1
0
mirror of https://github.com/matrix-org/matrix-react-sdk.git synced 2025-07-28 15:22:05 +03:00

Add .well-known config option to force disable encryption on room creation (#11120)

* force disable encryption on room creation

* test allowChangingEncryption

* move into utils/room directory

* tests

* unit test CreateRoomDialog

* remove debug

* wait for constructor promises to settle

* test case for force_disable

* comment

* set forced value after resolving checkUserIsAllowedToChangeEncryption

* tidy and comments

* use label text in test
This commit is contained in:
Kerry
2023-06-22 09:50:01 +12:00
committed by GitHub
parent 9d9c55d92e
commit a692fe2181
9 changed files with 375 additions and 9 deletions

View File

@ -15,15 +15,15 @@ limitations under the License.
*/
import { mocked, Mocked } from "jest-mock";
import { CryptoApi, MatrixClient, Device } from "matrix-js-sdk/src/matrix";
import { CryptoApi, MatrixClient, Device, Preset } from "matrix-js-sdk/src/matrix";
import { RoomType } from "matrix-js-sdk/src/@types/event";
import { stubClient, setupAsyncStoreWithClient, mockPlatformPeg } from "./test-utils";
import { stubClient, setupAsyncStoreWithClient, mockPlatformPeg, getMockClientWithEventEmitter } from "./test-utils";
import { MatrixClientPeg } from "../src/MatrixClientPeg";
import WidgetStore from "../src/stores/WidgetStore";
import WidgetUtils from "../src/utils/WidgetUtils";
import { JitsiCall, ElementCall } from "../src/models/Call";
import createRoom, { canEncryptToAllUsers } from "../src/createRoom";
import createRoom, { checkUserIsAllowedToChangeEncryption, canEncryptToAllUsers } from "../src/createRoom";
import SettingsStore from "../src/settings/SettingsStore";
describe("createRoom", () => {
@ -207,3 +207,55 @@ describe("canEncryptToAllUsers", () => {
expect(result).toBe(true);
});
});
describe("checkUserIsAllowedToChangeEncryption()", () => {
const mockClient = getMockClientWithEventEmitter({
doesServerForceEncryptionForPreset: jest.fn(),
getClientWellKnown: jest.fn().mockReturnValue({}),
});
beforeEach(() => {
mockClient.doesServerForceEncryptionForPreset.mockClear().mockResolvedValue(false);
mockClient.getClientWellKnown.mockClear().mockReturnValue({});
});
it("should allow changing when neither server nor well known force encryption", async () => {
expect(await checkUserIsAllowedToChangeEncryption(mockClient, Preset.PrivateChat)).toEqual({
allowChange: true,
});
expect(mockClient.doesServerForceEncryptionForPreset).toHaveBeenCalledWith(Preset.PrivateChat);
});
it("should not allow changing when server forces encryption", async () => {
mockClient.doesServerForceEncryptionForPreset.mockResolvedValue(true);
expect(await checkUserIsAllowedToChangeEncryption(mockClient, Preset.PrivateChat)).toEqual({
allowChange: false,
forcedValue: true,
});
});
it("should not allow changing when well-known force_disable is true", async () => {
mockClient.getClientWellKnown.mockReturnValue({
"io.element.e2ee": {
force_disable: true,
},
});
expect(await checkUserIsAllowedToChangeEncryption(mockClient, Preset.PrivateChat)).toEqual({
allowChange: false,
forcedValue: false,
});
});
it("should not allow changing when server forces enabled and wk forces disabled encryption", async () => {
mockClient.getClientWellKnown.mockReturnValue({
"io.element.e2ee": {
force_disable: true,
},
});
mockClient.doesServerForceEncryptionForPreset.mockResolvedValue(true);
expect(await checkUserIsAllowedToChangeEncryption(mockClient, Preset.PrivateChat)).toEqual(
// server's forced enable takes precedence
{ allowChange: false, forcedValue: true },
);
});
});