diff --git a/test/components/structures/__snapshots__/MatrixChat-test.tsx.snap b/test/components/structures/__snapshots__/MatrixChat-test.tsx.snap index bf03f84a6e..e6765a4da9 100644 --- a/test/components/structures/__snapshots__/MatrixChat-test.tsx.snap +++ b/test/components/structures/__snapshots__/MatrixChat-test.tsx.snap @@ -287,7 +287,7 @@ exports[` with a soft-logged-out session should show the soft-logo Clear personal data

- Warning: your personal data (including encryption keys) is still stored in this session. Clear it if you're finished using this session, or want to sign in to another account. + Warning: your personal data (including encryption keys) is still stored in this device. Clear it if you're finished using this device, or want to sign in to another account.

{ it("Prompts user to connect backup if there is a backup on the server", async () => { mockClient.getKeyBackupVersion.mockResolvedValue({} as KeyBackupInfo); const rendered = renderComponent(); - await rendered.findByText("Connect this session to Key Backup"); + await rendered.findByText("Connect this device to Key Backup"); expect(rendered.container).toMatchSnapshot(); }); diff --git a/test/components/views/dialogs/ManualDeviceKeyVerificationDialog-test.tsx b/test/components/views/dialogs/ManualDeviceKeyVerificationDialog-test.tsx index c411c2caa4..5d773faa1a 100644 --- a/test/components/views/dialogs/ManualDeviceKeyVerificationDialog-test.tsx +++ b/test/components/views/dialogs/ManualDeviceKeyVerificationDialog-test.tsx @@ -83,7 +83,7 @@ describe("ManualDeviceKeyVerificationDialog", () => { const onFinished = jest.fn(); renderDialog(mockClient.getUserId()!, device, onFinished); - screen.getByRole("button", { name: "Verify session" }).click(); + screen.getByRole("button", { name: "Verify device" }).click(); // Then expect(onFinished).toHaveBeenCalledWith(true); diff --git a/test/components/views/dialogs/__snapshots__/LogoutDialog-test.tsx.snap b/test/components/views/dialogs/__snapshots__/LogoutDialog-test.tsx.snap index 3219b1fa72..c74e7e6521 100644 --- a/test/components/views/dialogs/__snapshots__/LogoutDialog-test.tsx.snap +++ b/test/components/views/dialogs/__snapshots__/LogoutDialog-test.tsx.snap @@ -61,7 +61,7 @@ exports[`LogoutDialog Prompts user to connect backup if there is a backup on the data-testid="dialog-primary-button" type="button" > - Connect this session to Key Backup + Connect this device to Key Backup
diff --git a/test/components/views/dialogs/__snapshots__/ManualDeviceKeyVerificationDialog-test.tsx.snap b/test/components/views/dialogs/__snapshots__/ManualDeviceKeyVerificationDialog-test.tsx.snap index a115bf96be..731211d74a 100644 --- a/test/components/views/dialogs/__snapshots__/ManualDeviceKeyVerificationDialog-test.tsx.snap +++ b/test/components/views/dialogs/__snapshots__/ManualDeviceKeyVerificationDialog-test.tsx.snap @@ -21,7 +21,7 @@ exports[`ManualDeviceKeyVerificationDialog should display the device 1`] = ` class="mx_Heading_h3 mx_Dialog_title" id="mx_BaseDialog_title" > - Verify session + Verify device

- Confirm by comparing the following with the User Settings in your other session: + Confirm by comparing the following with the User Settings in your other device:

- Verify session + Verify device
@@ -136,7 +136,7 @@ exports[`ManualDeviceKeyVerificationDialog should display the device of another class="mx_Heading_h3 mx_Dialog_title" id="mx_BaseDialog_title" > - Verify session + Verify device

- Confirm this user's session by comparing the following with their User Settings: + Confirm this user's device by comparing the following with their User Settings:

- Verify session + Verify device
diff --git a/test/components/views/dialogs/security/__snapshots__/CreateSecretStorageDialog-test.tsx.snap b/test/components/views/dialogs/security/__snapshots__/CreateSecretStorageDialog-test.tsx.snap index 3ba1018ae1..e6ad1df146 100644 --- a/test/components/views/dialogs/security/__snapshots__/CreateSecretStorageDialog-test.tsx.snap +++ b/test/components/views/dialogs/security/__snapshots__/CreateSecretStorageDialog-test.tsx.snap @@ -194,7 +194,7 @@ exports[`CreateSecretStorageDialog when backup is present but not trusted shows

- Upgrade this session to allow it to verify other sessions, granting them access to encrypted messages and marking them as trusted for other users. + Upgrade this device to allow it to verify other devices, granting them access to encrypted messages and marking them as trusted for other users.

@@ -261,7 +261,7 @@ exports[`CreateSecretStorageDialog when canUploadKeysWithPasswordOnly calls boot

- Upgrade this session to allow it to verify other sessions, granting them access to encrypted messages and marking them as trusted for other users. + Upgrade this device to allow it to verify other devices, granting them access to encrypted messages and marking them as trusted for other users.

@@ -347,7 +347,7 @@ exports[`CreateSecretStorageDialog when canUploadKeysWithPasswordOnly prompts fo

- Upgrade this session to allow it to verify other sessions, granting them access to encrypted messages and marking them as trusted for other users. + Upgrade this device to allow it to verify other devices, granting them access to encrypted messages and marking them as trusted for other users.

@@ -433,7 +433,7 @@ exports[`CreateSecretStorageDialog when canUploadKeysWithPasswordOnly when there

- Upgrade this session to allow it to verify other sessions, granting them access to encrypted messages and marking them as trusted for other users. + Upgrade this device to allow it to verify other devices, granting them access to encrypted messages and marking them as trusted for other users.

diff --git a/test/components/views/right_panel/UserInfo-test.tsx b/test/components/views/right_panel/UserInfo-test.tsx index 1c9e375e04..624b0c7626 100644 --- a/test/components/views/right_panel/UserInfo-test.tsx +++ b/test/components/views/right_panel/UserInfo-test.tsx @@ -383,7 +383,7 @@ describe("", () => { await act(flushPromises); // check the button exists with the expected text - const devicesButton = screen.getByRole("button", { name: "1 session" }); + const devicesButton = screen.getByRole("button", { name: "1 device" }); // click it await userEvent.click(devicesButton); @@ -434,7 +434,7 @@ describe("", () => { await act(flushPromises); // check the button exists with the expected text (the dehydrated device shouldn't be counted) - const devicesButton = screen.getByRole("button", { name: "1 session" }); + const devicesButton = screen.getByRole("button", { name: "1 device" }); // click it await act(() => { @@ -482,7 +482,7 @@ describe("", () => { await act(flushPromises); // check the button exists with the expected text (the dehydrated device shouldn't be counted) - const devicesButton = screen.getByRole("button", { name: "1 verified session" }); + const devicesButton = screen.getByRole("button", { name: "1 verified device" }); // click it await act(() => { @@ -562,7 +562,7 @@ describe("", () => { await act(flushPromises); // check the button exists with the expected text (the dehydrated device shouldn't be counted) - const devicesButton = screen.getByRole("button", { name: "2 sessions" }); + const devicesButton = screen.getByRole("button", { name: "2 devices" }); // click it await act(() => { diff --git a/test/components/views/right_panel/__snapshots__/UserInfo-test.tsx.snap b/test/components/views/right_panel/__snapshots__/UserInfo-test.tsx.snap index 95f75eadc8..dc3b28c89d 100644 --- a/test/components/views/right_panel/__snapshots__/UserInfo-test.tsx.snap +++ b/test/components/views/right_panel/__snapshots__/UserInfo-test.tsx.snap @@ -183,7 +183,7 @@ exports[` with crypto enabled renders 1`] = ` class="mx_E2EIcon mx_E2EIcon_normal" />
- 1 session + 1 device
diff --git a/test/components/views/rooms/EventTile-test.tsx b/test/components/views/rooms/EventTile-test.tsx index cb4cbc56f0..1bd5340e0e 100644 --- a/test/components/views/rooms/EventTile-test.tsx +++ b/test/components/views/rooms/EventTile-test.tsx @@ -267,7 +267,7 @@ describe("EventTile", () => { [EventShieldReason.UNSIGNED_DEVICE, "device not verified by its owner"], [EventShieldReason.UNKNOWN_DEVICE, "unknown or deleted device"], [EventShieldReason.AUTHENTICITY_NOT_GUARANTEED, "can't be guaranteed"], - [EventShieldReason.MISMATCHED_SENDER_KEY, "Encrypted by an unverified session"], + [EventShieldReason.MISMATCHED_SENDER_KEY, "Encrypted by an unverified device"], ])("shows the correct reason code for %i (%s)", async (reasonCode: EventShieldReason, expectedText: string) => { mxEvent = await mkEncryptedMatrixEvent({ plainContent: { msgtype: "m.text", body: "msg1" }, diff --git a/test/components/views/rooms/MemberTile-test.tsx b/test/components/views/rooms/MemberTile-test.tsx index 5f96147a50..ececad0402 100644 --- a/test/components/views/rooms/MemberTile-test.tsx +++ b/test/components/views/rooms/MemberTile-test.tsx @@ -53,7 +53,7 @@ describe("MemberTile", () => { await waitFor(async () => { await userEvent.hover(container.querySelector(".mx_E2EIcon")!); expect( - screen.getByRole("tooltip", { name: "This user has not verified all of their sessions." }), + screen.getByRole("tooltip", { name: "This user has not verified all of their devices." }), ).toBeInTheDocument(); }); }); @@ -78,7 +78,7 @@ describe("MemberTile", () => { await userEvent.hover(container.querySelector(".mx_E2EIcon")!); expect( screen.getByRole("tooltip", { - name: "You have verified this user. This user has verified all of their sessions.", + name: "You have verified this user. This user has verified all of their devices.", }), ).toBeInTheDocument(); }); diff --git a/test/components/views/settings/CrossSigningPanel-test.tsx b/test/components/views/settings/CrossSigningPanel-test.tsx index 501b0fe901..b025619248 100644 --- a/test/components/views/settings/CrossSigningPanel-test.tsx +++ b/test/components/views/settings/CrossSigningPanel-test.tsx @@ -134,7 +134,7 @@ describe("", () => { await flushPromises(); expect(screen.getByTestId("summarised-status").innerHTML).toEqual( - "Your account has a cross-signing identity in secret storage, but it is not yet trusted by this session.", + "Your account has a cross-signing identity in secret storage, but it is not yet trusted by this device.", ); expect(screen.getByText("Cross-signing private keys:").parentElement!).toMatchSnapshot(); }); diff --git a/test/components/views/settings/SecureBackupPanel-test.tsx b/test/components/views/settings/SecureBackupPanel-test.tsx index cadd0353aa..46d1af08c9 100644 --- a/test/components/views/settings/SecureBackupPanel-test.tsx +++ b/test/components/views/settings/SecureBackupPanel-test.tsx @@ -104,7 +104,7 @@ describe("", () => { // flush checkKeyBackup promise await flushPromises(); - expect(screen.getByText("✅ This session is backing up your keys.")).toBeInTheDocument(); + expect(screen.getByText("✅ This device is backing up your keys.")).toBeInTheDocument(); }); it("asks for confirmation before deleting a backup", async () => { diff --git a/test/components/views/settings/__snapshots__/SecureBackupPanel-test.tsx.snap b/test/components/views/settings/__snapshots__/SecureBackupPanel-test.tsx.snap index 718df62fee..19caa590ac 100644 --- a/test/components/views/settings/__snapshots__/SecureBackupPanel-test.tsx.snap +++ b/test/components/views/settings/__snapshots__/SecureBackupPanel-test.tsx.snap @@ -5,7 +5,7 @@ exports[` handles error fetching backup 1`] = `
- Back up your encryption keys with your account data in case you lose access to your sessions. Your keys will be secured with a unique Security Key. + Back up your encryption keys with your account data in case you lose access to your devices. Your keys will be secured with a unique Security Key.
suggests connecting session to key backup when ba
- Back up your encryption keys with your account data in case you lose access to your sessions. Your keys will be secured with a unique Security Key. + Back up your encryption keys with your account data in case you lose access to your devices. Your keys will be secured with a unique Security Key.
- This session is + This device is not backing up your keys @@ -88,7 +88,7 @@ exports[` suggests connecting session to key backup when ba
- Connect this session to key backup before signing out to avoid losing any keys that may only be on this session. + Connect this device to key backup before signing out to avoid losing any keys that may only be on this device.
suggests connecting session to key backup when ba role="button" tabindex="0" > - Connect this session to Key Backup + Connect this device to Key Backup
", () => { await flushPromisesWithFakeTimers(); // error message displayed - expect(queryByText("Failed to set session name")).toBeTruthy(); + expect(queryByText("Failed to set device name")).toBeTruthy(); // spinner removed expect(container.getElementsByClassName("mx_Spinner").length).toBeFalsy(); diff --git a/test/components/views/settings/devices/DeviceTypeIcon-test.tsx b/test/components/views/settings/devices/DeviceTypeIcon-test.tsx index 417f1cd27b..49c1214d45 100644 --- a/test/components/views/settings/devices/DeviceTypeIcon-test.tsx +++ b/test/components/views/settings/devices/DeviceTypeIcon-test.tsx @@ -44,30 +44,30 @@ describe("", () => { it("renders an unknown device icon when no device type given", () => { const { getByLabelText } = render(getComponent()); - expect(getByLabelText("Unknown session type")).toBeTruthy(); + expect(getByLabelText("Unknown device type")).toBeTruthy(); }); it("renders a desktop device type", () => { const deviceType = DeviceType.Desktop; const { getByLabelText } = render(getComponent({ deviceType })); - expect(getByLabelText("Desktop session")).toBeTruthy(); + expect(getByLabelText("Desktop device")).toBeTruthy(); }); it("renders a web device type", () => { const deviceType = DeviceType.Web; const { getByLabelText } = render(getComponent({ deviceType })); - expect(getByLabelText("Web session")).toBeTruthy(); + expect(getByLabelText("Web device")).toBeTruthy(); }); it("renders a mobile device type", () => { const deviceType = DeviceType.Mobile; const { getByLabelText } = render(getComponent({ deviceType })); - expect(getByLabelText("Mobile session")).toBeTruthy(); + expect(getByLabelText("Mobile device")).toBeTruthy(); }); it("renders an unknown device type", () => { const deviceType = DeviceType.Unknown; const { getByLabelText } = render(getComponent({ deviceType })); - expect(getByLabelText("Unknown session type")).toBeTruthy(); + expect(getByLabelText("Unknown device type")).toBeTruthy(); }); }); diff --git a/test/components/views/settings/devices/DeviceVerificationStatusCard-test.tsx b/test/components/views/settings/devices/DeviceVerificationStatusCard-test.tsx index 51af424816..4987e9e6c1 100644 --- a/test/components/views/settings/devices/DeviceVerificationStatusCard-test.tsx +++ b/test/components/views/settings/devices/DeviceVerificationStatusCard-test.tsx @@ -53,7 +53,7 @@ describe("", () => { // current device uses different copy it("renders an unverified device", () => { const { getByText } = render(getComponent({ isCurrentDevice: true })); - expect(getByText("Verify your current session for enhanced secure messaging.")).toBeTruthy(); + expect(getByText("Verify your current device for enhanced secure messaging.")).toBeTruthy(); }); it("renders an unverifiable device", () => { @@ -63,7 +63,7 @@ describe("", () => { isCurrentDevice: true, }), ); - expect(getByText("This session doesn't support encryption and thus can't be verified.")).toBeTruthy(); + expect(getByText("This device doesn't support encryption and thus can't be verified.")).toBeTruthy(); }); it("renders a verified device", () => { @@ -73,7 +73,7 @@ describe("", () => { isCurrentDevice: true, }), ); - expect(getByText("Your current session is ready for secure messaging.")).toBeTruthy(); + expect(getByText("Your current device is ready for secure messaging.")).toBeTruthy(); }); }); diff --git a/test/components/views/settings/devices/__snapshots__/CurrentDeviceSection-test.tsx.snap b/test/components/views/settings/devices/__snapshots__/CurrentDeviceSection-test.tsx.snap index 93f53a7ece..1bc29f2ab8 100644 --- a/test/components/views/settings/devices/__snapshots__/CurrentDeviceSection-test.tsx.snap +++ b/test/components/views/settings/devices/__snapshots__/CurrentDeviceSection-test.tsx.snap @@ -44,12 +44,12 @@ HTMLCollection [

- Unverified session + Unverified device

- Verify your current session for enhanced secure messaging. + Verify your current device for enhanced secure messaging.

@@ -79,7 +79,7 @@ HTMLCollection [

- Session details + Device details

- Session ID + Device ID
- Sign out of this session + Sign out of this device @@ -133,7 +133,7 @@ exports[` handles when device is falsy 1`] = `

- Current session + Current device

renders device and correct security card when

- Current session + Current device

@@ -314,7 +314,7 @@ exports[` renders device and correct security card when

- Current session + Current device

diff --git a/test/components/views/settings/devices/__snapshots__/DeviceDetailHeading-test.tsx.snap b/test/components/views/settings/devices/__snapshots__/DeviceDetailHeading-test.tsx.snap index b9c63774cd..2c09938514 100644 --- a/test/components/views/settings/devices/__snapshots__/DeviceDetailHeading-test.tsx.snap +++ b/test/components/views/settings/devices/__snapshots__/DeviceDetailHeading-test.tsx.snap @@ -12,7 +12,7 @@ exports[` displays name edit form on rename button click class="mx_DeviceDetailHeading_renameFormHeading" id="device-rename-123" > - Rename session + Rename device

displays name edit form on rename button click class="mx_Caption" id="device-rename-description-123" > - Please be aware that session names are also visible to people you communicate with. + Please be aware that device names are also visible to people you communicate with.