/* Copyright 2024 New Vector Ltd. Copyright 2023 The Matrix.org Foundation C.I.C. SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only Please see LICENSE files in the repository root for full details. */ // fake-indexeddb needs this and the tests crash without it // https://github.com/dumbmatter/fakeIndexedDB?tab=readme-ov-file#jsdom-often-used-with-jest import "core-js/stable/structured-clone"; import "fake-indexeddb/auto"; import React, { ComponentProps } from "react"; import { fireEvent, render, RenderResult, screen, waitFor, within, act } from "jest-matrix-react"; import fetchMock from "fetch-mock-jest"; import { Mocked, mocked } from "jest-mock"; import { ClientEvent, MatrixClient, MatrixEvent, Room, SyncState } from "matrix-js-sdk/src/matrix"; import { MediaHandler } from "matrix-js-sdk/src/webrtc/mediaHandler"; import * as MatrixJs from "matrix-js-sdk/src/matrix"; import { completeAuthorizationCodeGrant } from "matrix-js-sdk/src/oidc/authorize"; import { logger } from "matrix-js-sdk/src/logger"; import { OidcError } from "matrix-js-sdk/src/oidc/error"; import { BearerTokenResponse } from "matrix-js-sdk/src/oidc/validate"; import { defer, IDeferred, sleep } from "matrix-js-sdk/src/utils"; import { CryptoEvent, UserVerificationStatus } from "matrix-js-sdk/src/crypto-api"; import MatrixChat from "../../../../src/components/structures/MatrixChat"; import * as StorageAccess from "../../../../src/utils/StorageAccess"; import defaultDispatcher from "../../../../src/dispatcher/dispatcher"; import { Action } from "../../../../src/dispatcher/actions"; import { UserTab } from "../../../../src/components/views/dialogs/UserTab"; import { clearAllModals, createStubMatrixRTC, filterConsole, flushPromises, getMockClientWithEventEmitter, mockClientMethodsServer, mockClientMethodsUser, MockClientWithEventEmitter, mockPlatformPeg, resetJsDomAfterEach, unmockClientPeg, } from "../../../test-utils"; import * as leaveRoomUtils from "../../../../src/utils/leave-behaviour"; import { OidcClientError } from "../../../../src/utils/oidc/error"; import * as voiceBroadcastUtils from "../../../../src/voice-broadcast/utils/cleanUpBroadcasts"; import LegacyCallHandler from "../../../../src/LegacyCallHandler"; import { CallStore } from "../../../../src/stores/CallStore"; import { Call } from "../../../../src/models/Call"; import { PosthogAnalytics } from "../../../../src/PosthogAnalytics"; import PlatformPeg from "../../../../src/PlatformPeg"; import EventIndexPeg from "../../../../src/indexing/EventIndexPeg"; import * as Lifecycle from "../../../../src/Lifecycle"; import { SSO_HOMESERVER_URL_KEY, SSO_ID_SERVER_URL_KEY } from "../../../../src/BasePlatform"; import SettingsStore from "../../../../src/settings/SettingsStore"; import { SettingLevel } from "../../../../src/settings/SettingLevel"; import { MatrixClientPeg } from "../../../../src/MatrixClientPeg"; import DMRoomMap from "../../../../src/utils/DMRoomMap"; import { ReleaseAnnouncementStore } from "../../../../src/stores/ReleaseAnnouncementStore"; import { DRAFT_LAST_CLEANUP_KEY } from "../../../../src/DraftCleaner"; import { UIFeature } from "../../../../src/settings/UIFeature"; import AutoDiscoveryUtils from "../../../../src/utils/AutoDiscoveryUtils"; import { ValidatedServerConfig } from "../../../../src/utils/ValidatedServerConfig"; import Modal from "../../../../src/Modal.tsx"; jest.mock("matrix-js-sdk/src/oidc/authorize", () => ({ completeAuthorizationCodeGrant: jest.fn(), })); // Stub out ThemeWatcher as the necessary bits for themes are done in element-web's index.html and thus are lacking here, // plus JSDOM's implementation of CSSStyleDeclaration has a bunch of differences to real browsers which cause issues. jest.mock("../../../../src/settings/watchers/ThemeWatcher"); /** The matrix versions our mock server claims to support */ const SERVER_SUPPORTED_MATRIX_VERSIONS = ["v1.1", "v1.5", "v1.6", "v1.8", "v1.9"]; describe("", () => { const userId = "@alice:server.org"; const deviceId = "qwertyui"; const accessToken = "abc123"; const refreshToken = "def456"; let bootstrapDeferred: IDeferred; // reused in createClient mock below const getMockClientMethods = () => ({ ...mockClientMethodsUser(userId), ...mockClientMethodsServer(), getVersions: jest.fn().mockResolvedValue({ versions: SERVER_SUPPORTED_MATRIX_VERSIONS }), startClient: function () { // @ts-ignore this.emit(ClientEvent.Sync, SyncState.Prepared, null); }, stopClient: jest.fn(), setCanResetTimelineCallback: jest.fn(), isInitialSyncComplete: jest.fn(), getSyncState: jest.fn(), getSsoLoginUrl: jest.fn(), getSyncStateData: jest.fn().mockReturnValue(null), getThirdpartyProtocols: jest.fn().mockResolvedValue({}), getClientWellKnown: jest.fn().mockReturnValue({}), isVersionSupported: jest.fn().mockResolvedValue(false), initRustCrypto: jest.fn(), getRoom: jest.fn(), getMediaHandler: jest.fn().mockReturnValue({ setVideoInput: jest.fn(), setAudioInput: jest.fn(), setAudioSettings: jest.fn(), stopAllStreams: jest.fn(), } as unknown as MediaHandler), setAccountData: jest.fn(), store: { destroy: jest.fn(), startup: jest.fn(), }, login: jest.fn(), loginFlows: jest.fn(), isGuest: jest.fn().mockReturnValue(false), clearStores: jest.fn(), setGuest: jest.fn(), setNotifTimelineSet: jest.fn(), getAccountData: jest.fn(), doesServerSupportUnstableFeature: jest.fn(), getDevices: jest.fn().mockResolvedValue({ devices: [] }), getProfileInfo: jest.fn().mockResolvedValue({ displayname: "Ernie", }), getVisibleRooms: jest.fn().mockReturnValue([]), getRooms: jest.fn().mockReturnValue([]), setGlobalErrorOnUnknownDevices: jest.fn(), getCrypto: jest.fn().mockReturnValue({ getVerificationRequestsToDeviceInProgress: jest.fn().mockReturnValue([]), isCrossSigningReady: jest.fn().mockReturnValue(false), getUserDeviceInfo: jest.fn().mockReturnValue(new Map()), getUserVerificationStatus: jest.fn().mockResolvedValue(new UserVerificationStatus(false, false, false)), getVersion: jest.fn().mockReturnValue("1"), setDeviceIsolationMode: jest.fn(), userHasCrossSigningKeys: jest.fn(), getActiveSessionBackupVersion: jest.fn().mockResolvedValue(null), globalBlacklistUnverifiedDevices: false, // This needs to not finish immediately because we need to test the screen appears bootstrapCrossSigning: jest.fn().mockImplementation(() => bootstrapDeferred.promise), }), secretStorage: { isStored: jest.fn().mockReturnValue(null), }, matrixRTC: createStubMatrixRTC(), getDehydratedDevice: jest.fn(), whoami: jest.fn(), logout: jest.fn(), getDeviceId: jest.fn(), getKeyBackupVersion: jest.fn().mockResolvedValue(null), }); let mockClient: Mocked; const serverConfig = { hsUrl: "https://test.com", hsName: "Test Server", hsNameIsDifferent: false, isUrl: "https://is.com", isDefault: true, isNameResolvable: true, warning: "", }; let initPromise: Promise | undefined; let defaultProps: ComponentProps; const getComponent = (props: Partial> = {}) => render(, { legacyRoot: true }); // make test results readable filterConsole( "Failed to parse localStorage object", "Sync store cannot be used on this browser", "Crypto store cannot be used on this browser", "Storage consistency checks failed", "LegacyCallHandler: missing => { // need to wait for different elements depending on which flow // without security setup we go to a loading page if (withoutSecuritySetup) { // wait for logged in view to load await screen.findByLabelText("User menu"); // otherwise we stay on login and load from there for longer } else { // we are logged in, but are still waiting for the /sync to complete await screen.findByText("Syncing…"); // initial sync await act(() => client.emit(ClientEvent.Sync, SyncState.Prepared, null)); } // let things settle await flushPromises(); // and some more for good measure // this proved to be a little flaky await flushPromises(); }; beforeEach(async () => { defaultProps = { config: { brand: "Test", help_url: "help_url", help_encryption_url: "help_encryption_url", element_call: {}, feedback: { existing_issues_url: "https://feedback.org/existing", new_issue_url: "https://feedback.org/new", }, validated_server_config: serverConfig, }, onNewScreen: jest.fn(), onTokenLoginCompleted: jest.fn(), realQueryParams: {}, initPromiseCallback: (p: Promise) => (initPromise = p), }; initPromise = undefined; mockClient = getMockClientWithEventEmitter(getMockClientMethods()); jest.spyOn(MatrixJs, "createClient").mockReturnValue(mockClient); jest.spyOn(defaultDispatcher, "dispatch").mockClear(); jest.spyOn(defaultDispatcher, "fire").mockClear(); DMRoomMap.makeShared(mockClient); jest.spyOn(AutoDiscoveryUtils, "validateServerConfigWithStaticUrls").mockResolvedValue( {} as ValidatedServerConfig, ); bootstrapDeferred = defer(); await clearAllModals(); }); afterEach(async () => { // Wait for the promise that MatrixChat gives us to complete so that we know // it's finished running its login code. We either need to do this or make the // login code abort halfway through once the test finishes testing whatever it // needs to test. If we do nothing, the login code will just continue running // and interfere with the subsequent tests. await initPromise; // @ts-ignore DMRoomMap.setShared(null); jest.restoreAllMocks(); // emit a loggedOut event so that all of the Store singletons forget about their references to the mock client // (must be sync otherwise the next test will start before it happens) act(() => defaultDispatcher.dispatch({ action: Action.OnLoggedOut }, true)); localStorage.clear(); }); resetJsDomAfterEach(); it("should render spinner while app is loading", () => { const { container } = getComponent(); expect(container).toMatchSnapshot(); }); it("should fire to focus the message composer", async () => { getComponent(); defaultDispatcher.dispatch({ action: Action.ViewRoom, room_id: "!room:server.org", focusNext: "composer" }); await waitFor(() => { expect(defaultDispatcher.fire).toHaveBeenCalledWith(Action.FocusSendMessageComposer); }); }); it("should fire to focus the threads panel", async () => { getComponent(); defaultDispatcher.dispatch({ action: Action.ViewRoom, room_id: "!room:server.org", focusNext: "threadsPanel" }); await waitFor(() => { expect(defaultDispatcher.fire).toHaveBeenCalledWith(Action.FocusThreadsPanel); }); }); describe("when query params have a OIDC params", () => { const issuer = "https://auth.com/"; const homeserverUrl = "https://matrix.org"; const identityServerUrl = "https://is.org"; const clientId = "xyz789"; const code = "test-oidc-auth-code"; const state = "test-oidc-state"; const realQueryParams = { code, state: state, }; const userId = "@alice:server.org"; const deviceId = "test-device-id"; const accessToken = "test-access-token-from-oidc"; const tokenResponse: BearerTokenResponse = { access_token: accessToken, refresh_token: "def456", id_token: "ghi789", scope: "test", token_type: "Bearer", expires_at: 12345, }; let loginClient!: ReturnType; const expectOIDCError = async ( errorMessage = "Something went wrong during authentication. Go to the sign in page and try again.", ): Promise => { await flushPromises(); const dialog = await screen.findByRole("dialog"); expect(within(dialog).getByText(errorMessage)).toBeInTheDocument(); // just check we're back on welcome page await expect(screen.findByTestId("mx_welcome_screen")).resolves.toBeInTheDocument(); }; beforeEach(() => { mocked(completeAuthorizationCodeGrant) .mockClear() .mockResolvedValue({ oidcClientSettings: { clientId, issuer, }, tokenResponse, homeserverUrl, identityServerUrl, idTokenClaims: { aud: "123", iss: issuer, sub: "123", exp: 123, iat: 456, }, }); jest.spyOn(logger, "error").mockClear(); }); beforeEach(() => { loginClient = getMockClientWithEventEmitter(getMockClientMethods()); // this is used to create a temporary client during login jest.spyOn(MatrixJs, "createClient").mockReturnValue(loginClient); jest.spyOn(logger, "error").mockClear(); jest.spyOn(logger, "log").mockClear(); loginClient.whoami.mockResolvedValue({ user_id: userId, device_id: deviceId, is_guest: false, }); }); it("should fail when query params do not include valid code and state", async () => { const queryParams = { code: 123, state: "abc", }; getComponent({ realQueryParams: queryParams }); await flushPromises(); expect(logger.error).toHaveBeenCalledWith( "Failed to login via OIDC", new Error(OidcClientError.InvalidQueryParameters), ); await expectOIDCError(); }); it("should make correct request to complete authorization", async () => { getComponent({ realQueryParams }); await flushPromises(); expect(completeAuthorizationCodeGrant).toHaveBeenCalledWith(code, state); }); it("should look up userId using access token", async () => { getComponent({ realQueryParams }); await flushPromises(); // check we used a client with the correct accesstoken expect(MatrixJs.createClient).toHaveBeenCalledWith({ baseUrl: homeserverUrl, accessToken, idBaseUrl: identityServerUrl, }); expect(loginClient.whoami).toHaveBeenCalled(); }); it("should log error and return to welcome page when userId lookup fails", async () => { loginClient.whoami.mockRejectedValue(new Error("oups")); getComponent({ realQueryParams }); await flushPromises(); expect(logger.error).toHaveBeenCalledWith( "Failed to login via OIDC", new Error("Failed to retrieve userId using accessToken"), ); await expectOIDCError(); }); it("should call onTokenLoginCompleted", async () => { const onTokenLoginCompleted = jest.fn(); getComponent({ realQueryParams, onTokenLoginCompleted }); await waitFor(() => expect(onTokenLoginCompleted).toHaveBeenCalled()); }); describe("when login fails", () => { beforeEach(() => { mocked(completeAuthorizationCodeGrant).mockRejectedValue(new Error(OidcError.CodeExchangeFailed)); }); it("should log and return to welcome page with correct error when login state is not found", async () => { mocked(completeAuthorizationCodeGrant).mockRejectedValue( new Error(OidcError.MissingOrInvalidStoredState), ); getComponent({ realQueryParams }); await flushPromises(); expect(logger.error).toHaveBeenCalledWith( "Failed to login via OIDC", new Error(OidcError.MissingOrInvalidStoredState), ); await expectOIDCError( "We asked the browser to remember which homeserver you use to let you sign in, but unfortunately your browser has forgotten it. Go to the sign in page and try again.", ); }); it("should log and return to welcome page", async () => { getComponent({ realQueryParams }); await flushPromises(); expect(logger.error).toHaveBeenCalledWith( "Failed to login via OIDC", new Error(OidcError.CodeExchangeFailed), ); // warning dialog await expectOIDCError(); }); it("should not clear storage", async () => { getComponent({ realQueryParams }); await flushPromises(); expect(loginClient.clearStores).not.toHaveBeenCalled(); }); it("should not store clientId or issuer", async () => { const sessionStorageSetSpy = jest.spyOn(sessionStorage.__proto__, "setItem"); getComponent({ realQueryParams }); await flushPromises(); expect(sessionStorageSetSpy).not.toHaveBeenCalledWith("mx_oidc_client_id", clientId); expect(sessionStorageSetSpy).not.toHaveBeenCalledWith("mx_oidc_token_issuer", issuer); }); }); describe("when login succeeds", () => { beforeEach(() => { jest.spyOn(StorageAccess, "idbLoad").mockImplementation( async (_table: string, key: string | string[]) => (key === "mx_access_token" ? accessToken : null), ); }); it("should persist login credentials", async () => { getComponent({ realQueryParams }); await waitFor(() => expect(localStorage.getItem("mx_hs_url")).toEqual(homeserverUrl)); expect(localStorage.getItem("mx_user_id")).toEqual(userId); expect(localStorage.getItem("mx_has_access_token")).toEqual("true"); expect(localStorage.getItem("mx_device_id")).toEqual(deviceId); }); it("should store clientId and issuer in session storage", async () => { getComponent({ realQueryParams }); await waitFor(() => expect(localStorage.getItem("mx_oidc_client_id")).toEqual(clientId)); expect(localStorage.getItem("mx_oidc_token_issuer")).toEqual(issuer); }); it("should set logged in and start MatrixClient", async () => { getComponent({ realQueryParams }); // client successfully started await waitFor(() => expect(defaultDispatcher.dispatch).toHaveBeenCalledWith({ action: "client_started" }), ); // check we get to logged in view await waitForSyncAndLoad(loginClient, true); }); it("should persist device language when available", async () => { await SettingsStore.setValue("language", null, SettingLevel.DEVICE, "en"); const languageBefore = SettingsStore.getValueAt(SettingLevel.DEVICE, "language", null, true, true); jest.spyOn(Lifecycle, "attemptDelegatedAuthLogin"); getComponent({ realQueryParams }); await flushPromises(); expect(Lifecycle.attemptDelegatedAuthLogin).toHaveBeenCalled(); const languageAfter = SettingsStore.getValueAt(SettingLevel.DEVICE, "language", null, true, true); expect(languageBefore).toEqual(languageAfter); }); it("should not persist device language when not available", async () => { await SettingsStore.setValue("language", null, SettingLevel.DEVICE, undefined); const languageBefore = SettingsStore.getValueAt(SettingLevel.DEVICE, "language", null, true, true); jest.spyOn(Lifecycle, "attemptDelegatedAuthLogin"); getComponent({ realQueryParams }); await flushPromises(); expect(Lifecycle.attemptDelegatedAuthLogin).toHaveBeenCalled(); const languageAfter = SettingsStore.getValueAt(SettingLevel.DEVICE, "language", null, true, true); expect(languageBefore).toEqual(languageAfter); }); }); }); describe("with an existing session", () => { const mockidb: Record> = { account: { mx_access_token: accessToken, mx_refresh_token: refreshToken, }, }; beforeEach(async () => { await populateStorageForSession(); jest.spyOn(StorageAccess, "idbLoad").mockImplementation(async (table, key) => { const safeKey = Array.isArray(key) ? key[0] : key; return mockidb[table]?.[safeKey]; }); }); const getComponentAndWaitForReady = async (): Promise => { const renderResult = getComponent(); // we think we are logged in, but are still waiting for the /sync to complete await screen.findByText("Logout"); // initial sync mockClient.emit(ClientEvent.Sync, SyncState.Prepared, null); // wait for logged in view to load await screen.findByLabelText("User menu"); // let things settle await flushPromises(); // and some more for good measure // this proved to be a little flaky await flushPromises(); return renderResult; }; it("should render welcome page after login", async () => { getComponent(); // wait for logged in view to load await screen.findByLabelText("User menu"); expect(screen.queryByRole("progressbar")).not.toBeInTheDocument(); const h1Element = screen.getByRole("heading", { level: 1 }); expect(h1Element).toHaveTextContent(`Welcome Ernie`); }); describe("clean up drafts", () => { const roomId = "!room:server.org"; const unknownRoomId = "!room2:server.org"; const room = new Room(roomId, mockClient, userId); const timestamp = 2345678901234; beforeEach(() => { localStorage.setItem(`mx_cider_state_${unknownRoomId}`, "fake_content"); localStorage.setItem(`mx_cider_state_${roomId}`, "fake_content"); mockClient.getRoom.mockImplementation((id) => [room].find((room) => room.roomId === id) || null); }); afterEach(() => { jest.restoreAllMocks(); }); it("should clean up drafts", async () => { Date.now = jest.fn(() => timestamp); localStorage.setItem(`mx_cider_state_${roomId}`, "fake_content"); localStorage.setItem(`mx_cider_state_${unknownRoomId}`, "fake_content"); await getComponentAndWaitForReady(); mockClient.emit(ClientEvent.Sync, SyncState.Syncing, SyncState.Syncing); // let things settle await flushPromises(); expect(localStorage.getItem(`mx_cider_state_${roomId}`)).not.toBeNull(); expect(localStorage.getItem(`mx_cider_state_${unknownRoomId}`)).toBeNull(); }); it("should clean up wysiwyg drafts", async () => { Date.now = jest.fn(() => timestamp); localStorage.setItem(`mx_wysiwyg_state_${roomId}`, "fake_content"); localStorage.setItem(`mx_wysiwyg_state_${unknownRoomId}`, "fake_content"); await getComponentAndWaitForReady(); mockClient.emit(ClientEvent.Sync, SyncState.Syncing, SyncState.Syncing); // let things settle await flushPromises(); expect(localStorage.getItem(`mx_wysiwyg_state_${roomId}`)).not.toBeNull(); expect(localStorage.getItem(`mx_wysiwyg_state_${unknownRoomId}`)).toBeNull(); }); it("should not clean up drafts before expiry", async () => { // Set the last cleanup to the recent past localStorage.setItem(`mx_cider_state_${unknownRoomId}`, "fake_content"); localStorage.setItem(DRAFT_LAST_CLEANUP_KEY, String(timestamp - 100)); await getComponentAndWaitForReady(); mockClient.emit(ClientEvent.Sync, SyncState.Syncing, SyncState.Syncing); expect(localStorage.getItem(`mx_cider_state_${unknownRoomId}`)).not.toBeNull(); }); }); describe("onAction()", () => { beforeEach(() => { jest.spyOn(defaultDispatcher, "dispatch").mockClear(); jest.spyOn(defaultDispatcher, "fire").mockClear(); }); it("should open user device settings", async () => { await getComponentAndWaitForReady(); defaultDispatcher.dispatch({ action: Action.ViewUserDeviceSettings, }); await flushPromises(); expect(defaultDispatcher.dispatch).toHaveBeenCalledWith({ action: Action.ViewUserSettings, initialTabId: UserTab.SessionManager, }); }); describe("room actions", () => { const roomId = "!room:server.org"; const spaceId = "!spaceRoom:server.org"; const room = new Room(roomId, mockClient, userId); const spaceRoom = new Room(spaceId, mockClient, userId); beforeEach(() => { mockClient.getRoom.mockImplementation( (id) => [room, spaceRoom].find((room) => room.roomId === id) || null, ); jest.spyOn(spaceRoom, "isSpaceRoom").mockReturnValue(true); jest.spyOn(ReleaseAnnouncementStore.instance, "getReleaseAnnouncement").mockReturnValue(null); }); afterEach(() => { jest.restoreAllMocks(); }); describe("leave_room", () => { beforeEach(async () => { await clearAllModals(); await getComponentAndWaitForReady(); // this is thoroughly unit tested elsewhere jest.spyOn(leaveRoomUtils, "leaveRoomBehaviour").mockClear().mockResolvedValue(undefined); }); const dispatchAction = () => defaultDispatcher.dispatch({ action: "leave_room", room_id: roomId, }); const publicJoinRule = new MatrixEvent({ type: "m.room.join_rules", content: { join_rule: "public", }, }); const inviteJoinRule = new MatrixEvent({ type: "m.room.join_rules", content: { join_rule: "invite", }, }); describe("for a room", () => { beforeEach(() => { jest.spyOn(room.currentState, "getJoinedMemberCount").mockReturnValue(2); jest.spyOn(room.currentState, "getStateEvents").mockReturnValue(publicJoinRule); }); it("should launch a confirmation modal", async () => { dispatchAction(); const dialog = await screen.findByRole("dialog"); expect(dialog).toMatchSnapshot(); }); it("should warn when room has only one joined member", async () => { jest.spyOn(room.currentState, "getJoinedMemberCount").mockReturnValue(1); dispatchAction(); await screen.findByRole("dialog"); expect( screen.getByText( "You are the only person here. If you leave, no one will be able to join in the future, including you.", ), ).toBeInTheDocument(); }); it("should warn when room is not public", async () => { jest.spyOn(room.currentState, "getStateEvents").mockReturnValue(inviteJoinRule); dispatchAction(); await screen.findByRole("dialog"); expect( screen.getByText( "This room is not public. You will not be able to rejoin without an invite.", ), ).toBeInTheDocument(); }); it("should do nothing on cancel", async () => { dispatchAction(); const dialog = await screen.findByRole("dialog"); fireEvent.click(within(dialog).getByText("Cancel")); await flushPromises(); expect(leaveRoomUtils.leaveRoomBehaviour).not.toHaveBeenCalled(); expect(defaultDispatcher.dispatch).not.toHaveBeenCalledWith({ action: Action.AfterLeaveRoom, room_id: roomId, }); }); it("should leave room and dispatch after leave action", async () => { dispatchAction(); const dialog = await screen.findByRole("dialog"); fireEvent.click(within(dialog).getByText("Leave")); await flushPromises(); expect(leaveRoomUtils.leaveRoomBehaviour).toHaveBeenCalled(); expect(defaultDispatcher.dispatch).toHaveBeenCalledWith({ action: Action.AfterLeaveRoom, room_id: roomId, }); }); }); describe("for a space", () => { const dispatchAction = () => defaultDispatcher.dispatch({ action: "leave_room", room_id: spaceId, }); beforeEach(() => { jest.spyOn(spaceRoom.currentState, "getStateEvents").mockReturnValue(publicJoinRule); }); it("should launch a confirmation modal", async () => { dispatchAction(); const dialog = await screen.findByRole("dialog"); expect(dialog).toMatchSnapshot(); }); it("should warn when space is not public", async () => { jest.spyOn(spaceRoom.currentState, "getStateEvents").mockReturnValue(inviteJoinRule); dispatchAction(); await screen.findByRole("dialog"); expect( screen.getByText( "This space is not public. You will not be able to rejoin without an invite.", ), ).toBeInTheDocument(); }); }); }); }); describe("logout", () => { let logoutClient!: ReturnType; const call1 = { disconnect: jest.fn() } as unknown as Call; const call2 = { disconnect: jest.fn() } as unknown as Call; const dispatchLogoutAndWait = async (): Promise => { defaultDispatcher.dispatch({ action: "logout", }); await flushPromises(); }; beforeEach(() => { // stub out various cleanup functions jest.spyOn(LegacyCallHandler.instance, "hangupAllCalls") .mockClear() .mockImplementation(() => {}); jest.spyOn(voiceBroadcastUtils, "cleanUpBroadcasts").mockImplementation(async () => {}); jest.spyOn(PosthogAnalytics.instance, "logout").mockImplementation(() => {}); jest.spyOn(EventIndexPeg, "deleteEventIndex").mockImplementation(async () => {}); jest.spyOn(CallStore.instance, "connectedCalls", "get").mockReturnValue(new Set([call1, call2])); mockPlatformPeg({ destroyPickleKey: jest.fn(), }); logoutClient = getMockClientWithEventEmitter(getMockClientMethods()); mockClient = getMockClientWithEventEmitter(getMockClientMethods()); mockClient.logout.mockResolvedValue({}); mockClient.getDeviceId.mockReturnValue(deviceId); // this is used to create a temporary client to cleanup after logout jest.spyOn(MatrixJs, "createClient").mockClear().mockReturnValue(logoutClient); jest.spyOn(logger, "warn").mockClear(); }); afterAll(() => { jest.spyOn(voiceBroadcastUtils, "cleanUpBroadcasts").mockRestore(); }); it("should hangup all legacy calls", async () => { await getComponentAndWaitForReady(); await dispatchLogoutAndWait(); expect(LegacyCallHandler.instance.hangupAllCalls).toHaveBeenCalled(); }); it("should cleanup broadcasts", async () => { await getComponentAndWaitForReady(); await dispatchLogoutAndWait(); expect(voiceBroadcastUtils.cleanUpBroadcasts).toHaveBeenCalled(); }); it("should disconnect all calls", async () => { await getComponentAndWaitForReady(); await dispatchLogoutAndWait(); expect(call1.disconnect).toHaveBeenCalled(); expect(call2.disconnect).toHaveBeenCalled(); }); it("should logout of posthog", async () => { await getComponentAndWaitForReady(); await dispatchLogoutAndWait(); expect(PosthogAnalytics.instance.logout).toHaveBeenCalled(); }); it("should destroy pickle key", async () => { await getComponentAndWaitForReady(); await dispatchLogoutAndWait(); expect(PlatformPeg.get()!.destroyPickleKey).toHaveBeenCalledWith(userId, deviceId); }); describe("without delegated auth", () => { it("should call /logout", async () => { await getComponentAndWaitForReady(); await dispatchLogoutAndWait(); expect(mockClient.logout).toHaveBeenCalledWith(true); }); it("should warn and do post-logout cleanup anyway when logout fails", async () => { const error = new Error("test logout failed"); mockClient.logout.mockRejectedValue(error); await getComponentAndWaitForReady(); await dispatchLogoutAndWait(); expect(logger.warn).toHaveBeenCalledWith( "Failed to call logout API: token will not be invalidated", error, ); // stuff that happens in onloggedout expect(defaultDispatcher.fire).toHaveBeenCalledWith(Action.OnLoggedOut, true); await waitFor(() => expect(logoutClient.clearStores).toHaveBeenCalled()); }); it("should do post-logout cleanup", async () => { await getComponentAndWaitForReady(); await dispatchLogoutAndWait(); // stuff that happens in onloggedout expect(defaultDispatcher.fire).toHaveBeenCalledWith(Action.OnLoggedOut, true); await waitFor(() => expect(EventIndexPeg.deleteEventIndex).toHaveBeenCalled()); expect(logoutClient.clearStores).toHaveBeenCalled(); }); }); }); }); describe("unskippable verification", () => { it("should show the complete security screen if unskippable verification is enabled", async () => { defaultProps.config.force_verification = true; localStorage.setItem("must_verify_device", "true"); getComponent(); await screen.findByRole("heading", { name: "Unable to verify this device", level: 1 }); }); }); }); describe("with a soft-logged-out session", () => { const mockidb: Record> = {}; beforeEach(async () => { await populateStorageForSession(); localStorage.setItem("mx_soft_logout", "true"); mockClient.loginFlows.mockResolvedValue({ flows: [{ type: "m.login.password" }] }); jest.spyOn(StorageAccess, "idbLoad").mockImplementation(async (table, key) => { const safeKey = Array.isArray(key) ? key[0] : key; return mockidb[table]?.[safeKey]; }); }); it("should show the soft-logout page", async () => { // XXX This test is strange, it was working with legacy crypto // without mocking the following but the initCrypto call was failing // but as the exception was swallowed, the test was passing (see in `initClientCrypto`). // There are several uses of the peg in the app, so during all these tests you might end-up // with a real client instead of the mocked one. Not sure how reliable all these tests are. jest.spyOn(MatrixClientPeg, "replaceUsingCreds"); jest.spyOn(MatrixClientPeg, "get").mockReturnValue(mockClient); const result = getComponent(); await result.findByText("You're signed out"); expect(result.container).toMatchSnapshot(); }); }); describe("login via key/pass", () => { let loginClient!: ReturnType; const userName = "ernie"; const password = "ilovebert"; const getComponentAndWaitForReady = async (): Promise => { const renderResult = getComponent(); // wait for welcome page chrome render await screen.findByText("Powered by Matrix"); // go to login page act(() => defaultDispatcher.dispatch({ action: "start_login", }), ); await flushPromises(); return renderResult; }; const getComponentAndLogin = async (withoutSecuritySetup?: boolean): Promise => { await getComponentAndWaitForReady(); fireEvent.change(screen.getByLabelText("Username"), { target: { value: userName } }); fireEvent.change(screen.getByLabelText("Password"), { target: { value: password } }); // sign in button is an input fireEvent.click(screen.getByDisplayValue("Sign in")); await waitForSyncAndLoad(loginClient, withoutSecuritySetup); }; beforeEach(() => { loginClient = getMockClientWithEventEmitter(getMockClientMethods()); // this is used to create a temporary client during login // FIXME: except it is *also* used as the permanent client for the rest of the test. jest.spyOn(MatrixJs, "createClient").mockClear().mockReturnValue(loginClient); loginClient.login.mockClear().mockResolvedValue({ access_token: "TOKEN", device_id: "IMADEVICE", user_id: userId, }); loginClient.loginFlows.mockClear().mockResolvedValue({ flows: [{ type: "m.login.password" }] }); }); it("should render login page", async () => { await getComponentAndWaitForReady(); expect(screen.getAllByText("Sign in")[0]).toBeInTheDocument(); }); describe("post login setup", () => { beforeEach(() => { const mockCrypto = { getVersion: jest.fn().mockReturnValue("Version 0"), getVerificationRequestsToDeviceInProgress: jest.fn().mockReturnValue([]), getUserDeviceInfo: jest.fn().mockResolvedValue(new Map()), getUserVerificationStatus: jest .fn() .mockResolvedValue(new UserVerificationStatus(false, false, false)), setDeviceIsolationMode: jest.fn(), userHasCrossSigningKeys: jest.fn().mockResolvedValue(false), // This needs to not finish immediately because we need to test the screen appears bootstrapCrossSigning: jest.fn().mockImplementation(() => bootstrapDeferred.promise), isEncryptionEnabledInRoom: jest.fn().mockResolvedValue(false), }; loginClient.getCrypto.mockReturnValue(mockCrypto as any); }); it("should go straight to logged in view when crypto is not enabled", async () => { loginClient.getCrypto.mockReturnValue(undefined); await getComponentAndLogin(true); expect(screen.getByRole("heading", { name: "Welcome Ernie" })).toBeInTheDocument(); }); it("should go straight to logged in view when user does not have cross signing keys and server does not support cross signing", async () => { loginClient.doesServerSupportUnstableFeature.mockResolvedValue(false); await getComponentAndLogin(false); expect(loginClient.doesServerSupportUnstableFeature).toHaveBeenCalledWith( "org.matrix.e2e_cross_signing", ); await flushPromises(); // logged in await screen.findByLabelText("User menu"); }); describe("when server supports cross signing and user does not have cross signing setup", () => { beforeEach(() => { loginClient.doesServerSupportUnstableFeature.mockResolvedValue(true); jest.spyOn(loginClient.getCrypto()!, "userHasCrossSigningKeys").mockResolvedValue(false); }); describe("when encryption is force disabled", () => { let unencryptedRoom: Room; let encryptedRoom: Room; beforeEach(() => { unencryptedRoom = new Room("!unencrypted:server.org", loginClient, userId); encryptedRoom = new Room("!encrypted:server.org", loginClient, userId); loginClient.getClientWellKnown.mockReturnValue({ "io.element.e2ee": { force_disable: true, }, }); jest.spyOn(loginClient.getCrypto()!, "isEncryptionEnabledInRoom").mockImplementation( async (roomId) => { return roomId === encryptedRoom.roomId; }, ); }); it("should go straight to logged in view when user is not in any encrypted rooms", async () => { loginClient.getRooms.mockReturnValue([unencryptedRoom]); await getComponentAndLogin(false); await flushPromises(); // logged in, did not setup keys await screen.findByLabelText("User menu"); }); it("should go to setup e2e screen when user is in encrypted rooms", async () => { loginClient.getRooms.mockReturnValue([unencryptedRoom, encryptedRoom]); await getComponentAndLogin(); await flushPromises(); // set up keys screen is rendered expect(screen.getByText("Setting up keys")).toBeInTheDocument(); }); }); it("should go to setup e2e screen", async () => { loginClient.doesServerSupportUnstableFeature.mockResolvedValue(true); await getComponentAndLogin(); expect(loginClient.getCrypto()!.userHasCrossSigningKeys).toHaveBeenCalled(); // set up keys screen is rendered await expect(await screen.findByText("Setting up keys")).toBeInTheDocument(); }); }); it("should show complete security screen when user has cross signing setup", async () => { jest.spyOn(loginClient.getCrypto()!, "userHasCrossSigningKeys").mockResolvedValue(true); await getComponentAndLogin(); expect(loginClient.getCrypto()!.userHasCrossSigningKeys).toHaveBeenCalled(); await flushPromises(); // Complete security begin screen is rendered expect(screen.getByText("Unable to verify this device")).toBeInTheDocument(); }); it("should setup e2e when server supports cross signing", async () => { loginClient.doesServerSupportUnstableFeature.mockResolvedValue(true); await getComponentAndLogin(); expect(loginClient.getCrypto()!.userHasCrossSigningKeys).toHaveBeenCalled(); // set up keys screen is rendered expect(screen.getByText("Setting up keys")).toBeInTheDocument(); }); it("should go to use case selection if user just registered", async () => { loginClient.doesServerSupportUnstableFeature.mockResolvedValue(true); MatrixClientPeg.setJustRegisteredUserId(userId); await getComponentAndLogin(); act(() => bootstrapDeferred.resolve()); await expect( screen.findByRole("heading", { name: "You're in", level: 1 }), ).resolves.toBeInTheDocument(); }); }); }); describe("when query params have a loginToken", () => { const loginToken = "test-login-token"; const realQueryParams = { loginToken, }; let loginClient!: ReturnType; const userId = "@alice:server.org"; const deviceId = "test-device-id"; const accessToken = "test-access-token"; const clientLoginResponse = { user_id: userId, device_id: deviceId, access_token: accessToken, }; beforeEach(() => { localStorage.setItem("mx_sso_hs_url", serverConfig.hsUrl); localStorage.setItem("mx_sso_is_url", serverConfig.isUrl); loginClient = getMockClientWithEventEmitter(getMockClientMethods()); // this is used to create a temporary client during login jest.spyOn(MatrixJs, "createClient").mockReturnValue(loginClient); loginClient.login.mockClear().mockResolvedValue(clientLoginResponse); }); it("should show an error dialog when no homeserver is found in local storage", async () => { localStorage.removeItem("mx_sso_hs_url"); const localStorageGetSpy = jest.spyOn(localStorage.__proto__, "getItem"); getComponent({ realQueryParams }); await flushPromises(); expect(localStorageGetSpy).toHaveBeenCalledWith("mx_sso_hs_url"); expect(localStorageGetSpy).toHaveBeenCalledWith("mx_sso_is_url"); const dialog = await screen.findByRole("dialog"); // warning dialog expect( within(dialog).getByText( "We asked the browser to remember which homeserver you use to let you sign in, " + "but unfortunately your browser has forgotten it. Go to the sign in page and try again.", ), ).toBeInTheDocument(); }); it("should attempt token login", async () => { getComponent({ realQueryParams }); await flushPromises(); expect(loginClient.login).toHaveBeenCalledWith("m.login.token", { initial_device_display_name: undefined, token: loginToken, }); }); it("should call onTokenLoginCompleted", async () => { const onTokenLoginCompleted = jest.fn(); getComponent({ realQueryParams, onTokenLoginCompleted }); await waitFor(() => expect(onTokenLoginCompleted).toHaveBeenCalled()); }); describe("when login fails", () => { beforeEach(() => { loginClient.login.mockRejectedValue(new Error("oups")); }); it("should show a dialog", async () => { getComponent({ realQueryParams }); await flushPromises(); const dialog = await screen.findByRole("dialog"); // warning dialog expect( within(dialog).getByText( "There was a problem communicating with the homeserver, please try again later.", ), ).toBeInTheDocument(); }); it("should not clear storage", async () => { getComponent({ realQueryParams }); await flushPromises(); expect(loginClient.clearStores).not.toHaveBeenCalled(); }); }); describe("when login succeeds", () => { beforeEach(() => { jest.spyOn(StorageAccess, "idbLoad").mockImplementation( async (_table: string, key: string | string[]) => { if (key === "mx_access_token") { return accessToken as any; } }, ); }); it("should clear storage", async () => { const localStorageClearSpy = jest.spyOn(localStorage.__proto__, "clear"); getComponent({ realQueryParams }); // just check we called the clearStorage function await waitFor(() => expect(loginClient.clearStores).toHaveBeenCalled()); expect(localStorage.getItem("mx_sso_hs_url")).toBe(null); expect(localStorageClearSpy).toHaveBeenCalled(); }); it("should persist login credentials", async () => { getComponent({ realQueryParams }); await waitFor(() => expect(localStorage.getItem("mx_hs_url")).toEqual(serverConfig.hsUrl)); expect(localStorage.getItem("mx_user_id")).toEqual(userId); expect(localStorage.getItem("mx_has_access_token")).toEqual("true"); expect(localStorage.getItem("mx_device_id")).toEqual(deviceId); }); it("should set fresh login flag in session storage", async () => { const sessionStorageSetSpy = jest.spyOn(sessionStorage.__proto__, "setItem"); getComponent({ realQueryParams }); await waitFor(() => expect(sessionStorageSetSpy).toHaveBeenCalledWith("mx_fresh_login", "true")); }); it("should override hsUrl in creds when login response wellKnown differs from config", async () => { const hsUrlFromWk = "https://hsfromwk.org"; const loginResponseWithWellKnown = { ...clientLoginResponse, well_known: { "m.homeserver": { base_url: hsUrlFromWk, }, }, }; loginClient.login.mockResolvedValue(loginResponseWithWellKnown); getComponent({ realQueryParams }); await waitFor(() => expect(localStorage.getItem("mx_hs_url")).toEqual(hsUrlFromWk)); }); it("should continue to post login setup when no session is found in local storage", async () => { getComponent({ realQueryParams }); // logged in but waiting for sync screen await screen.findByText("Logout"); }); }); }); describe("automatic SSO selection", () => { let ssoClient: ReturnType; let hrefSetter: jest.Mock; beforeEach(() => { ssoClient = getMockClientWithEventEmitter({ ...getMockClientMethods(), getHomeserverUrl: jest.fn().mockReturnValue("matrix.example.com"), getIdentityServerUrl: jest.fn().mockReturnValue("ident.example.com"), getSsoLoginUrl: jest.fn().mockReturnValue("http://my-sso-url"), }); // this is used to create a temporary client to cleanup after logout jest.spyOn(MatrixJs, "createClient").mockClear().mockReturnValue(ssoClient); mockPlatformPeg(); // Ensure we don't have a client peg as we aren't logged in. unmockClientPeg(); hrefSetter = jest.fn(); const originalHref = window.location.href.toString(); Object.defineProperty(window, "location", { value: { get href() { return originalHref; }, set href(href) { hrefSetter(href); }, }, writable: true, }); }); it("should automatically setup and redirect to SSO login", async () => { getComponent({ initialScreenAfterLogin: { screen: "start_sso", }, }); await waitFor(() => expect(ssoClient.getSsoLoginUrl).toHaveBeenCalledWith("http://localhost/", "sso", undefined, undefined), ); expect(window.localStorage.getItem(SSO_HOMESERVER_URL_KEY)).toEqual("matrix.example.com"); expect(window.localStorage.getItem(SSO_ID_SERVER_URL_KEY)).toEqual("ident.example.com"); expect(hrefSetter).toHaveBeenCalledWith("http://my-sso-url"); }); it("should automatically setup and redirect to CAS login", async () => { getComponent({ initialScreenAfterLogin: { screen: "start_cas", }, }); await waitFor(() => expect(ssoClient.getSsoLoginUrl).toHaveBeenCalledWith("http://localhost/", "cas", undefined, undefined), ); expect(window.localStorage.getItem(SSO_HOMESERVER_URL_KEY)).toEqual("matrix.example.com"); expect(window.localStorage.getItem(SSO_ID_SERVER_URL_KEY)).toEqual("ident.example.com"); expect(hrefSetter).toHaveBeenCalledWith("http://my-sso-url"); }); }); describe("Multi-tab lockout", () => { afterEach(() => { Lifecycle.setSessionLockNotStolen(); }); it("waits for other tab to stop during startup", async () => { fetchMock.get("/welcome.html", { body: "

Hello

" }); jest.spyOn(Lifecycle, "attemptDelegatedAuthLogin"); // simulate an active window localStorage.setItem("react_sdk_session_lock_ping", String(Date.now())); const rendered = getComponent({}); await flushPromises(); expect(rendered.container).toMatchSnapshot(); // user confirms rendered.getByRole("button", { name: "Continue" }).click(); await flushPromises(); // we should have claimed the session, but gone no further expect(Lifecycle.attemptDelegatedAuthLogin).not.toHaveBeenCalled(); const sessionId = localStorage.getItem("react_sdk_session_lock_claimant"); expect(sessionId).toEqual(expect.stringMatching(/./)); expect(rendered.container).toMatchSnapshot(); // the other tab shuts down localStorage.removeItem("react_sdk_session_lock_ping"); // fire the storage event manually, because writes to localStorage from the same javascript context don't // fire it automatically window.dispatchEvent(new StorageEvent("storage", { key: "react_sdk_session_lock_ping" })); // startup continues await flushPromises(); expect(Lifecycle.attemptDelegatedAuthLogin).toHaveBeenCalled(); // should just show the welcome screen await rendered.findByText("Hello"); expect(rendered.container).toMatchSnapshot(); }); describe("shows the lockout page when a second tab opens", () => { beforeEach(() => { // make sure we start from a clean DOM for each of these tests document.body.replaceChildren(); }); function simulateSessionLockClaim() { localStorage.setItem("react_sdk_session_lock_claimant", "testtest"); act(() => window.dispatchEvent(new StorageEvent("storage", { key: "react_sdk_session_lock_claimant" })), ); } it("after a session is restored", async () => { await populateStorageForSession(); const client = getMockClientWithEventEmitter(getMockClientMethods()); jest.spyOn(MatrixJs, "createClient").mockReturnValue(client); const rendered = getComponent({}); await waitForSyncAndLoad(client, true); rendered.getByText("Welcome Ernie"); // we're now at the welcome page. Another session wants the lock... simulateSessionLockClaim(); await flushPromises(); expect(rendered.container).toMatchSnapshot(); }); it("while we were waiting for the lock ourselves", async () => { // simulate there already being one session localStorage.setItem("react_sdk_session_lock_ping", String(Date.now())); const rendered = getComponent({}); await flushPromises(); // user confirms continue rendered.getByRole("button", { name: "Continue" }).click(); await flushPromises(); expect(rendered.getByTestId("spinner")).toBeInTheDocument(); // now a third session starts simulateSessionLockClaim(); await flushPromises(); expect(rendered.container).toMatchSnapshot(); }); it("while we are checking the sync store", async () => { const rendered = getComponent({}); expect(rendered.getByTestId("spinner")).toBeInTheDocument(); // now a third session starts simulateSessionLockClaim(); await flushPromises(); expect(rendered.container).toMatchSnapshot(); }); it("during crypto init", async () => { await populateStorageForSession(); const client = new MockClientWithEventEmitter({ ...getMockClientMethods(), }) as unknown as Mocked; jest.spyOn(MatrixJs, "createClient").mockReturnValue(client); // intercept initCrypto and have it block until we complete the deferred const initCryptoCompleteDefer = defer(); const initCryptoCalled = new Promise((resolve) => { client.initRustCrypto.mockImplementation(() => { resolve(); return initCryptoCompleteDefer.promise; }); }); const rendered = getComponent({}); await initCryptoCalled; console.log("initCrypto called"); simulateSessionLockClaim(); await flushPromises(); // now we should see the error page rendered.getByText("Test is connected in another tab"); // let initCrypto complete, and check we don't get a modal initCryptoCompleteDefer.resolve(); await sleep(10); // Modals take a few ms to appear expect(document.body).toMatchSnapshot(); }); }); }); describe("mobile registration", () => { const getComponentAndWaitForReady = async (): Promise => { const renderResult = getComponent(); // wait for welcome page chrome render await screen.findByText("Powered by Matrix"); // go to mobile_register page defaultDispatcher.dispatch({ action: "start_mobile_registration", }); return renderResult; }; const enabledMobileRegistration = (): void => { jest.spyOn(SettingsStore, "getValue").mockImplementation((settingName: string) => { if (settingName === "Registration.mobileRegistrationHelper") return true; if (settingName === UIFeature.Registration) return true; }); }; it("should render welcome screen if mobile registration is not enabled in settings", async () => { await getComponentAndWaitForReady(); await screen.findByText("Powered by Matrix"); }); it("should render mobile registration", async () => { enabledMobileRegistration(); await getComponentAndWaitForReady(); await flushPromises(); expect(screen.getByTestId("mobile-register")).toBeInTheDocument(); }); }); describe("when key backup failed", () => { it("should show the new recovery method dialog", async () => { const spy = jest.spyOn(Modal, "createDialog"); jest.mock("../../../../src/async-components/views/dialogs/security/NewRecoveryMethodDialog", () => ({ __test: true, __esModule: true, default: () => mocked dialog, })); jest.spyOn(mockClient.getCrypto()!, "getActiveSessionBackupVersion").mockResolvedValue("version"); getComponent({}); defaultDispatcher.dispatch({ action: "will_start_client", }); await flushPromises(); mockClient.emit(CryptoEvent.KeyBackupFailed, "error code"); await waitFor(() => expect(spy).toHaveBeenCalledTimes(1)); expect((spy.mock.lastCall![0] as any)._payload._result).toEqual(expect.objectContaining({ __test: true })); }); it("should show the recovery method removed dialog", async () => { const spy = jest.spyOn(Modal, "createDialog"); jest.mock("../../../../src/async-components/views/dialogs/security/RecoveryMethodRemovedDialog", () => ({ __test: true, __esModule: true, default: () => mocked dialog, })); getComponent({}); defaultDispatcher.dispatch({ action: "will_start_client", }); await flushPromises(); mockClient.emit(CryptoEvent.KeyBackupFailed, "error code"); await waitFor(() => expect(spy).toHaveBeenCalledTimes(1)); expect((spy.mock.lastCall![0] as any)._payload._result).toEqual(expect.objectContaining({ __test: true })); }); }); });