You've already forked joplin
mirror of
https://github.com/laurent22/joplin.git
synced 2025-07-13 00:10:37 +02:00
Desktop: Fixed images not being visible on encrypted published notes
This commit is contained in:
@ -1,9 +1,9 @@
|
||||
import Note from '../../models/Note';
|
||||
import { createFolderTree, encryptionService, loadEncryptionMasterKey, msleep, resourceService, setupDatabaseAndSynchronizer, simulateReadOnlyShareEnv, supportDir, switchClient } from '../../testing/test-utils';
|
||||
import { createFolderTree, encryptionService, loadEncryptionMasterKey, msleep, resourceService, setupDatabaseAndSynchronizer, simulateReadOnlyShareEnv, supportDir, switchClient, synchronizerStart } from '../../testing/test-utils';
|
||||
import ShareService from './ShareService';
|
||||
import reducer, { defaultState } from '../../reducer';
|
||||
import { createStore } from 'redux';
|
||||
import { NoteEntity } from '../database/types';
|
||||
import { NoteEntity, ResourceEntity } from '../database/types';
|
||||
import Folder from '../../models/Folder';
|
||||
import { setEncryptionEnabled, setPpk } from '../synchronizer/syncInfoUtils';
|
||||
import { generateKeyPair } from '../e2ee/ppk';
|
||||
@ -18,6 +18,7 @@ import BaseItem from '../../models/BaseItem';
|
||||
import ResourceService from '../ResourceService';
|
||||
import Setting from '../../models/Setting';
|
||||
import { ModelType } from '../../BaseModel';
|
||||
import { remoteNotesFoldersResources } from '../../testing/test-utils-synchronizer';
|
||||
|
||||
interface TestShareFolderServiceOptions {
|
||||
master_key_id?: string;
|
||||
@ -36,6 +37,18 @@ function mockService(api: any) {
|
||||
return service;
|
||||
}
|
||||
|
||||
const mockServiceForNoteSharing = () => {
|
||||
return mockService({
|
||||
exec: (method: string, path = '', _query: Record<string, any> = null, _body: any = null, _headers: any = null, _options: any = null): Promise<any> => {
|
||||
if (method === 'GET' && path === 'api/shares') return { items: [] } as any;
|
||||
return null;
|
||||
},
|
||||
personalizedUserContentBaseUrl(_userId: string) {
|
||||
|
||||
},
|
||||
});
|
||||
};
|
||||
|
||||
describe('ShareService', () => {
|
||||
|
||||
beforeEach(async () => {
|
||||
@ -45,15 +58,7 @@ describe('ShareService', () => {
|
||||
|
||||
it('should not change the note user timestamps when sharing or unsharing', async () => {
|
||||
let note = await Note.save({});
|
||||
const service = mockService({
|
||||
exec: (method: string, path = '', _query: Record<string, any> = null, _body: any = null, _headers: any = null, _options: any = null): Promise<any> => {
|
||||
if (method === 'GET' && path === 'api/shares') return { items: [] } as any;
|
||||
return null;
|
||||
},
|
||||
personalizedUserContentBaseUrl(_userId: string) {
|
||||
|
||||
},
|
||||
});
|
||||
const service = mockServiceForNoteSharing();
|
||||
await msleep(1);
|
||||
await service.shareNote(note.id, false);
|
||||
|
||||
@ -82,6 +87,46 @@ describe('ShareService', () => {
|
||||
}
|
||||
});
|
||||
|
||||
it('should not encrypt items that are shared', async () => {
|
||||
const folder = await Folder.save({});
|
||||
const note = await Note.save({ parent_id: folder.id });
|
||||
await shim.attachFileToNote(note, testImagePath);
|
||||
|
||||
const service = mockServiceForNoteSharing();
|
||||
|
||||
setEncryptionEnabled(true);
|
||||
await loadEncryptionMasterKey();
|
||||
|
||||
await synchronizerStart();
|
||||
|
||||
let previousBlobUpdatedTime = Infinity;
|
||||
{
|
||||
const allItems = await remoteNotesFoldersResources();
|
||||
expect(allItems.map(it => it.encryption_applied)).toEqual([1, 1, 1]);
|
||||
previousBlobUpdatedTime = allItems.find(it => it.type_ === ModelType.Resource).blob_updated_time;
|
||||
}
|
||||
|
||||
await service.shareNote(note.id, false);
|
||||
await msleep(1);
|
||||
await Folder.updateAllShareIds(resourceService());
|
||||
|
||||
await synchronizerStart();
|
||||
|
||||
{
|
||||
const allItems = await remoteNotesFoldersResources();
|
||||
expect(allItems.find(it => it.type_ === ModelType.Note).encryption_applied).toBe(0);
|
||||
expect(allItems.find(it => it.type_ === ModelType.Folder).encryption_applied).toBe(1);
|
||||
|
||||
const resource: ResourceEntity = allItems.find(it => it.type_ === ModelType.Resource);
|
||||
expect(resource.encryption_applied).toBe(0);
|
||||
|
||||
// Indicates that both the metadata and blob have been decrypted on
|
||||
// the sync target.
|
||||
expect(resource.blob_updated_time).toBe(resource.updated_time);
|
||||
expect(resource.blob_updated_time).toBeGreaterThan(previousBlobUpdatedTime);
|
||||
}
|
||||
});
|
||||
|
||||
// eslint-disable-next-line @typescript-eslint/ban-types -- Old code before rule was applied
|
||||
function testShareFolderService(extraExecHandlers: Record<string, Function> = {}, options: TestShareFolderServiceOptions = {}) {
|
||||
return mockService({
|
||||
|
Reference in New Issue
Block a user