1
0
mirror of https://github.com/laurent22/joplin.git synced 2024-12-30 10:36:35 +02:00
joplin/packages/lib/components/EncryptionConfigScreen/utils.test.ts

89 lines
2.6 KiB
TypeScript

import MasterKey from '../../models/MasterKey';
import EncryptionService, { EncryptionMethod } from '../../services/e2ee/EncryptionService';
import { MasterKeyEntity } from '../../services/e2ee/types';
import { setEncryptionEnabled } from '../../services/synchronizer/syncInfoUtils';
import { setupDatabaseAndSynchronizer, switchClient } from '../../testing/test-utils';
import { usePasswordChecker } from './utils';
import { renderHook } from '@testing-library/react-hooks';
interface WrappedPasswordCheckerProps {
masterKeys: MasterKeyEntity[];
activeMasterKeyId: string;
masterPassword: string;
passwords: Record<string, string>;
}
const useWrappedPasswordChecker = ({
masterKeys = [],
activeMasterKeyId = '',
masterPassword = '',
passwords = {},
}: WrappedPasswordCheckerProps) => usePasswordChecker(
masterKeys,
activeMasterKeyId,
masterPassword,
passwords,
);
describe('EncryptionConfigScreen/utils', () => {
beforeEach(async () => {
await setupDatabaseAndSynchronizer(0);
await switchClient(0);
setEncryptionEnabled(true);
});
test('should not mark keys as master password keys if the master password is incorrect for that key', async () => {
const makeMasterKey = async (password: string) => {
const result = await EncryptionService.instance().generateMasterKey(password, {
encryptionMethod: EncryptionMethod.SJCL4,
});
return await MasterKey.save(result);
};
const activeMasterKey = await makeMasterKey('master-password');
const secondaryMasterKey = await makeMasterKey('some other password');
const masterKeys = [
activeMasterKey,
secondaryMasterKey,
];
const initialProps = {
masterKeys,
activeMasterKeyId: activeMasterKey.id,
masterPassword: 'master-password',
passwords: {
[activeMasterKey.id]: 'master-password',
[secondaryMasterKey.id]: 'some other password',
},
};
const hook = renderHook(useWrappedPasswordChecker, {
initialProps,
});
// Different password from the master password should cause the secondary key
// to be marked as not using the master password.
await hook.waitFor(() => {
expect(hook.result.current.masterPasswordKeys).toMatchObject({
[activeMasterKey.id]: true,
[secondaryMasterKey.id]: false,
});
});
// Same password as the master password but fails to decrypt: Should not be marked
// as using the master password.
hook.rerender({
...initialProps,
passwords: {
...initialProps.passwords,
[secondaryMasterKey.id]: 'primary',
},
});
await hook.waitFor(() => {
expect(hook.result.current.masterPasswordKeys).toMatchObject({
[activeMasterKey.id]: true,
[secondaryMasterKey.id]: false,
});
});
});
});