lost all recovery methods? <a>Reset all</a>",
"set_up_recovery": "Set up recovery", "set_up_recovery": "Set up recovery",
"set_up_recovery_toast_description": "Generate a recovery key that can be used to restore your encrypted message history in case you lose access to your devices.", "set_up_recovery_toast_description": "Generate a recovery key that can be used to restore your encrypted message history in case you lose access to your devices.",
"set_up_toast_description": "Safeguard against losing access to encrypted messages & data",
"set_up_toast_title": "Set up Secure Backup", "set_up_toast_title": "Set up Secure Backup",
"setup_secure_backup": { "setup_secure_backup": {
"explainer": "Back up your keys before signing out to avoid losing them." "explainer": "Back up your keys before signing out to avoid losing them."

View File

@@ -30,13 +30,12 @@ const TOAST_KEY = "setupencryption";
const getTitle = (kind: Kind): string => { const getTitle = (kind: Kind): string => {
switch (kind) { switch (kind) {
case Kind.SET_UP_ENCRYPTION:
return _t("encryption|set_up_toast_title");
case Kind.SET_UP_RECOVERY: case Kind.SET_UP_RECOVERY:
return _t("encryption|set_up_recovery"); return _t("encryption|set_up_recovery");
case Kind.VERIFY_THIS_SESSION: case Kind.VERIFY_THIS_SESSION:
return _t("encryption|verify_toast_title"); return _t("encryption|verify_toast_title");
case Kind.KEY_STORAGE_OUT_OF_SYNC: case Kind.KEY_STORAGE_OUT_OF_SYNC:
case Kind.KEY_STORAGE_OUT_OF_SYNC_STORE:
return _t("encryption|key_storage_out_of_sync"); return _t("encryption|key_storage_out_of_sync");
case Kind.TURN_ON_KEY_STORAGE: case Kind.TURN_ON_KEY_STORAGE:
return _t("encryption|turn_on_key_storage"); return _t("encryption|turn_on_key_storage");
@@ -45,12 +44,11 @@ const getTitle = (kind: Kind): string => {
const getIcon = (kind: Kind): string | undefined => { const getIcon = (kind: Kind): string | undefined => {
switch (kind) { switch (kind) {
case Kind.SET_UP_ENCRYPTION:
return "secure_backup";
case Kind.SET_UP_RECOVERY: case Kind.SET_UP_RECOVERY:
return undefined; return undefined;
case Kind.VERIFY_THIS_SESSION: case Kind.VERIFY_THIS_SESSION:
case Kind.KEY_STORAGE_OUT_OF_SYNC: case Kind.KEY_STORAGE_OUT_OF_SYNC:
case Kind.KEY_STORAGE_OUT_OF_SYNC_STORE:
return "verification_warning"; return "verification_warning";
case Kind.TURN_ON_KEY_STORAGE: case Kind.TURN_ON_KEY_STORAGE:
return "key_storage"; return "key_storage";
@@ -59,13 +57,12 @@ const getIcon = (kind: Kind): string | undefined => {
const getSetupCaption = (kind: Kind): string => { const getSetupCaption = (kind: Kind): string => {
switch (kind) { switch (kind) {
case Kind.SET_UP_ENCRYPTION:
return _t("action|continue");
case Kind.SET_UP_RECOVERY: case Kind.SET_UP_RECOVERY:
return _t("action|continue"); return _t("action|continue");
case Kind.VERIFY_THIS_SESSION: case Kind.VERIFY_THIS_SESSION:
return _t("action|verify"); return _t("action|verify");
case Kind.KEY_STORAGE_OUT_OF_SYNC: case Kind.KEY_STORAGE_OUT_OF_SYNC:
case Kind.KEY_STORAGE_OUT_OF_SYNC_STORE:
return _t("encryption|enter_recovery_key"); return _t("encryption|enter_recovery_key");
case Kind.TURN_ON_KEY_STORAGE: case Kind.TURN_ON_KEY_STORAGE:
return _t("action|continue"); return _t("action|continue");
@@ -79,6 +76,7 @@ const getSetupCaption = (kind: Kind): string => {
const getPrimaryButtonIcon = (kind: Kind): ComponentType<React.SVGAttributes<SVGElement>> | undefined => { const getPrimaryButtonIcon = (kind: Kind): ComponentType<React.SVGAttributes<SVGElement>> | undefined => {
switch (kind) { switch (kind) {
case Kind.KEY_STORAGE_OUT_OF_SYNC: case Kind.KEY_STORAGE_OUT_OF_SYNC:
case Kind.KEY_STORAGE_OUT_OF_SYNC_STORE:
return KeyIcon; return KeyIcon;
default: default:
return; return;
@@ -89,10 +87,10 @@ const getSecondaryButtonLabel = (kind: Kind): string => {
switch (kind) { switch (kind) {
case Kind.SET_UP_RECOVERY: case Kind.SET_UP_RECOVERY:
return _t("action|dismiss"); return _t("action|dismiss");
case Kind.SET_UP_ENCRYPTION:
case Kind.VERIFY_THIS_SESSION: case Kind.VERIFY_THIS_SESSION:
return _t("encryption|verification|unverified_sessions_toast_reject"); return _t("encryption|verification|unverified_sessions_toast_reject");
case Kind.KEY_STORAGE_OUT_OF_SYNC: case Kind.KEY_STORAGE_OUT_OF_SYNC:
case Kind.KEY_STORAGE_OUT_OF_SYNC_STORE:
return _t("encryption|forgot_recovery_key"); return _t("encryption|forgot_recovery_key");
case Kind.TURN_ON_KEY_STORAGE: case Kind.TURN_ON_KEY_STORAGE:
return _t("action|dismiss"); return _t("action|dismiss");
@@ -101,13 +99,12 @@ const getSecondaryButtonLabel = (kind: Kind): string => {
const getDescription = (kind: Kind): string => { const getDescription = (kind: Kind): string => {
switch (kind) { switch (kind) {
case Kind.SET_UP_ENCRYPTION:
return _t("encryption|set_up_toast_description");
case Kind.SET_UP_RECOVERY: case Kind.SET_UP_RECOVERY:
return _t("encryption|set_up_recovery_toast_description"); return _t("encryption|set_up_recovery_toast_description");
case Kind.VERIFY_THIS_SESSION: case Kind.VERIFY_THIS_SESSION:
return _t("encryption|verify_toast_description"); return _t("encryption|verify_toast_description");
case Kind.KEY_STORAGE_OUT_OF_SYNC: case Kind.KEY_STORAGE_OUT_OF_SYNC:
case Kind.KEY_STORAGE_OUT_OF_SYNC_STORE:
return _t("encryption|key_storage_out_of_sync_description"); return _t("encryption|key_storage_out_of_sync_description");
case Kind.TURN_ON_KEY_STORAGE: case Kind.TURN_ON_KEY_STORAGE:
return _t("encryption|turn_on_key_storage_description"); return _t("encryption|turn_on_key_storage_description");
@@ -118,10 +115,6 @@ const getDescription = (kind: Kind): string => {
* The kind of toast to show. * The kind of toast to show.
*/ */
export enum Kind { export enum Kind {
/**
* Prompt the user to set up encryption
*/
SET_UP_ENCRYPTION = "set_up_encryption",
/** /**
* Prompt the user to set up a recovery key * Prompt the user to set up a recovery key
*/ */
@@ -131,9 +124,13 @@ export enum Kind {
*/ */
VERIFY_THIS_SESSION = "verify_this_session", VERIFY_THIS_SESSION = "verify_this_session",
/** /**
* Prompt the user to enter their recovery key * Prompt the user to enter their recovery key, to retrieve secrets
*/ */
KEY_STORAGE_OUT_OF_SYNC = "key_storage_out_of_sync", KEY_STORAGE_OUT_OF_SYNC = "key_storage_out_of_sync",
/**
* Prompt the user to enter their recovery key, to store secrets
*/
KEY_STORAGE_OUT_OF_SYNC_STORE = "key_storage_out_of_sync_store",
/** /**
* Prompt the user to turn on key storage * Prompt the user to turn on key storage
*/ */
@@ -156,16 +153,22 @@ export const showToast = (kind: Kind): void => {
} }
const onPrimaryClick = async (): Promise<void> => { const onPrimaryClick = async (): Promise<void> => {
if (kind === Kind.VERIFY_THIS_SESSION) { switch (kind) {
Modal.createDialog(SetupEncryptionDialog, {}, undefined, /* priority = */ false, /* static = */ true); case Kind.TURN_ON_KEY_STORAGE: {
} else if (kind == Kind.TURN_ON_KEY_STORAGE) {
// Open the user settings dialog to the encryption tab // Open the user settings dialog to the encryption tab
const payload: OpenToTabPayload = { const payload: OpenToTabPayload = {
action: Action.ViewUserSettings, action: Action.ViewUserSettings,
initialTabId: UserTab.Encryption, initialTabId: UserTab.Encryption,
}; };
defaultDispatcher.dispatch(payload); defaultDispatcher.dispatch(payload);
} else { break;
}
case Kind.VERIFY_THIS_SESSION:
Modal.createDialog(SetupEncryptionDialog, {}, undefined, /* priority = */ false, /* static = */ true);
break;
case Kind.SET_UP_RECOVERY:
case Kind.KEY_STORAGE_OUT_OF_SYNC:
case Kind.KEY_STORAGE_OUT_OF_SYNC_STORE: {
const modal = Modal.createDialog( const modal = Modal.createDialog(
Spinner, Spinner,
undefined, undefined,
@@ -176,15 +179,25 @@ export const showToast = (kind: Kind): void => {
try { try {
await accessSecretStorage(); await accessSecretStorage();
} catch (error) { } catch (error) {
onAccessSecretStorageFailed(error as Error); onAccessSecretStorageFailed(kind, error as Error);
} finally { } finally {
modal.close(); modal.close();
} }
break;
}
} }
}; };
const onSecondaryClick = async (): Promise<void> => { const onSecondaryClick = async (): Promise<void> => {
if (kind === Kind.KEY_STORAGE_OUT_OF_SYNC) { switch (kind) {
case Kind.SET_UP_RECOVERY: {
// Record that the user doesn't want to set up recovery
const deviceListener = DeviceListener.sharedInstance();
await deviceListener.recordRecoveryDisabled();
deviceListener.dismissEncryptionSetup();
break;
}
case Kind.KEY_STORAGE_OUT_OF_SYNC: {
// Open the user settings dialog to the encryption tab and start the flow to reset encryption // Open the user settings dialog to the encryption tab and start the flow to reset encryption
const payload: OpenToTabPayload = { const payload: OpenToTabPayload = {
action: Action.ViewUserSettings, action: Action.ViewUserSettings,
@@ -192,21 +205,34 @@ export const showToast = (kind: Kind): void => {
props: { initialEncryptionState: "reset_identity_forgot" }, props: { initialEncryptionState: "reset_identity_forgot" },
}; };
defaultDispatcher.dispatch(payload); defaultDispatcher.dispatch(payload);
} else if (kind === Kind.TURN_ON_KEY_STORAGE) { break;
}
case Kind.KEY_STORAGE_OUT_OF_SYNC_STORE: {
// Open the user settings dialog to the encryption tab and start the flow to reset 4S
const payload: OpenToTabPayload = {
action: Action.ViewUserSettings,
initialTabId: UserTab.Encryption,
props: { initialEncryptionState: "change_recovery_key" },
};
defaultDispatcher.dispatch(payload);
break;
}
case Kind.TURN_ON_KEY_STORAGE: {
// The user clicked "Dismiss": offer them "Are you sure?" // The user clicked "Dismiss": offer them "Are you sure?"
const modal = Modal.createDialog(ConfirmKeyStorageOffDialog, undefined, "mx_ConfirmKeyStorageOffDialog"); const modal = Modal.createDialog(
ConfirmKeyStorageOffDialog,
undefined,
"mx_ConfirmKeyStorageOffDialog",
);
const [dismissed] = await modal.finished; const [dismissed] = await modal.finished;
if (dismissed) { if (dismissed) {
const deviceListener = DeviceListener.sharedInstance(); const deviceListener = DeviceListener.sharedInstance();
await deviceListener.recordKeyBackupDisabled(); await deviceListener.recordKeyBackupDisabled();
deviceListener.dismissEncryptionSetup(); deviceListener.dismissEncryptionSetup();
} }
} else if (kind === Kind.SET_UP_RECOVERY) { break;
// Record that the user doesn't want to set up recovery }
const deviceListener = DeviceListener.sharedInstance(); default:
await deviceListener.recordRecoveryDisabled();
deviceListener.dismissEncryptionSetup();
} else {
DeviceListener.sharedInstance().dismissEncryptionSetup(); DeviceListener.sharedInstance().dismissEncryptionSetup();
} }
}; };
@@ -215,10 +241,16 @@ export const showToast = (kind: Kind): void => {
* We tried to accessSecretStorage, which triggered us to ask for the * We tried to accessSecretStorage, which triggered us to ask for the
* recovery key, but this failed. If the user just gave up, that is fine, * recovery key, but this failed. If the user just gave up, that is fine,
* but if not, that means downloading encryption info from 4S did not fix * but if not, that means downloading encryption info from 4S did not fix
* the problem we identified. Presumably, something is wrong with what * the problem we identified. Presumably, something is wrong with what they
* they have in 4S: we tell them to reset their identity. * have in 4S. If we were trying to fetch secrets from 4S, we tell them to
* reset their identity, to reset everything. If we were trying to store
* secrets in 4S, or set up recovery, we tell them to change their recovery
* key, to create a new 4S that we can store the secrets in.
*/ */
const onAccessSecretStorageFailed = (error: Error): void => { const onAccessSecretStorageFailed = (
kind: Kind.SET_UP_RECOVERY | Kind.KEY_STORAGE_OUT_OF_SYNC | Kind.KEY_STORAGE_OUT_OF_SYNC_STORE,
error: Error,
): void => {
if (error instanceof AccessCancelledError) { if (error instanceof AccessCancelledError) {
// The user cancelled the dialog - just allow it to close // The user cancelled the dialog - just allow it to close
} else { } else {
@@ -226,7 +258,10 @@ export const showToast = (kind: Kind): void => {
const payload: OpenToTabPayload = { const payload: OpenToTabPayload = {
action: Action.ViewUserSettings, action: Action.ViewUserSettings,
initialTabId: UserTab.Encryption, initialTabId: UserTab.Encryption,
props: { initialEncryptionState: "reset_identity_sync_failed" }, props: {
initialEncryptionState:
kind === Kind.KEY_STORAGE_OUT_OF_SYNC ? "reset_identity_sync_failed" : "change_recovery_key",
},
}; };
defaultDispatcher.dispatch(payload); defaultDispatcher.dispatch(payload);
} }

View File

@@ -307,15 +307,6 @@ describe("DeviceListener", () => {
jest.spyOn(mockClient.getCrypto()!, "isEncryptionEnabledInRoom").mockResolvedValue(true); jest.spyOn(mockClient.getCrypto()!, "isEncryptionEnabledInRoom").mockResolvedValue(true);
}); });
it("hides setup encryption toast when cross signing and secret storage are ready", async () => {
mockCrypto!.isCrossSigningReady.mockResolvedValue(true);
mockCrypto!.isSecretStorageReady.mockResolvedValue(true);
mockCrypto!.getActiveSessionBackupVersion.mockResolvedValue("1");
await createAndStart();
expect(SetupEncryptionToast.hideToast).toHaveBeenCalled();
});
it("hides setup encryption toast when it is dismissed", async () => { it("hides setup encryption toast when it is dismissed", async () => {
const instance = await createAndStart(); const instance = await createAndStart();
instance.dismissEncryptionSetup(); instance.dismissEncryptionSetup();
@@ -360,7 +351,15 @@ describe("DeviceListener", () => {
); );
}); });
it("shows an out-of-sync toast when one of the secrets is missing", async () => { it("hides setup encryption toast when cross signing and secret storage are ready", async () => {
mockCrypto!.isSecretStorageReady.mockResolvedValue(true);
mockCrypto!.getActiveSessionBackupVersion.mockResolvedValue("1");
await createAndStart();
expect(SetupEncryptionToast.hideToast).toHaveBeenCalled();
});
it("shows an out-of-sync toast when one of the secrets is missing locally", async () => {
mockCrypto!.getCrossSigningStatus.mockResolvedValue({ mockCrypto!.getCrossSigningStatus.mockResolvedValue({
publicKeysOnDevice: true, publicKeysOnDevice: true,
privateKeysInSecretStorage: true, privateKeysInSecretStorage: true,
@@ -378,7 +377,7 @@ describe("DeviceListener", () => {
); );
}); });
it("hides the out-of-sync toast when one of the secrets is missing", async () => { it("hides the out-of-sync toast after we receive the missing secrets", async () => {
mockCrypto!.isSecretStorageReady.mockResolvedValue(true); mockCrypto!.isSecretStorageReady.mockResolvedValue(true);
mockCrypto!.getActiveSessionBackupVersion.mockResolvedValue("1"); mockCrypto!.getActiveSessionBackupVersion.mockResolvedValue("1");
@@ -427,6 +426,18 @@ describe("DeviceListener", () => {
SetupEncryptionToast.Kind.SET_UP_RECOVERY, SetupEncryptionToast.Kind.SET_UP_RECOVERY,
); );
}); });
it("shows an out-of-sync toast when one of the secrets is missing from 4S", async () => {
mockCrypto.getKeyBackupInfo.mockResolvedValue({} as unknown as KeyBackupInfo);
mockCrypto.getActiveSessionBackupVersion.mockResolvedValue("1");
mockClient.secretStorage.getDefaultKeyId.mockResolvedValue("foo");
await createAndStart();
expect(SetupEncryptionToast.showToast).toHaveBeenCalledWith(
SetupEncryptionToast.Kind.KEY_STORAGE_OUT_OF_SYNC_STORE,
);
});
}); });
}); });
@@ -448,6 +459,16 @@ describe("DeviceListener", () => {
}); });
it("dispatches keybackup event when key backup is not enabled", async () => { it("dispatches keybackup event when key backup is not enabled", async () => {
mockCrypto!.isCrossSigningReady.mockResolvedValue(true);
// current device is verified
mockCrypto!.getDeviceVerificationStatus.mockResolvedValue(
new DeviceVerificationStatus({
trustCrossSignedDevices: true,
crossSigningVerified: true,
}),
);
mockCrypto.getActiveSessionBackupVersion.mockResolvedValue(null); mockCrypto.getActiveSessionBackupVersion.mockResolvedValue(null);
mockClient.getAccountDataFromServer.mockImplementation((eventType) => mockClient.getAccountDataFromServer.mockImplementation((eventType) =>
eventType === BACKUP_DISABLED_ACCOUNT_DATA_KEY ? ({ disabled: true } as any) : null, eventType === BACKUP_DISABLED_ACCOUNT_DATA_KEY ? ({ disabled: true } as any) : null,

View File

@@ -50,7 +50,7 @@ describe("SetupEncryptionToast", () => {
}); });
}); });
describe("Key storage out of sync", () => { describe("Key storage out of sync (retrieve secrets)", () => {
it("should render the toast", async () => { it("should render the toast", async () => {
showToast(Kind.KEY_STORAGE_OUT_OF_SYNC); showToast(Kind.KEY_STORAGE_OUT_OF_SYNC);
@@ -88,6 +88,44 @@ describe("SetupEncryptionToast", () => {
}); });
}); });
describe("Key storage out of sync (store secrets)", () => {
it("should render the toast", async () => {
showToast(Kind.KEY_STORAGE_OUT_OF_SYNC_STORE);
await expect(screen.findByText("Your key storage is out of sync.")).resolves.toBeInTheDocument();
});
it("should open settings to the reset flow when 'forgot recovery key' clicked", async () => {
showToast(Kind.KEY_STORAGE_OUT_OF_SYNC_STORE);
const user = userEvent.setup();
await user.click(await screen.findByText("Forgot recovery key?"));
expect(dis.dispatch).toHaveBeenCalledWith({
action: "view_user_settings",
initialTabId: "USER_ENCRYPTION_TAB",
props: { initialEncryptionState: "change_recovery_key" },
});
});
it("should open settings to the reset flow when recovering fails", async () => {
jest.spyOn(SecurityManager, "accessSecretStorage").mockImplementation(async () => {
throw new Error("Something went wrong while recovering!");
});
showToast(Kind.KEY_STORAGE_OUT_OF_SYNC_STORE);
const user = userEvent.setup();
await user.click(await screen.findByText("Enter recovery key"));
expect(dis.dispatch).toHaveBeenCalledWith({
action: "view_user_settings",
initialTabId: "USER_ENCRYPTION_TAB",
props: { initialEncryptionState: "change_recovery_key" },
});
});
});
describe("Turn on key storage", () => { describe("Turn on key storage", () => {
it("should render the toast", async () => { it("should render the toast", async () => {
showToast(Kind.TURN_ON_KEY_STORAGE); showToast(Kind.TURN_ON_KEY_STORAGE);