mirror of
				https://github.com/vector-im/element-web.git
				synced 2025-10-30 15:51:43 +01:00 
			
		
		
		
	Blind attempt at fixing the end to end tests
This commit is contained in:
		
							parent
							
								
									45b6b95d44
								
							
						
					
					
						commit
						2432f77b72
					
				| @ -624,7 +624,11 @@ export default class CreateSecretStorageDialog extends React.PureComponent { | ||||
|                         <code ref={this._collectRecoveryKeyNode}>{this._recoveryKey.encodedPrivateKey}</code> | ||||
|                     </div> | ||||
|                     <div className="mx_CreateSecretStorageDialog_recoveryKeyButtons"> | ||||
|                         <AccessibleButton kind='primary' className="mx_Dialog_primary" onClick={this._onCopyClick}> | ||||
|                         <AccessibleButton | ||||
|                             kind='primary' | ||||
|                             className="mx_Dialog_primary mx_CreateSecretStorageDialog_recoveryKeyButtons_copyBtn" | ||||
|                             onClick={this._onCopyClick} | ||||
|                         > | ||||
|                             {_t("Copy")} | ||||
|                         </AccessibleButton> | ||||
|                         <AccessibleButton kind='primary' className="mx_Dialog_primary" onClick={this._onDownloadClick}> | ||||
|  | ||||
| @ -79,6 +79,33 @@ module.exports = async function signup(session, username, password, homeserver) | ||||
|     const acceptButton = await session.query('.mx_InteractiveAuthEntryComponents_termsSubmit'); | ||||
|     await acceptButton.click(); | ||||
| 
 | ||||
|     //plow through cross-signing setup by entering arbitrary details
 | ||||
|     //TODO: It's probably important for the tests to know the passphrase
 | ||||
|     const xsigningPassphrase = 'a7eaXcjpa9!Yl7#V^h$B^%dovHUVX'; // https://xkcd.com/221/
 | ||||
|     let passphraseField = await session.query('.mx_CreateSecretStorageDialog_passPhraseField input'); | ||||
|     await session.replaceInputText(passphraseField, xsigningPassphrase); | ||||
|     let xsignContButton = await session.query('.mx_CreateSecretStorageDialog_passPhraseContainer .mx_Dialog_primary'); | ||||
|     await xsignContButton.click(); | ||||
| 
 | ||||
|     //repeat passphrase entry
 | ||||
|     passphraseField = await session.query('.mx_CreateSecretStorageDialog_passPhraseField input'); | ||||
|     await session.replaceInputText(passphraseField, xsigningPassphrase); | ||||
|     xsignContButton = await session.query('.mx_CreateSecretStorageDialog_passPhraseContainer .mx_Dialog_primary'); | ||||
|     await xsignContButton.click(); | ||||
| 
 | ||||
|     //ignore the recovery key
 | ||||
|     //TODO: It's probably important for the tests to know the recovery key
 | ||||
|     const copyButton = await session.query('.mx_CreateSecretStorageDialog_recoveryKeyButtons_copyBtn'); | ||||
|     await copyButton.click(); | ||||
| 
 | ||||
|     //acknowledge that we copied the recovery key to a safe place
 | ||||
|     const copyContinueButton = await session.query('.mx_CreateSecretStorageDialog .mx_Dialog_primary'); | ||||
|     await copyContinueButton.click(); | ||||
| 
 | ||||
|     //acknowledge that we're done cross-signing setup and our keys are safe
 | ||||
|     const doneOkButton = await session.query('.mx_CreateSecretStorageDialog .mx_Dialog_primary'); | ||||
|     await doneOkButton.click(); | ||||
| 
 | ||||
|     //wait for registration to finish so the hash gets set
 | ||||
|     //onhashchange better?
 | ||||
| 
 | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user