mirror of
https://github.com/bitwarden/browser.git
synced 2024-11-28 12:45:45 +01:00
Ps/fix biometric prompt error on close (#8353)
* Fix error on close due to context differences in background Desktop background does not have active user information. Also, we want to delete _all_ prompt cancelled data, not just that for the active user. Storing this on global and manipulating observables to active achieves this without needing any user information in the background. * Remove potentially orphaned data * Throw nice error if prompt cancelled used without active user * Register migration * split prompt cancelled reset to user-specific and global
This commit is contained in:
parent
05609a814c
commit
600cc080b8
@ -94,7 +94,7 @@ export class WindowMain {
|
|||||||
// down the application.
|
// down the application.
|
||||||
app.on("before-quit", async () => {
|
app.on("before-quit", async () => {
|
||||||
// Allow biometric to auto-prompt on reload
|
// Allow biometric to auto-prompt on reload
|
||||||
await this.biometricStateService.resetPromptCancelled();
|
await this.biometricStateService.resetAllPromptCancelled();
|
||||||
this.isQuitting = true;
|
this.isQuitting = true;
|
||||||
});
|
});
|
||||||
|
|
||||||
|
@ -119,7 +119,7 @@ export class LockComponent implements OnInit, OnDestroy {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
await this.biometricStateService.setPromptCancelled();
|
await this.biometricStateService.setUserPromptCancelled();
|
||||||
const userKey = await this.cryptoService.getUserKeyFromStorage(KeySuffixOptions.Biometric);
|
const userKey = await this.cryptoService.getUserKeyFromStorage(KeySuffixOptions.Biometric);
|
||||||
|
|
||||||
if (userKey) {
|
if (userKey) {
|
||||||
@ -276,7 +276,7 @@ export class LockComponent implements OnInit, OnDestroy {
|
|||||||
|
|
||||||
private async doContinue(evaluatePasswordAfterUnlock: boolean) {
|
private async doContinue(evaluatePasswordAfterUnlock: boolean) {
|
||||||
await this.stateService.setEverBeenUnlocked(true);
|
await this.stateService.setEverBeenUnlocked(true);
|
||||||
await this.biometricStateService.resetPromptCancelled();
|
await this.biometricStateService.resetUserPromptCancelled();
|
||||||
this.messagingService.send("unlocked");
|
this.messagingService.send("unlocked");
|
||||||
|
|
||||||
if (evaluatePasswordAfterUnlock) {
|
if (evaluatePasswordAfterUnlock) {
|
||||||
|
@ -70,6 +70,9 @@ export class FakeAccountService implements AccountService {
|
|||||||
}
|
}
|
||||||
|
|
||||||
async switchAccount(userId: UserId): Promise<void> {
|
async switchAccount(userId: UserId): Promise<void> {
|
||||||
|
const next =
|
||||||
|
userId == null ? null : { id: userId, ...this.accountsSubject["_buffer"]?.[0]?.[userId] };
|
||||||
|
this.activeAccountSubject.next(next);
|
||||||
await this.mock.switchAccount(userId);
|
await this.mock.switchAccount(userId);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
import { firstValueFrom } from "rxjs";
|
import { firstValueFrom } from "rxjs";
|
||||||
|
|
||||||
import { makeEncString } from "../../../spec";
|
import { makeEncString, trackEmissions } from "../../../spec";
|
||||||
import { mockAccountServiceWith } from "../../../spec/fake-account-service";
|
import { FakeAccountService, mockAccountServiceWith } from "../../../spec/fake-account-service";
|
||||||
import { FakeSingleUserState } from "../../../spec/fake-state";
|
import { FakeGlobalState, FakeSingleUserState } from "../../../spec/fake-state";
|
||||||
import { FakeStateProvider } from "../../../spec/fake-state-provider";
|
import { FakeStateProvider } from "../../../spec/fake-state-provider";
|
||||||
import { UserId } from "../../types/guid";
|
import { UserId } from "../../types/guid";
|
||||||
import { EncryptedString } from "../models/domain/enc-string";
|
import { EncryptedString } from "../models/domain/enc-string";
|
||||||
@ -23,10 +23,11 @@ describe("BiometricStateService", () => {
|
|||||||
const userId = "userId" as UserId;
|
const userId = "userId" as UserId;
|
||||||
const encClientKeyHalf = makeEncString();
|
const encClientKeyHalf = makeEncString();
|
||||||
const encryptedClientKeyHalf = encClientKeyHalf.encryptedString;
|
const encryptedClientKeyHalf = encClientKeyHalf.encryptedString;
|
||||||
const accountService = mockAccountServiceWith(userId);
|
let accountService: FakeAccountService;
|
||||||
let stateProvider: FakeStateProvider;
|
let stateProvider: FakeStateProvider;
|
||||||
|
|
||||||
beforeEach(() => {
|
beforeEach(() => {
|
||||||
|
accountService = mockAccountServiceWith(userId);
|
||||||
stateProvider = new FakeStateProvider(accountService);
|
stateProvider = new FakeStateProvider(accountService);
|
||||||
|
|
||||||
sut = new DefaultBiometricStateService(stateProvider);
|
sut = new DefaultBiometricStateService(stateProvider);
|
||||||
@ -145,19 +146,89 @@ describe("BiometricStateService", () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
describe("setPromptCancelled", () => {
|
describe("setPromptCancelled", () => {
|
||||||
|
let existingState: Record<UserId, boolean>;
|
||||||
|
|
||||||
|
beforeEach(() => {
|
||||||
|
existingState = { ["otherUser" as UserId]: false };
|
||||||
|
stateProvider.global.getFake(PROMPT_CANCELLED).stateSubject.next(existingState);
|
||||||
|
});
|
||||||
|
|
||||||
test("observable is updated", async () => {
|
test("observable is updated", async () => {
|
||||||
await sut.setPromptCancelled();
|
await sut.setUserPromptCancelled();
|
||||||
|
|
||||||
expect(await firstValueFrom(sut.promptCancelled$)).toBe(true);
|
expect(await firstValueFrom(sut.promptCancelled$)).toBe(true);
|
||||||
});
|
});
|
||||||
|
|
||||||
it("updates state", async () => {
|
it("updates state", async () => {
|
||||||
await sut.setPromptCancelled();
|
await sut.setUserPromptCancelled();
|
||||||
|
|
||||||
const nextMock = stateProvider.activeUser.getFake(PROMPT_CANCELLED).nextMock;
|
const nextMock = stateProvider.global.getFake(PROMPT_CANCELLED).nextMock;
|
||||||
expect(nextMock).toHaveBeenCalledWith([userId, true]);
|
expect(nextMock).toHaveBeenCalledWith({ ...existingState, [userId]: true });
|
||||||
expect(nextMock).toHaveBeenCalledTimes(1);
|
expect(nextMock).toHaveBeenCalledTimes(1);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
it("throws when called with no active user", async () => {
|
||||||
|
await accountService.switchAccount(null);
|
||||||
|
await expect(sut.setUserPromptCancelled()).rejects.toThrow(
|
||||||
|
"Cannot update biometric prompt cancelled state without an active user",
|
||||||
|
);
|
||||||
|
const nextMock = stateProvider.global.getFake(PROMPT_CANCELLED).nextMock;
|
||||||
|
expect(nextMock).not.toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("resetAllPromptCancelled", () => {
|
||||||
|
it("deletes all prompt cancelled state", async () => {
|
||||||
|
await sut.resetAllPromptCancelled();
|
||||||
|
|
||||||
|
const nextMock = stateProvider.global.getFake(PROMPT_CANCELLED).nextMock;
|
||||||
|
expect(nextMock).toHaveBeenCalledWith(null);
|
||||||
|
expect(nextMock).toHaveBeenCalledTimes(1);
|
||||||
|
});
|
||||||
|
|
||||||
|
it("updates observable to false", async () => {
|
||||||
|
const emissions = trackEmissions(sut.promptCancelled$);
|
||||||
|
|
||||||
|
await sut.setUserPromptCancelled();
|
||||||
|
|
||||||
|
await sut.resetAllPromptCancelled();
|
||||||
|
|
||||||
|
expect(emissions).toEqual([false, true, false]);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("resetUserPromptCancelled", () => {
|
||||||
|
let existingState: Record<UserId, boolean>;
|
||||||
|
let state: FakeGlobalState<Record<UserId, boolean>>;
|
||||||
|
|
||||||
|
beforeEach(async () => {
|
||||||
|
await accountService.switchAccount(userId);
|
||||||
|
existingState = { [userId]: true, ["otherUser" as UserId]: false };
|
||||||
|
state = stateProvider.global.getFake(PROMPT_CANCELLED);
|
||||||
|
state.stateSubject.next(existingState);
|
||||||
|
});
|
||||||
|
|
||||||
|
it("deletes specified user prompt cancelled state", async () => {
|
||||||
|
await sut.resetUserPromptCancelled("otherUser" as UserId);
|
||||||
|
|
||||||
|
expect(state.nextMock).toHaveBeenCalledWith({ [userId]: true });
|
||||||
|
expect(state.nextMock).toHaveBeenCalledTimes(1);
|
||||||
|
});
|
||||||
|
|
||||||
|
it("deletes active user when called with no user", async () => {
|
||||||
|
await sut.resetUserPromptCancelled();
|
||||||
|
|
||||||
|
expect(state.nextMock).toHaveBeenCalledWith({ ["otherUser" as UserId]: false });
|
||||||
|
expect(state.nextMock).toHaveBeenCalledTimes(1);
|
||||||
|
});
|
||||||
|
|
||||||
|
it("updates observable to false", async () => {
|
||||||
|
const emissions = trackEmissions(sut.promptCancelled$);
|
||||||
|
|
||||||
|
await sut.resetUserPromptCancelled();
|
||||||
|
|
||||||
|
expect(emissions).toEqual([true, false]);
|
||||||
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
describe("setPromptAutomatically", () => {
|
describe("setPromptAutomatically", () => {
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { Observable, firstValueFrom, map } from "rxjs";
|
import { Observable, firstValueFrom, map, combineLatest } from "rxjs";
|
||||||
|
|
||||||
import { UserId } from "../../types/guid";
|
import { UserId } from "../../types/guid";
|
||||||
import { EncryptedString, EncString } from "../models/domain/enc-string";
|
import { EncryptedString, EncString } from "../models/domain/enc-string";
|
||||||
@ -81,13 +81,18 @@ export abstract class BiometricStateService {
|
|||||||
*/
|
*/
|
||||||
abstract setDismissedRequirePasswordOnStartCallout(): Promise<void>;
|
abstract setDismissedRequirePasswordOnStartCallout(): Promise<void>;
|
||||||
/**
|
/**
|
||||||
* Updates the active user's state to reflect that they've cancelled the biometric prompt this lock.
|
* Updates the active user's state to reflect that they've cancelled the biometric prompt.
|
||||||
*/
|
*/
|
||||||
abstract setPromptCancelled(): Promise<void>;
|
abstract setUserPromptCancelled(): Promise<void>;
|
||||||
/**
|
/**
|
||||||
* Resets the active user's state to reflect that they haven't cancelled the biometric prompt this lock.
|
* Resets the given user's state to reflect that they haven't cancelled the biometric prompt.
|
||||||
|
* @param userId the user to reset the prompt cancelled state for. If not provided, the currently active user will be used.
|
||||||
*/
|
*/
|
||||||
abstract resetPromptCancelled(): Promise<void>;
|
abstract resetUserPromptCancelled(userId?: UserId): Promise<void>;
|
||||||
|
/**
|
||||||
|
* Resets all user's state to reflect that they haven't cancelled the biometric prompt.
|
||||||
|
*/
|
||||||
|
abstract resetAllPromptCancelled(): Promise<void>;
|
||||||
/**
|
/**
|
||||||
* Updates the currently active user's setting for auto prompting for biometrics on application start and lock
|
* Updates the currently active user's setting for auto prompting for biometrics on application start and lock
|
||||||
* @param prompt Whether or not to prompt for biometrics on application start.
|
* @param prompt Whether or not to prompt for biometrics on application start.
|
||||||
@ -107,7 +112,7 @@ export class DefaultBiometricStateService implements BiometricStateService {
|
|||||||
private requirePasswordOnStartState: ActiveUserState<boolean>;
|
private requirePasswordOnStartState: ActiveUserState<boolean>;
|
||||||
private encryptedClientKeyHalfState: ActiveUserState<EncryptedString | undefined>;
|
private encryptedClientKeyHalfState: ActiveUserState<EncryptedString | undefined>;
|
||||||
private dismissedRequirePasswordOnStartCalloutState: ActiveUserState<boolean>;
|
private dismissedRequirePasswordOnStartCalloutState: ActiveUserState<boolean>;
|
||||||
private promptCancelledState: ActiveUserState<boolean>;
|
private promptCancelledState: GlobalState<Record<UserId, boolean>>;
|
||||||
private promptAutomaticallyState: ActiveUserState<boolean>;
|
private promptAutomaticallyState: ActiveUserState<boolean>;
|
||||||
private fingerprintValidatedState: GlobalState<boolean>;
|
private fingerprintValidatedState: GlobalState<boolean>;
|
||||||
biometricUnlockEnabled$: Observable<boolean>;
|
biometricUnlockEnabled$: Observable<boolean>;
|
||||||
@ -138,8 +143,15 @@ export class DefaultBiometricStateService implements BiometricStateService {
|
|||||||
this.dismissedRequirePasswordOnStartCallout$ =
|
this.dismissedRequirePasswordOnStartCallout$ =
|
||||||
this.dismissedRequirePasswordOnStartCalloutState.state$.pipe(map(Boolean));
|
this.dismissedRequirePasswordOnStartCalloutState.state$.pipe(map(Boolean));
|
||||||
|
|
||||||
this.promptCancelledState = this.stateProvider.getActive(PROMPT_CANCELLED);
|
this.promptCancelledState = this.stateProvider.getGlobal(PROMPT_CANCELLED);
|
||||||
this.promptCancelled$ = this.promptCancelledState.state$.pipe(map(Boolean));
|
this.promptCancelled$ = combineLatest([
|
||||||
|
this.stateProvider.activeUserId$,
|
||||||
|
this.promptCancelledState.state$,
|
||||||
|
]).pipe(
|
||||||
|
map(([userId, record]) => {
|
||||||
|
return record?.[userId] ?? false;
|
||||||
|
}),
|
||||||
|
);
|
||||||
this.promptAutomaticallyState = this.stateProvider.getActive(PROMPT_AUTOMATICALLY);
|
this.promptAutomaticallyState = this.stateProvider.getActive(PROMPT_AUTOMATICALLY);
|
||||||
this.promptAutomatically$ = this.promptAutomaticallyState.state$.pipe(map(Boolean));
|
this.promptAutomatically$ = this.promptAutomaticallyState.state$.pipe(map(Boolean));
|
||||||
|
|
||||||
@ -202,7 +214,7 @@ export class DefaultBiometricStateService implements BiometricStateService {
|
|||||||
|
|
||||||
async logout(userId: UserId): Promise<void> {
|
async logout(userId: UserId): Promise<void> {
|
||||||
await this.stateProvider.getUser(userId, ENCRYPTED_CLIENT_KEY_HALF).update(() => null);
|
await this.stateProvider.getUser(userId, ENCRYPTED_CLIENT_KEY_HALF).update(() => null);
|
||||||
await this.stateProvider.getUser(userId, PROMPT_CANCELLED).update(() => null);
|
await this.resetUserPromptCancelled(userId);
|
||||||
// Persist auto prompt setting through logout
|
// Persist auto prompt setting through logout
|
||||||
// Persist dismissed require password on start callout through logout
|
// Persist dismissed require password on start callout through logout
|
||||||
}
|
}
|
||||||
@ -211,11 +223,41 @@ export class DefaultBiometricStateService implements BiometricStateService {
|
|||||||
await this.dismissedRequirePasswordOnStartCalloutState.update(() => true);
|
await this.dismissedRequirePasswordOnStartCalloutState.update(() => true);
|
||||||
}
|
}
|
||||||
|
|
||||||
async setPromptCancelled(): Promise<void> {
|
async resetUserPromptCancelled(userId: UserId): Promise<void> {
|
||||||
await this.promptCancelledState.update(() => true);
|
await this.stateProvider.getGlobal(PROMPT_CANCELLED).update(
|
||||||
|
(data, activeUserId) => {
|
||||||
|
delete data[userId ?? activeUserId];
|
||||||
|
return data;
|
||||||
|
},
|
||||||
|
{
|
||||||
|
combineLatestWith: this.stateProvider.activeUserId$,
|
||||||
|
shouldUpdate: (data, activeUserId) => data?.[userId ?? activeUserId] != null,
|
||||||
|
},
|
||||||
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
async resetPromptCancelled(): Promise<void> {
|
async setUserPromptCancelled(): Promise<void> {
|
||||||
|
await this.promptCancelledState.update(
|
||||||
|
(record, userId) => {
|
||||||
|
record ??= {};
|
||||||
|
record[userId] = true;
|
||||||
|
return record;
|
||||||
|
},
|
||||||
|
{
|
||||||
|
combineLatestWith: this.stateProvider.activeUserId$,
|
||||||
|
shouldUpdate: (_, userId) => {
|
||||||
|
if (userId == null) {
|
||||||
|
throw new Error(
|
||||||
|
"Cannot update biometric prompt cancelled state without an active user",
|
||||||
|
);
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
},
|
||||||
|
},
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
async resetAllPromptCancelled(): Promise<void> {
|
||||||
await this.promptCancelledState.update(() => null);
|
await this.promptCancelledState.update(() => null);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ import {
|
|||||||
describe.each([
|
describe.each([
|
||||||
[ENCRYPTED_CLIENT_KEY_HALF, "encryptedClientKeyHalf"],
|
[ENCRYPTED_CLIENT_KEY_HALF, "encryptedClientKeyHalf"],
|
||||||
[DISMISSED_REQUIRE_PASSWORD_ON_START_CALLOUT, true],
|
[DISMISSED_REQUIRE_PASSWORD_ON_START_CALLOUT, true],
|
||||||
[PROMPT_CANCELLED, true],
|
[PROMPT_CANCELLED, { userId1: true, userId2: false }],
|
||||||
[PROMPT_AUTOMATICALLY, true],
|
[PROMPT_AUTOMATICALLY, true],
|
||||||
[REQUIRE_PASSWORD_ON_START, true],
|
[REQUIRE_PASSWORD_ON_START, true],
|
||||||
[BIOMETRIC_UNLOCK_ENABLED, true],
|
[BIOMETRIC_UNLOCK_ENABLED, true],
|
||||||
|
@ -1,3 +1,4 @@
|
|||||||
|
import { UserId } from "../../types/guid";
|
||||||
import { EncryptedString } from "../models/domain/enc-string";
|
import { EncryptedString } from "../models/domain/enc-string";
|
||||||
import { KeyDefinition, BIOMETRIC_SETTINGS_DISK } from "../state";
|
import { KeyDefinition, BIOMETRIC_SETTINGS_DISK } from "../state";
|
||||||
|
|
||||||
@ -56,7 +57,7 @@ export const DISMISSED_REQUIRE_PASSWORD_ON_START_CALLOUT = new KeyDefinition<boo
|
|||||||
* Stores whether the user has elected to cancel the biometric prompt. This is stored on disk due to process-reload
|
* Stores whether the user has elected to cancel the biometric prompt. This is stored on disk due to process-reload
|
||||||
* wiping memory state. We don't want to prompt the user again if they've elected to cancel.
|
* wiping memory state. We don't want to prompt the user again if they've elected to cancel.
|
||||||
*/
|
*/
|
||||||
export const PROMPT_CANCELLED = new KeyDefinition<boolean>(
|
export const PROMPT_CANCELLED = KeyDefinition.record<boolean, UserId>(
|
||||||
BIOMETRIC_SETTINGS_DISK,
|
BIOMETRIC_SETTINGS_DISK,
|
||||||
"promptCancelled",
|
"promptCancelled",
|
||||||
{
|
{
|
||||||
|
@ -41,6 +41,7 @@ import { EnableFaviconMigrator } from "./migrations/42-move-enable-favicon-to-do
|
|||||||
import { AutoConfirmFingerPrintsMigrator } from "./migrations/43-move-auto-confirm-finger-prints-to-state-provider";
|
import { AutoConfirmFingerPrintsMigrator } from "./migrations/43-move-auto-confirm-finger-prints-to-state-provider";
|
||||||
import { UserDecryptionOptionsMigrator } from "./migrations/44-move-user-decryption-options-to-state-provider";
|
import { UserDecryptionOptionsMigrator } from "./migrations/44-move-user-decryption-options-to-state-provider";
|
||||||
import { MergeEnvironmentState } from "./migrations/45-merge-environment-state";
|
import { MergeEnvironmentState } from "./migrations/45-merge-environment-state";
|
||||||
|
import { DeleteBiometricPromptCancelledData } from "./migrations/46-delete-orphaned-biometric-prompt-data";
|
||||||
import { AddKeyTypeToOrgKeysMigrator } from "./migrations/5-add-key-type-to-org-keys";
|
import { AddKeyTypeToOrgKeysMigrator } from "./migrations/5-add-key-type-to-org-keys";
|
||||||
import { RemoveLegacyEtmKeyMigrator } from "./migrations/6-remove-legacy-etm-key";
|
import { RemoveLegacyEtmKeyMigrator } from "./migrations/6-remove-legacy-etm-key";
|
||||||
import { MoveBiometricAutoPromptToAccount } from "./migrations/7-move-biometric-auto-prompt-to-account";
|
import { MoveBiometricAutoPromptToAccount } from "./migrations/7-move-biometric-auto-prompt-to-account";
|
||||||
@ -49,8 +50,7 @@ import { MoveBrowserSettingsToGlobal } from "./migrations/9-move-browser-setting
|
|||||||
import { MinVersionMigrator } from "./migrations/min-version";
|
import { MinVersionMigrator } from "./migrations/min-version";
|
||||||
|
|
||||||
export const MIN_VERSION = 3;
|
export const MIN_VERSION = 3;
|
||||||
export const CURRENT_VERSION = 45;
|
export const CURRENT_VERSION = 46;
|
||||||
|
|
||||||
export type MinVersion = typeof MIN_VERSION;
|
export type MinVersion = typeof MIN_VERSION;
|
||||||
|
|
||||||
export function createMigrationBuilder() {
|
export function createMigrationBuilder() {
|
||||||
@ -97,7 +97,8 @@ export function createMigrationBuilder() {
|
|||||||
.with(EnableFaviconMigrator, 41, 42)
|
.with(EnableFaviconMigrator, 41, 42)
|
||||||
.with(AutoConfirmFingerPrintsMigrator, 42, 43)
|
.with(AutoConfirmFingerPrintsMigrator, 42, 43)
|
||||||
.with(UserDecryptionOptionsMigrator, 43, 44)
|
.with(UserDecryptionOptionsMigrator, 43, 44)
|
||||||
.with(MergeEnvironmentState, 44, CURRENT_VERSION);
|
.with(MergeEnvironmentState, 44, 45)
|
||||||
|
.with(DeleteBiometricPromptCancelledData, 45, CURRENT_VERSION);
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function currentVersion(
|
export async function currentVersion(
|
||||||
|
@ -0,0 +1,28 @@
|
|||||||
|
import { runMigrator } from "../migration-helper.spec";
|
||||||
|
import { IRREVERSIBLE } from "../migrator";
|
||||||
|
|
||||||
|
import { DeleteBiometricPromptCancelledData } from "./46-delete-orphaned-biometric-prompt-data";
|
||||||
|
|
||||||
|
describe("MoveThemeToStateProviders", () => {
|
||||||
|
const sut = new DeleteBiometricPromptCancelledData(45, 46);
|
||||||
|
|
||||||
|
describe("migrate", () => {
|
||||||
|
it("deletes promptCancelled from all users", async () => {
|
||||||
|
const output = await runMigrator(sut, {
|
||||||
|
authenticatedAccounts: ["user-1", "user-2"],
|
||||||
|
"user_user-1_biometricSettings_promptCancelled": true,
|
||||||
|
"user_user-2_biometricSettings_promptCancelled": false,
|
||||||
|
});
|
||||||
|
|
||||||
|
expect(output).toEqual({
|
||||||
|
authenticatedAccounts: ["user-1", "user-2"],
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("rollback", () => {
|
||||||
|
it("is irreversible", async () => {
|
||||||
|
await expect(runMigrator(sut, {}, "rollback")).rejects.toThrow(IRREVERSIBLE);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
@ -0,0 +1,23 @@
|
|||||||
|
import { KeyDefinitionLike, MigrationHelper } from "../migration-helper";
|
||||||
|
import { IRREVERSIBLE, Migrator } from "../migrator";
|
||||||
|
|
||||||
|
export const PROMPT_CANCELLED: KeyDefinitionLike = {
|
||||||
|
key: "promptCancelled",
|
||||||
|
stateDefinition: { name: "biometricSettings" },
|
||||||
|
};
|
||||||
|
|
||||||
|
export class DeleteBiometricPromptCancelledData extends Migrator<45, 46> {
|
||||||
|
async migrate(helper: MigrationHelper): Promise<void> {
|
||||||
|
await Promise.all(
|
||||||
|
(await helper.getAccounts()).map(async ({ userId }) => {
|
||||||
|
if (helper.getFromUser(userId, PROMPT_CANCELLED) != null) {
|
||||||
|
await helper.removeFromUser(userId, PROMPT_CANCELLED);
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
async rollback(helper: MigrationHelper): Promise<void> {
|
||||||
|
throw IRREVERSIBLE;
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user