1
0
mirror of https://github.com/kremalicious/metamask-extension.git synced 2024-11-27 12:56:01 +01:00
metamask-extension/test/unit/app/controllers/permissions/permissions-controller-test.js

1627 lines
49 KiB
JavaScript
Raw Normal View History

import { strict as assert } from 'assert'
import { find } from 'lodash'
import nanoid from 'nanoid'
import sinon from 'sinon'
import {
METADATA_STORE_KEY,
METADATA_CACHE_MAX_SIZE,
WALLET_PREFIX,
} from '../../../../../app/scripts/controllers/permissions/enums'
import {
PermissionsController,
addInternalMethodPrefix,
} from '../../../../../app/scripts/controllers/permissions'
2020-11-03 00:41:28 +01:00
import { getRequestUserApprovalHelper, grantPermissions } from './helpers'
import {
noop,
constants,
getters,
getNotifyDomain,
getNotifyAllDomains,
getPermControllerOpts,
} from './mocks'
2020-11-03 00:41:28 +01:00
const { ERRORS, NOTIFICATIONS, PERMS } = getters
const {
Fix order of accounts in `eth_accounts` response (#8342) * Fix order of accounts in `eth_accounts` response The accounts returned by `eth_accounts` were in a fixed order - the order in which the keyring returned them - rather than ordered with the selected account first. The accounts returned by the `accountsChanged` event were ordered with the selected account first, but the same order wasn't used for `eth_accounts`. We needed to store additional state in order to determine the correct account order correctly on all dapps. We had only been storing the current selected account, but since we also need to determine the primary account per dapp (i.e. the last "selected" account among the accounts exposed to that dapp), that wasn't enough. A `lastSelected` property has been added to each identity in the preferences controller to keep track of the last selected time. This property is set to the current time (in milliseconds) whenever a new selection is made. The accounts returned with `accountsChanged` and by `eth_accounts` are both ordered by this property. The `updatePermittedAccounts` function was merged with the internal methods for responding to account selection, to keep things simpler. It wasn't called externally anyway, so it wasn't needed in the public API. * Remove caveat update upon change in selected account The order of accounts in the caveat isn't meaningful, so the caveat doesn't need to be updated when the accounts get re-ordered. * Emit event regardless of account order Now that we're no longer relying upon the caveat for the account order, we also have no way of knowing if a particular account selection resulted in a change in order or not. The notification is now emitted whenever an exposed account is selected - even if the order stayed the same. The inpage provider currently caches the account order, so it can be relied upon to ignore these redundant events. We were already emiting redundant `accountsChanged` events in some cases anyway.
2020-04-16 20:20:01 +02:00
ALL_ACCOUNTS,
ACCOUNTS,
DUMMY_ACCOUNT,
DOMAINS,
PERM_NAMES,
REQUEST_IDS,
EXTRA_ACCOUNT,
} = constants
const initNotifications = () => {
return Object.values(DOMAINS).reduce((acc, domain) => {
acc[domain.origin] = []
return acc
}, {})
}
const initPermController = (notifications = initNotifications()) => {
return new PermissionsController({
...getPermControllerOpts(),
notifyDomain: getNotifyDomain(notifications),
notifyAllDomains: getNotifyAllDomains(notifications),
})
}
describe('permissions controller', function () {
describe('getAccounts', function () {
let permController
beforeEach(function () {
permController = initPermController()
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.a.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
)
})
it('gets permitted accounts for permitted origins', async function () {
const aAccounts = await permController.getAccounts(DOMAINS.a.origin)
const bAccounts = await permController.getAccounts(DOMAINS.b.origin)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
aAccounts,
[ACCOUNTS.a.primary],
'first origin should have correct accounts',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
bAccounts,
[ACCOUNTS.b.primary],
'second origin should have correct accounts',
)
})
it('does not get accounts for unpermitted origins', async function () {
const cAccounts = await permController.getAccounts(DOMAINS.c.origin)
assert.deepEqual(cAccounts, [], 'origin should have no accounts')
})
it('does not handle "metamask" origin as special case', async function () {
const metamaskAccounts = await permController.getAccounts('metamask')
assert.deepEqual(metamaskAccounts, [], 'origin should have no accounts')
})
})
describe('hasPermission', function () {
it('returns correct values', async function () {
const permController = initPermController()
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.a.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.test_method(),
)
assert.ok(
permController.hasPermission(DOMAINS.a.origin, 'eth_accounts'),
'should return true for granted permission',
)
assert.ok(
permController.hasPermission(DOMAINS.b.origin, 'test_method'),
'should return true for granted permission',
)
assert.ok(
!permController.hasPermission(DOMAINS.a.origin, 'test_method'),
'should return false for non-granted permission',
)
assert.ok(
!permController.hasPermission(DOMAINS.b.origin, 'eth_accounts'),
'should return true for non-granted permission',
)
assert.ok(
!permController.hasPermission('foo', 'eth_accounts'),
'should return false for unknown origin',
)
assert.ok(
!permController.hasPermission(DOMAINS.b.origin, 'foo'),
'should return false for unknown permission',
)
})
})
describe('clearPermissions', function () {
it('notifies all appropriate domains and removes permissions', async function () {
const notifications = initNotifications()
const permController = initPermController(notifications)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.a.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.c.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.c.permitted),
)
let aAccounts = await permController.getAccounts(DOMAINS.a.origin)
let bAccounts = await permController.getAccounts(DOMAINS.b.origin)
let cAccounts = await permController.getAccounts(DOMAINS.c.origin)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
aAccounts,
[ACCOUNTS.a.primary],
'first origin should have correct accounts',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
bAccounts,
[ACCOUNTS.b.primary],
'second origin should have correct accounts',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
cAccounts,
[ACCOUNTS.c.primary],
'third origin should have correct accounts',
)
permController.clearPermissions()
Object.keys(notifications).forEach((origin) => {
assert.deepEqual(
notifications[origin],
[NOTIFICATIONS.removedAccounts()],
'origin should have single wallet_accountsChanged:[] notification',
)
})
aAccounts = await permController.getAccounts(DOMAINS.a.origin)
bAccounts = await permController.getAccounts(DOMAINS.b.origin)
cAccounts = await permController.getAccounts(DOMAINS.c.origin)
assert.deepEqual(aAccounts, [], 'first origin should have no accounts')
assert.deepEqual(bAccounts, [], 'second origin should have no accounts')
assert.deepEqual(cAccounts, [], 'third origin should have no accounts')
Object.keys(notifications).forEach((origin) => {
assert.deepEqual(
permController.permissions.getPermissionsForDomain(origin),
[],
'origin should have no permissions',
)
})
assert.deepEqual(
2020-11-03 00:41:28 +01:00
Object.keys(permController.permissions.getDomains()),
[],
'all domains should be deleted',
)
})
})
describe('removePermissionsFor', function () {
let permController, notifications
beforeEach(function () {
notifications = initNotifications()
permController = initPermController(notifications)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.a.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
)
})
it('removes permissions for multiple domains', async function () {
let aAccounts = await permController.getAccounts(DOMAINS.a.origin)
let bAccounts = await permController.getAccounts(DOMAINS.b.origin)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
aAccounts,
[ACCOUNTS.a.primary],
'first origin should have correct accounts',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
bAccounts,
[ACCOUNTS.b.primary],
'second origin should have correct accounts',
)
permController.removePermissionsFor({
[DOMAINS.a.origin]: [PERM_NAMES.eth_accounts],
[DOMAINS.b.origin]: [PERM_NAMES.eth_accounts],
})
aAccounts = await permController.getAccounts(DOMAINS.a.origin)
bAccounts = await permController.getAccounts(DOMAINS.b.origin)
assert.deepEqual(aAccounts, [], 'first origin should have no accounts')
assert.deepEqual(bAccounts, [], 'second origin should have no accounts')
assert.deepEqual(
2020-11-03 00:41:28 +01:00
notifications[DOMAINS.a.origin],
[NOTIFICATIONS.removedAccounts()],
'first origin should have correct notification',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
notifications[DOMAINS.b.origin],
[NOTIFICATIONS.removedAccounts()],
'second origin should have correct notification',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
Object.keys(permController.permissions.getDomains()),
[],
'all domains should be deleted',
)
})
it('only removes targeted permissions from single domain', async function () {
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.test_method(),
)
2020-11-03 00:41:28 +01:00
let bPermissions = permController.permissions.getPermissionsForDomain(
DOMAINS.b.origin,
)
assert.ok(
2020-11-03 00:41:28 +01:00
bPermissions.length === 2 &&
find(bPermissions, { parentCapability: PERM_NAMES.eth_accounts }) &&
2020-11-03 00:41:28 +01:00
find(bPermissions, { parentCapability: PERM_NAMES.test_method }),
'origin should have correct permissions',
)
permController.removePermissionsFor({
[DOMAINS.b.origin]: [PERM_NAMES.test_method],
})
2020-11-03 00:41:28 +01:00
bPermissions = permController.permissions.getPermissionsForDomain(
DOMAINS.b.origin,
)
assert.ok(
2020-11-03 00:41:28 +01:00
bPermissions.length === 1 &&
find(bPermissions, { parentCapability: PERM_NAMES.eth_accounts }),
'only targeted permission should have been removed',
)
})
it('removes permissions for a single domain, without affecting another', async function () {
permController.removePermissionsFor({
[DOMAINS.b.origin]: [PERM_NAMES.eth_accounts],
})
const aAccounts = await permController.getAccounts(DOMAINS.a.origin)
const bAccounts = await permController.getAccounts(DOMAINS.b.origin)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
aAccounts,
[ACCOUNTS.a.primary],
'first origin should have correct accounts',
)
assert.deepEqual(bAccounts, [], 'second origin should have no accounts')
assert.deepEqual(
2020-11-03 00:41:28 +01:00
notifications[DOMAINS.a.origin],
[],
'first origin should have no notifications',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
notifications[DOMAINS.b.origin],
[NOTIFICATIONS.removedAccounts()],
'second origin should have correct notification',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
Object.keys(permController.permissions.getDomains()),
[DOMAINS.a.origin],
'only first origin should remain',
)
})
it('send notification but does not affect permissions for unknown domain', async function () {
// it knows nothing of this origin
permController.removePermissionsFor({
[DOMAINS.c.origin]: [PERM_NAMES.eth_accounts],
})
assert.deepEqual(
2020-11-03 00:41:28 +01:00
notifications[DOMAINS.c.origin],
[NOTIFICATIONS.removedAccounts()],
'unknown origin should have notification',
)
const aAccounts = await permController.getAccounts(DOMAINS.a.origin)
const bAccounts = await permController.getAccounts(DOMAINS.b.origin)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
aAccounts,
[ACCOUNTS.a.primary],
'first origin should have correct accounts',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
bAccounts,
[ACCOUNTS.b.primary],
'second origin should have correct accounts',
)
assert.deepEqual(
Object.keys(permController.permissions.getDomains()),
[DOMAINS.a.origin, DOMAINS.b.origin],
'should have correct domains',
)
})
})
describe('validatePermittedAccounts', function () {
let permController
beforeEach(function () {
permController = initPermController()
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.a.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
)
})
it('throws error on non-array accounts', async function () {
await assert.throws(
() => permController.validatePermittedAccounts(undefined),
ERRORS.validatePermittedAccounts.invalidParam(),
'should throw on undefined',
)
await assert.throws(
() => permController.validatePermittedAccounts(false),
ERRORS.validatePermittedAccounts.invalidParam(),
'should throw on false',
)
await assert.throws(
() => permController.validatePermittedAccounts(true),
ERRORS.validatePermittedAccounts.invalidParam(),
'should throw on true',
)
await assert.throws(
() => permController.validatePermittedAccounts({}),
ERRORS.validatePermittedAccounts.invalidParam(),
'should throw on non-array object',
)
})
it('throws error on empty array of accounts', async function () {
await assert.throws(
() => permController.validatePermittedAccounts([]),
ERRORS.validatePermittedAccounts.invalidParam(),
'should throw on empty array',
)
})
it('throws error if any account value is not in keyring', async function () {
const keyringAccounts = await permController.getKeyringAccounts()
await assert.throws(
() => permController.validatePermittedAccounts([DUMMY_ACCOUNT]),
ERRORS.validatePermittedAccounts.nonKeyringAccount(DUMMY_ACCOUNT),
'should throw on non-keyring account',
)
await assert.throws(
2020-11-03 00:41:28 +01:00
() =>
permController.validatePermittedAccounts(
keyringAccounts.concat(DUMMY_ACCOUNT),
),
ERRORS.validatePermittedAccounts.nonKeyringAccount(DUMMY_ACCOUNT),
'should throw on non-keyring account with other accounts',
)
})
it('succeeds if all accounts are in keyring', async function () {
const keyringAccounts = await permController.getKeyringAccounts()
await assert.doesNotThrow(
() => permController.validatePermittedAccounts(keyringAccounts),
'should not throw on all keyring accounts',
)
await assert.doesNotThrow(
() => permController.validatePermittedAccounts([keyringAccounts[0]]),
'should not throw on single keyring account',
)
await assert.doesNotThrow(
() => permController.validatePermittedAccounts([keyringAccounts[1]]),
'should not throw on single keyring account',
)
})
})
describe('addPermittedAccount', function () {
let permController, notifications
beforeEach(function () {
notifications = initNotifications()
permController = initPermController(notifications)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.a.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
)
})
it('should throw if account is not a string', async function () {
await assert.rejects(
() => permController.addPermittedAccount(DOMAINS.a.origin, {}),
ERRORS.validatePermittedAccounts.nonKeyringAccount({}),
'should throw on non-string account param',
)
})
it('should throw if given account is not in keyring', async function () {
await assert.rejects(
2020-11-03 00:41:28 +01:00
() =>
permController.addPermittedAccount(DOMAINS.a.origin, DUMMY_ACCOUNT),
ERRORS.validatePermittedAccounts.nonKeyringAccount(DUMMY_ACCOUNT),
'should throw on non-keyring account',
)
})
it('should throw if origin is invalid', async function () {
await assert.rejects(
() => permController.addPermittedAccount(false, EXTRA_ACCOUNT),
ERRORS.addPermittedAccount.invalidOrigin(),
'should throw on invalid origin',
)
})
it('should throw if origin lacks any permissions', async function () {
await assert.rejects(
2020-11-03 00:41:28 +01:00
() =>
permController.addPermittedAccount(DOMAINS.c.origin, EXTRA_ACCOUNT),
ERRORS.addPermittedAccount.invalidOrigin(),
'should throw on origin without permissions',
)
})
it('should throw if origin lacks eth_accounts permission', async function () {
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.c.origin,
PERMS.finalizedRequests.test_method(),
)
await assert.rejects(
2020-11-03 00:41:28 +01:00
() =>
permController.addPermittedAccount(DOMAINS.c.origin, EXTRA_ACCOUNT),
ERRORS.addPermittedAccount.noEthAccountsPermission(),
'should throw on origin without eth_accounts permission',
)
})
it('should throw if account is already permitted', async function () {
await assert.rejects(
2020-11-03 00:41:28 +01:00
() =>
permController.addPermittedAccount(
DOMAINS.a.origin,
ACCOUNTS.a.permitted[0],
),
ERRORS.addPermittedAccount.alreadyPermitted(),
'should throw if account is already permitted',
)
})
it('should successfully add permitted account', async function () {
await permController.addPermittedAccount(DOMAINS.a.origin, EXTRA_ACCOUNT)
2020-11-03 00:41:28 +01:00
const accounts = await permController._getPermittedAccounts(
DOMAINS.a.origin,
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
accounts,
[...ACCOUNTS.a.permitted, EXTRA_ACCOUNT],
'origin should have correct accounts',
)
assert.deepEqual(
notifications[DOMAINS.a.origin][0],
NOTIFICATIONS.newAccounts([ACCOUNTS.a.primary]),
'origin should have correct notification',
)
})
})
describe('removePermittedAccount', function () {
let permController, notifications
beforeEach(function () {
notifications = initNotifications()
permController = initPermController(notifications)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.a.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
)
})
it('should throw if account is not a string', async function () {
await assert.rejects(
() => permController.removePermittedAccount(DOMAINS.a.origin, {}),
ERRORS.validatePermittedAccounts.nonKeyringAccount({}),
'should throw on non-string account param',
)
})
it('should throw if given account is not in keyring', async function () {
await assert.rejects(
2020-11-03 00:41:28 +01:00
() =>
permController.removePermittedAccount(
DOMAINS.a.origin,
DUMMY_ACCOUNT,
),
ERRORS.validatePermittedAccounts.nonKeyringAccount(DUMMY_ACCOUNT),
'should throw on non-keyring account',
)
})
it('should throw if origin is invalid', async function () {
await assert.rejects(
() => permController.removePermittedAccount(false, EXTRA_ACCOUNT),
ERRORS.removePermittedAccount.invalidOrigin(),
'should throw on invalid origin',
)
})
it('should throw if origin lacks any permissions', async function () {
await assert.rejects(
2020-11-03 00:41:28 +01:00
() =>
permController.removePermittedAccount(
DOMAINS.c.origin,
EXTRA_ACCOUNT,
),
ERRORS.removePermittedAccount.invalidOrigin(),
'should throw on origin without permissions',
)
})
it('should throw if origin lacks eth_accounts permission', async function () {
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.c.origin,
PERMS.finalizedRequests.test_method(),
)
await assert.rejects(
2020-11-03 00:41:28 +01:00
() =>
permController.removePermittedAccount(
DOMAINS.c.origin,
EXTRA_ACCOUNT,
),
ERRORS.removePermittedAccount.noEthAccountsPermission(),
'should throw on origin without eth_accounts permission',
)
})
it('should throw if account is not permitted', async function () {
await assert.rejects(
2020-11-03 00:41:28 +01:00
() =>
permController.removePermittedAccount(
DOMAINS.b.origin,
ACCOUNTS.c.permitted[0],
),
ERRORS.removePermittedAccount.notPermitted(),
'should throw if account is not permitted',
)
})
it('should successfully remove permitted account', async function () {
2020-11-03 00:41:28 +01:00
await permController.removePermittedAccount(
DOMAINS.a.origin,
ACCOUNTS.a.permitted[1],
)
2020-11-03 00:41:28 +01:00
const accounts = await permController._getPermittedAccounts(
DOMAINS.a.origin,
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
accounts,
ACCOUNTS.a.permitted.filter((acc) => acc !== ACCOUNTS.a.permitted[1]),
'origin should have correct accounts',
)
assert.deepEqual(
notifications[DOMAINS.a.origin][0],
NOTIFICATIONS.newAccounts([ACCOUNTS.a.primary]),
'origin should have correct notification',
)
})
it('should remove eth_accounts permission if removing only permitted account', async function () {
2020-11-03 00:41:28 +01:00
await permController.removePermittedAccount(
DOMAINS.b.origin,
ACCOUNTS.b.permitted[0],
)
const accounts = await permController.getAccounts(DOMAINS.b.origin)
2020-11-03 00:41:28 +01:00
assert.deepEqual(accounts, [], 'origin should have no accounts')
const permission = await permController.permissions.getPermission(
2020-11-03 00:41:28 +01:00
DOMAINS.b.origin,
PERM_NAMES.eth_accounts,
)
2020-11-03 00:41:28 +01:00
assert.equal(
permission,
undefined,
'origin should not have eth_accounts permission',
)
assert.deepEqual(
notifications[DOMAINS.b.origin][0],
NOTIFICATIONS.removedAccounts(),
'origin should have correct notification',
)
})
})
describe('removeAllAccountPermissions', function () {
let permController, notifications
beforeEach(function () {
notifications = initNotifications()
permController = initPermController(notifications)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.a.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.c.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
)
})
it('should throw if account is not a string', async function () {
await assert.rejects(
() => permController.removeAllAccountPermissions({}),
ERRORS.validatePermittedAccounts.nonKeyringAccount({}),
'should throw on non-string account param',
)
})
it('should throw if given account is not in keyring', async function () {
await assert.rejects(
() => permController.removeAllAccountPermissions(DUMMY_ACCOUNT),
ERRORS.validatePermittedAccounts.nonKeyringAccount(DUMMY_ACCOUNT),
'should throw on non-keyring account',
)
})
it('should remove permitted account from single origin', async function () {
await permController.removeAllAccountPermissions(ACCOUNTS.a.permitted[1])
2020-11-03 00:41:28 +01:00
const accounts = await permController._getPermittedAccounts(
DOMAINS.a.origin,
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
accounts,
ACCOUNTS.a.permitted.filter((acc) => acc !== ACCOUNTS.a.permitted[1]),
'origin should have correct accounts',
)
assert.deepEqual(
notifications[DOMAINS.a.origin][0],
NOTIFICATIONS.newAccounts([ACCOUNTS.a.primary]),
'origin should have correct notification',
)
})
it('should permitted account from multiple origins', async function () {
await permController.removeAllAccountPermissions(ACCOUNTS.b.permitted[0])
const bAccounts = await permController.getAccounts(DOMAINS.b.origin)
2020-11-03 00:41:28 +01:00
assert.deepEqual(bAccounts, [], 'first origin should no accounts')
const cAccounts = await permController.getAccounts(DOMAINS.c.origin)
2020-11-03 00:41:28 +01:00
assert.deepEqual(cAccounts, [], 'second origin no accounts')
assert.deepEqual(
notifications[DOMAINS.b.origin][0],
NOTIFICATIONS.removedAccounts(),
'first origin should have correct notification',
)
assert.deepEqual(
notifications[DOMAINS.c.origin][0],
NOTIFICATIONS.removedAccounts(),
'second origin should have correct notification',
)
})
it('should remove eth_accounts permission if removing only permitted account', async function () {
await permController.removeAllAccountPermissions(ACCOUNTS.b.permitted[0])
const accounts = await permController.getAccounts(DOMAINS.b.origin)
2020-11-03 00:41:28 +01:00
assert.deepEqual(accounts, [], 'origin should have no accounts')
const permission = await permController.permissions.getPermission(
2020-11-03 00:41:28 +01:00
DOMAINS.b.origin,
PERM_NAMES.eth_accounts,
)
2020-11-03 00:41:28 +01:00
assert.equal(
permission,
undefined,
'origin should not have eth_accounts permission',
)
assert.deepEqual(
notifications[DOMAINS.b.origin][0],
NOTIFICATIONS.removedAccounts(),
'origin should have correct notification',
)
})
})
describe('finalizePermissionsRequest', function () {
let permController
beforeEach(function () {
permController = initPermController()
})
it('throws on non-keyring accounts', async function () {
await assert.rejects(
permController.finalizePermissionsRequest(
2020-11-03 00:41:28 +01:00
PERMS.requests.eth_accounts(),
[DUMMY_ACCOUNT],
),
ERRORS.validatePermittedAccounts.nonKeyringAccount(DUMMY_ACCOUNT),
'should throw on non-keyring account',
)
})
it('adds caveat to eth_accounts permission', async function () {
const perm = await permController.finalizePermissionsRequest(
PERMS.requests.eth_accounts(),
ACCOUNTS.a.permitted,
)
2020-11-03 00:41:28 +01:00
assert.deepEqual(
perm,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
})
it('replaces caveat of eth_accounts permission', async function () {
const perm = await permController.finalizePermissionsRequest(
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
ACCOUNTS.b.permitted,
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
perm,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
'permission should have correct caveat',
)
})
it('handles non-eth_accounts permission', async function () {
const perm = await permController.finalizePermissionsRequest(
PERMS.finalizedRequests.test_method(),
ACCOUNTS.b.permitted,
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
perm,
PERMS.finalizedRequests.test_method(),
'permission should have correct caveat',
)
})
})
describe('preferences state update', function () {
Fix order of accounts in `eth_accounts` response (#8342) * Fix order of accounts in `eth_accounts` response The accounts returned by `eth_accounts` were in a fixed order - the order in which the keyring returned them - rather than ordered with the selected account first. The accounts returned by the `accountsChanged` event were ordered with the selected account first, but the same order wasn't used for `eth_accounts`. We needed to store additional state in order to determine the correct account order correctly on all dapps. We had only been storing the current selected account, but since we also need to determine the primary account per dapp (i.e. the last "selected" account among the accounts exposed to that dapp), that wasn't enough. A `lastSelected` property has been added to each identity in the preferences controller to keep track of the last selected time. This property is set to the current time (in milliseconds) whenever a new selection is made. The accounts returned with `accountsChanged` and by `eth_accounts` are both ordered by this property. The `updatePermittedAccounts` function was merged with the internal methods for responding to account selection, to keep things simpler. It wasn't called externally anyway, so it wasn't needed in the public API. * Remove caveat update upon change in selected account The order of accounts in the caveat isn't meaningful, so the caveat doesn't need to be updated when the accounts get re-ordered. * Emit event regardless of account order Now that we're no longer relying upon the caveat for the account order, we also have no way of knowing if a particular account selection resulted in a change in order or not. The notification is now emitted whenever an exposed account is selected - even if the order stayed the same. The inpage provider currently caches the account order, so it can be relied upon to ignore these redundant events. We were already emiting redundant `accountsChanged` events in some cases anyway.
2020-04-16 20:20:01 +02:00
let permController, notifications, preferences, identities
beforeEach(function () {
2020-11-03 00:41:28 +01:00
identities = ALL_ACCOUNTS.reduce((identitiesAcc, account) => {
identitiesAcc[account] = {}
return identitiesAcc
}, {})
Fix order of accounts in `eth_accounts` response (#8342) * Fix order of accounts in `eth_accounts` response The accounts returned by `eth_accounts` were in a fixed order - the order in which the keyring returned them - rather than ordered with the selected account first. The accounts returned by the `accountsChanged` event were ordered with the selected account first, but the same order wasn't used for `eth_accounts`. We needed to store additional state in order to determine the correct account order correctly on all dapps. We had only been storing the current selected account, but since we also need to determine the primary account per dapp (i.e. the last "selected" account among the accounts exposed to that dapp), that wasn't enough. A `lastSelected` property has been added to each identity in the preferences controller to keep track of the last selected time. This property is set to the current time (in milliseconds) whenever a new selection is made. The accounts returned with `accountsChanged` and by `eth_accounts` are both ordered by this property. The `updatePermittedAccounts` function was merged with the internal methods for responding to account selection, to keep things simpler. It wasn't called externally anyway, so it wasn't needed in the public API. * Remove caveat update upon change in selected account The order of accounts in the caveat isn't meaningful, so the caveat doesn't need to be updated when the accounts get re-ordered. * Emit event regardless of account order Now that we're no longer relying upon the caveat for the account order, we also have no way of knowing if a particular account selection resulted in a change in order or not. The notification is now emitted whenever an exposed account is selected - even if the order stayed the same. The inpage provider currently caches the account order, so it can be relied upon to ignore these redundant events. We were already emiting redundant `accountsChanged` events in some cases anyway.
2020-04-16 20:20:01 +02:00
preferences = {
getState: sinon.stub(),
subscribe: sinon.stub(),
}
Fix order of accounts in `eth_accounts` response (#8342) * Fix order of accounts in `eth_accounts` response The accounts returned by `eth_accounts` were in a fixed order - the order in which the keyring returned them - rather than ordered with the selected account first. The accounts returned by the `accountsChanged` event were ordered with the selected account first, but the same order wasn't used for `eth_accounts`. We needed to store additional state in order to determine the correct account order correctly on all dapps. We had only been storing the current selected account, but since we also need to determine the primary account per dapp (i.e. the last "selected" account among the accounts exposed to that dapp), that wasn't enough. A `lastSelected` property has been added to each identity in the preferences controller to keep track of the last selected time. This property is set to the current time (in milliseconds) whenever a new selection is made. The accounts returned with `accountsChanged` and by `eth_accounts` are both ordered by this property. The `updatePermittedAccounts` function was merged with the internal methods for responding to account selection, to keep things simpler. It wasn't called externally anyway, so it wasn't needed in the public API. * Remove caveat update upon change in selected account The order of accounts in the caveat isn't meaningful, so the caveat doesn't need to be updated when the accounts get re-ordered. * Emit event regardless of account order Now that we're no longer relying upon the caveat for the account order, we also have no way of knowing if a particular account selection resulted in a change in order or not. The notification is now emitted whenever an exposed account is selected - even if the order stayed the same. The inpage provider currently caches the account order, so it can be relied upon to ignore these redundant events. We were already emiting redundant `accountsChanged` events in some cases anyway.
2020-04-16 20:20:01 +02:00
preferences.getState.returns({
identities,
selectedAddress: DUMMY_ACCOUNT,
})
notifications = initNotifications()
permController = new PermissionsController({
...getPermControllerOpts(),
notifyDomain: getNotifyDomain(notifications),
notifyAllDomains: getNotifyAllDomains(notifications),
preferences,
})
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.b.origin,
PERMS.finalizedRequests.eth_accounts([
...ACCOUNTS.a.permitted,
EXTRA_ACCOUNT,
]),
)
grantPermissions(
2020-11-03 00:41:28 +01:00
permController,
DOMAINS.c.origin,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
)
})
it('should throw if given invalid account', async function () {
assert(preferences.subscribe.calledOnce)
assert(preferences.subscribe.firstCall.args.length === 1)
const onPreferencesUpdate = preferences.subscribe.firstCall.args[0]
await assert.rejects(
() => onPreferencesUpdate({ selectedAddress: {} }),
ERRORS._handleAccountSelected.invalidParams(),
'should throw if account is not a string',
)
})
it('should do nothing if account not permitted for any origins', async function () {
assert(preferences.subscribe.calledOnce)
assert(preferences.subscribe.firstCall.args.length === 1)
const onPreferencesUpdate = preferences.subscribe.firstCall.args[0]
await onPreferencesUpdate({ selectedAddress: DUMMY_ACCOUNT })
assert.deepEqual(
2020-11-03 00:41:28 +01:00
notifications[DOMAINS.b.origin],
[],
'should not have emitted notification',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
notifications[DOMAINS.c.origin],
[],
'should not have emitted notification',
)
})
Fix order of accounts in `eth_accounts` response (#8342) * Fix order of accounts in `eth_accounts` response The accounts returned by `eth_accounts` were in a fixed order - the order in which the keyring returned them - rather than ordered with the selected account first. The accounts returned by the `accountsChanged` event were ordered with the selected account first, but the same order wasn't used for `eth_accounts`. We needed to store additional state in order to determine the correct account order correctly on all dapps. We had only been storing the current selected account, but since we also need to determine the primary account per dapp (i.e. the last "selected" account among the accounts exposed to that dapp), that wasn't enough. A `lastSelected` property has been added to each identity in the preferences controller to keep track of the last selected time. This property is set to the current time (in milliseconds) whenever a new selection is made. The accounts returned with `accountsChanged` and by `eth_accounts` are both ordered by this property. The `updatePermittedAccounts` function was merged with the internal methods for responding to account selection, to keep things simpler. It wasn't called externally anyway, so it wasn't needed in the public API. * Remove caveat update upon change in selected account The order of accounts in the caveat isn't meaningful, so the caveat doesn't need to be updated when the accounts get re-ordered. * Emit event regardless of account order Now that we're no longer relying upon the caveat for the account order, we also have no way of knowing if a particular account selection resulted in a change in order or not. The notification is now emitted whenever an exposed account is selected - even if the order stayed the same. The inpage provider currently caches the account order, so it can be relied upon to ignore these redundant events. We were already emiting redundant `accountsChanged` events in some cases anyway.
2020-04-16 20:20:01 +02:00
it('should emit notification if account already first in array for each connected site', async function () {
identities[ACCOUNTS.a.permitted[0]] = { lastSelected: 1000 }
assert(preferences.subscribe.calledOnce)
assert(preferences.subscribe.firstCall.args.length === 1)
const onPreferencesUpdate = preferences.subscribe.firstCall.args[0]
await onPreferencesUpdate({ selectedAddress: ACCOUNTS.a.permitted[0] })
assert.deepEqual(
notifications[DOMAINS.b.origin],
[NOTIFICATIONS.newAccounts([ACCOUNTS.a.primary])],
'should not have emitted notification',
)
assert.deepEqual(
notifications[DOMAINS.c.origin],
[NOTIFICATIONS.newAccounts([ACCOUNTS.a.primary])],
'should not have emitted notification',
)
})
it('should emit notification just for connected domains', async function () {
Fix order of accounts in `eth_accounts` response (#8342) * Fix order of accounts in `eth_accounts` response The accounts returned by `eth_accounts` were in a fixed order - the order in which the keyring returned them - rather than ordered with the selected account first. The accounts returned by the `accountsChanged` event were ordered with the selected account first, but the same order wasn't used for `eth_accounts`. We needed to store additional state in order to determine the correct account order correctly on all dapps. We had only been storing the current selected account, but since we also need to determine the primary account per dapp (i.e. the last "selected" account among the accounts exposed to that dapp), that wasn't enough. A `lastSelected` property has been added to each identity in the preferences controller to keep track of the last selected time. This property is set to the current time (in milliseconds) whenever a new selection is made. The accounts returned with `accountsChanged` and by `eth_accounts` are both ordered by this property. The `updatePermittedAccounts` function was merged with the internal methods for responding to account selection, to keep things simpler. It wasn't called externally anyway, so it wasn't needed in the public API. * Remove caveat update upon change in selected account The order of accounts in the caveat isn't meaningful, so the caveat doesn't need to be updated when the accounts get re-ordered. * Emit event regardless of account order Now that we're no longer relying upon the caveat for the account order, we also have no way of knowing if a particular account selection resulted in a change in order or not. The notification is now emitted whenever an exposed account is selected - even if the order stayed the same. The inpage provider currently caches the account order, so it can be relied upon to ignore these redundant events. We were already emiting redundant `accountsChanged` events in some cases anyway.
2020-04-16 20:20:01 +02:00
identities[EXTRA_ACCOUNT] = { lastSelected: 1000 }
assert(preferences.subscribe.calledOnce)
assert(preferences.subscribe.firstCall.args.length === 1)
const onPreferencesUpdate = preferences.subscribe.firstCall.args[0]
await onPreferencesUpdate({ selectedAddress: EXTRA_ACCOUNT })
assert.deepEqual(
notifications[DOMAINS.b.origin],
[NOTIFICATIONS.newAccounts([EXTRA_ACCOUNT])],
'should have emitted notification',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
notifications[DOMAINS.c.origin],
[],
'should not have emitted notification',
)
})
it('should emit notification for multiple connected domains', async function () {
identities[ACCOUNTS.a.permitted[1]] = { lastSelected: 1000 }
assert(preferences.subscribe.calledOnce)
assert(preferences.subscribe.firstCall.args.length === 1)
const onPreferencesUpdate = preferences.subscribe.firstCall.args[0]
await onPreferencesUpdate({ selectedAddress: ACCOUNTS.a.permitted[1] })
assert.deepEqual(
notifications[DOMAINS.b.origin],
[NOTIFICATIONS.newAccounts([ACCOUNTS.a.permitted[1]])],
'should have emitted notification',
)
assert.deepEqual(
notifications[DOMAINS.c.origin],
[NOTIFICATIONS.newAccounts([ACCOUNTS.c.primary])],
'should have emitted notification',
)
})
})
describe('approvePermissionsRequest', function () {
let permController, requestUserApproval
beforeEach(function () {
permController = initPermController()
requestUserApproval = getRequestUserApprovalHelper(permController)
})
it('does nothing if called on non-existing request', async function () {
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should be empty on init',
)
sinon.spy(permController, 'finalizePermissionsRequest')
const request = PERMS.approvedRequest(REQUEST_IDS.a, null)
await assert.doesNotReject(
permController.approvePermissionsRequest(request, null),
'should not throw on non-existing request',
)
assert.ok(
permController.finalizePermissionsRequest.notCalled,
'should not call finalizePermissionRequest',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should still be empty after request',
)
})
it('rejects request with bad accounts param', async function () {
const request = PERMS.approvedRequest(
REQUEST_IDS.a,
PERMS.requests.eth_accounts(),
)
const rejectionPromise = assert.rejects(
requestUserApproval(REQUEST_IDS.a),
ERRORS.validatePermittedAccounts.invalidParam(),
'should reject with "null" accounts',
)
await permController.approvePermissionsRequest(request, null)
await rejectionPromise
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should be empty after rejection',
)
})
it('rejects request with no permissions', async function () {
const request = PERMS.approvedRequest(REQUEST_IDS.a, {})
const requestRejection = assert.rejects(
requestUserApproval(REQUEST_IDS.a),
ERRORS.approvePermissionsRequest.noPermsRequested(),
'should reject if no permissions in request',
)
2020-11-03 00:41:28 +01:00
await permController.approvePermissionsRequest(
request,
ACCOUNTS.a.permitted,
)
await requestRejection
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should be empty after rejection',
)
})
it('approves valid request', async function () {
2020-11-03 00:41:28 +01:00
const request = PERMS.approvedRequest(
REQUEST_IDS.a,
PERMS.requests.eth_accounts(),
)
let perms
2020-11-03 00:41:28 +01:00
const requestApproval = assert.doesNotReject(async () => {
perms = await requestUserApproval(REQUEST_IDS.a)
}, 'should not reject single valid request')
2020-11-03 00:41:28 +01:00
await permController.approvePermissionsRequest(
request,
ACCOUNTS.a.permitted,
)
await requestApproval
assert.deepEqual(
2020-11-03 00:41:28 +01:00
perms,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
'should produce expected approved permissions',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should be empty after approval',
)
})
it('approves valid requests regardless of order', async function () {
2020-11-03 00:41:28 +01:00
const request1 = PERMS.approvedRequest(
REQUEST_IDS.a,
PERMS.requests.eth_accounts(),
)
const request2 = PERMS.approvedRequest(
REQUEST_IDS.b,
PERMS.requests.eth_accounts(),
)
const request3 = PERMS.approvedRequest(
REQUEST_IDS.c,
PERMS.requests.eth_accounts(),
)
let perms1, perms2
2020-11-03 00:41:28 +01:00
const approval1 = assert.doesNotReject(async () => {
perms1 = await requestUserApproval(REQUEST_IDS.a, DOMAINS.a.origin)
}, 'should not reject request')
2020-11-03 00:41:28 +01:00
const approval2 = assert.doesNotReject(async () => {
perms2 = await requestUserApproval(REQUEST_IDS.b, DOMAINS.b.origin)
}, 'should not reject request')
// approve out of order
2020-11-03 00:41:28 +01:00
await permController.approvePermissionsRequest(
request2,
ACCOUNTS.b.permitted,
)
// add a non-existing request to the mix
2020-11-03 00:41:28 +01:00
await permController.approvePermissionsRequest(
request3,
ACCOUNTS.c.permitted,
)
await permController.approvePermissionsRequest(
request1,
ACCOUNTS.a.permitted,
)
await approval1
await approval2
assert.deepEqual(
2020-11-03 00:41:28 +01:00
perms1,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.a.permitted),
'first request should produce expected approved permissions',
)
assert.deepEqual(
2020-11-03 00:41:28 +01:00
perms2,
PERMS.finalizedRequests.eth_accounts(ACCOUNTS.b.permitted),
'second request should produce expected approved permissions',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should be empty after approvals',
)
})
})
describe('rejectPermissionsRequest', function () {
let permController, requestUserApproval
beforeEach(async function () {
permController = initPermController()
requestUserApproval = getRequestUserApprovalHelper(permController)
})
it('does nothing if called on non-existing request', async function () {
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should be empty on init',
)
await assert.doesNotReject(
permController.rejectPermissionsRequest(REQUEST_IDS.a),
'should not throw on non-existing request',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should still be empty after request',
)
})
it('rejects single existing request', async function () {
const requestRejection = assert.rejects(
requestUserApproval(REQUEST_IDS.a),
ERRORS.rejectPermissionsRequest.rejection(),
'should reject with expected error',
)
await permController.rejectPermissionsRequest(REQUEST_IDS.a)
await requestRejection
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should be empty after rejection',
)
})
it('rejects requests regardless of order', async function () {
const requestRejection1 = assert.rejects(
requestUserApproval(REQUEST_IDS.b, DOMAINS.b.origin),
ERRORS.rejectPermissionsRequest.rejection(),
'should reject with expected error',
)
const requestRejection2 = assert.rejects(
requestUserApproval(REQUEST_IDS.c, DOMAINS.c.origin),
ERRORS.rejectPermissionsRequest.rejection(),
'should reject with expected error',
)
// reject out of order
await permController.rejectPermissionsRequest(REQUEST_IDS.c)
// add a non-existing request to the mix
await permController.rejectPermissionsRequest(REQUEST_IDS.a)
await permController.rejectPermissionsRequest(REQUEST_IDS.b)
await requestRejection1
await requestRejection2
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
0,
'pending approvals should be empty after approval',
)
})
})
// see permissions-middleware-test for testing the middleware itself
describe('createMiddleware', function () {
let permController, clock
beforeEach(function () {
permController = initPermController()
clock = sinon.useFakeTimers(1)
})
afterEach(function () {
clock.restore()
})
it('should throw on bad origin', function () {
assert.throws(
() => permController.createMiddleware({ origin: {} }),
ERRORS.createMiddleware.badOrigin(),
'should throw expected error',
)
assert.throws(
() => permController.createMiddleware({ origin: '' }),
ERRORS.createMiddleware.badOrigin(),
'should throw expected error',
)
assert.throws(
() => permController.createMiddleware({}),
ERRORS.createMiddleware.badOrigin(),
'should throw expected error',
)
})
it('should create a middleware', function () {
let middleware
2020-11-03 00:41:28 +01:00
assert.doesNotThrow(() => {
middleware = permController.createMiddleware({
origin: DOMAINS.a.origin,
})
}, 'should not throw')
2020-11-03 00:41:28 +01:00
assert.equal(typeof middleware, 'function', 'should return function')
assert.equal(
2020-11-03 00:41:28 +01:00
middleware.name,
'engineAsMiddleware',
'function name should be "engineAsMiddleware"',
)
})
it('should create a middleware with extensionId', function () {
const extensionId = 'fooExtension'
let middleware
2020-11-03 00:41:28 +01:00
assert.doesNotThrow(() => {
middleware = permController.createMiddleware({
origin: DOMAINS.a.origin,
extensionId,
})
}, 'should not throw')
2020-11-03 00:41:28 +01:00
assert.equal(typeof middleware, 'function', 'should return function')
assert.equal(
2020-11-03 00:41:28 +01:00
middleware.name,
'engineAsMiddleware',
'function name should be "engineAsMiddleware"',
)
const metadataStore = permController.store.getState()[METADATA_STORE_KEY]
assert.deepEqual(
2020-11-03 00:41:28 +01:00
metadataStore[DOMAINS.a.origin],
{ extensionId, lastUpdated: 1 },
'metadata should be stored',
)
})
})
describe('notifyAccountsChanged', function () {
let notifications, permController
beforeEach(function () {
notifications = initNotifications()
permController = initPermController(notifications)
sinon.spy(permController.permissionsLog, 'updateAccountsHistory')
})
it('notifyAccountsChanged records history and sends notification', async function () {
permController.notifyAccountsChanged(
DOMAINS.a.origin,
ACCOUNTS.a.permitted,
)
assert.ok(
permController.permissionsLog.updateAccountsHistory.calledOnce,
'permissionsLog.updateAccountsHistory should have been called once',
)
assert.deepEqual(
notifications[DOMAINS.a.origin],
[NOTIFICATIONS.newAccounts(ACCOUNTS.a.permitted)],
'origin should have correct notification',
)
})
it('notifyAccountsChanged throws on invalid origin', async function () {
assert.throws(
2020-11-03 00:41:28 +01:00
() => permController.notifyAccountsChanged(4, ACCOUNTS.a.permitted),
ERRORS.notifyAccountsChanged.invalidOrigin(4),
'should throw expected error for non-string origin',
)
assert.throws(
2020-11-03 00:41:28 +01:00
() => permController.notifyAccountsChanged('', ACCOUNTS.a.permitted),
ERRORS.notifyAccountsChanged.invalidOrigin(''),
'should throw expected error for empty string origin',
)
})
it('notifyAccountsChanged throws on invalid accounts', async function () {
assert.throws(
2020-11-03 00:41:28 +01:00
() => permController.notifyAccountsChanged(DOMAINS.a.origin, 4),
ERRORS.notifyAccountsChanged.invalidAccounts(),
'should throw expected error for truthy non-array accounts',
)
assert.throws(
2020-11-03 00:41:28 +01:00
() => permController.notifyAccountsChanged(DOMAINS.a.origin, null),
ERRORS.notifyAccountsChanged.invalidAccounts(),
'should throw expected error for falsy non-array accounts',
)
})
})
describe('addDomainMetadata', function () {
let permController, clock
2020-11-03 00:41:28 +01:00
function getMockMetadata(size) {
const dummyData = {}
for (let i = 0; i < size; i++) {
const key = i.toString()
dummyData[key] = {}
}
return dummyData
}
beforeEach(function () {
permController = initPermController()
permController._setDomainMetadata = sinon.fake()
clock = sinon.useFakeTimers(1)
})
afterEach(function () {
clock.restore()
})
it('calls setter function with expected new state when adding domain', function () {
permController.store.getState = sinon.fake.returns({
[METADATA_STORE_KEY]: {
[DOMAINS.a.origin]: {
foo: 'bar',
},
},
})
permController.addDomainMetadata(DOMAINS.b.origin, { foo: 'bar' })
assert.ok(
permController.store.getState.called,
'should have called store.getState',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController._setDomainMetadata.getCalls().length,
1,
'should have called _setDomainMetadata once',
)
2020-11-03 00:41:28 +01:00
assert.deepEqual(permController._setDomainMetadata.lastCall.args, [
{
[DOMAINS.a.origin]: {
foo: 'bar',
},
[DOMAINS.b.origin]: {
foo: 'bar',
host: DOMAINS.b.host,
lastUpdated: 1,
},
2020-11-03 00:41:28 +01:00
},
])
})
it('calls setter function with expected new states when updating existing domain', function () {
permController.store.getState = sinon.fake.returns({
[METADATA_STORE_KEY]: {
[DOMAINS.a.origin]: {
foo: 'bar',
},
[DOMAINS.b.origin]: {
bar: 'baz',
},
},
})
permController.addDomainMetadata(DOMAINS.b.origin, { foo: 'bar' })
assert.ok(
permController.store.getState.called,
'should have called store.getState',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController._setDomainMetadata.getCalls().length,
1,
'should have called _setDomainMetadata once',
)
2020-11-03 00:41:28 +01:00
assert.deepEqual(permController._setDomainMetadata.lastCall.args, [
{
[DOMAINS.a.origin]: {
foo: 'bar',
},
[DOMAINS.b.origin]: {
foo: 'bar',
bar: 'baz',
host: DOMAINS.b.host,
lastUpdated: 1,
},
2020-11-03 00:41:28 +01:00
},
])
})
it('pops metadata on add when too many origins are pending', function () {
sinon.spy(permController._pendingSiteMetadata, 'delete')
const mockMetadata = getMockMetadata(METADATA_CACHE_MAX_SIZE)
const expectedDeletedOrigin = Object.keys(mockMetadata)[0]
permController.store.getState = sinon.fake.returns({
[METADATA_STORE_KEY]: { ...mockMetadata },
})
// populate permController._pendingSiteMetadata, as though these origins
// were actually added
Object.keys(mockMetadata).forEach((origin) => {
permController._pendingSiteMetadata.add(origin)
})
permController.addDomainMetadata(DOMAINS.a.origin, { foo: 'bar' })
assert.ok(
permController.store.getState.called,
'should have called store.getState',
)
const expectedMetadata = {
...mockMetadata,
[DOMAINS.a.origin]: {
foo: 'bar',
host: DOMAINS.a.host,
lastUpdated: 1,
},
}
delete expectedMetadata[expectedDeletedOrigin]
assert.ok(
2020-11-03 00:41:28 +01:00
permController._pendingSiteMetadata.delete.calledOnceWithExactly(
expectedDeletedOrigin,
),
'should have called _pendingSiteMetadata.delete once',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController._setDomainMetadata.getCalls().length,
1,
'should have called _setDomainMetadata once',
)
2020-11-03 00:41:28 +01:00
assert.deepEqual(permController._setDomainMetadata.lastCall.args, [
expectedMetadata,
])
})
})
describe('_trimDomainMetadata', function () {
const permController = initPermController()
it('trims domain metadata for domains without permissions', function () {
const metadataArg = {
[DOMAINS.a.origin]: {},
[DOMAINS.b.origin]: {},
}
permController.permissions.getDomains = sinon.fake.returns({
[DOMAINS.a.origin]: {},
})
const metadataResult = permController._trimDomainMetadata(metadataArg)
assert.equal(
2020-11-03 00:41:28 +01:00
permController.permissions.getDomains.getCalls().length,
1,
'should have called permissions.getDomains once',
)
assert.deepEqual(
metadataResult,
{
[DOMAINS.a.origin]: {},
},
'should have produced expected state',
)
})
})
describe('miscellanea and edge cases', function () {
let permController
beforeEach(function () {
permController = initPermController()
})
it('requestAccountsPermissionWithId calls _requestAccountsPermission with an explicit request ID', async function () {
2020-11-03 00:41:28 +01:00
const _requestPermissions = sinon
.stub(permController, '_requestPermissions')
.resolves()
await permController.requestAccountsPermissionWithId('example.com')
2020-11-03 00:41:28 +01:00
assert.ok(
_requestPermissions.calledOnceWithExactly(
sinon.match.object.and(sinon.match.has('origin')),
{ eth_accounts: {} },
sinon.match.string.and(sinon.match.truthy),
),
)
_requestPermissions.restore()
})
it('_addPendingApproval: should throw if adding origin twice', function () {
const id = nanoid()
const origin = DOMAINS.a
permController._addPendingApproval(id, origin, noop, noop)
const otherId = nanoid()
assert.throws(
() => permController._addPendingApproval(otherId, origin, noop, noop),
ERRORS.pendingApprovals.duplicateOriginOrId(otherId, origin),
'should throw expected error',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovals.size,
1,
'pending approvals should have single entry',
)
assert.equal(
2020-11-03 00:41:28 +01:00
permController.pendingApprovalOrigins.size,
1,
'pending approval origins should have single item',
)
assert.deepEqual(
permController.pendingApprovals.get(id),
{ origin, resolve: noop, reject: noop },
'pending approvals should have expected entry',
)
assert.ok(
permController.pendingApprovalOrigins.has(origin),
'pending approval origins should have expected item',
)
})
it('addInternalMethodPrefix', function () {
const str = 'foo'
const res = addInternalMethodPrefix(str)
assert.equal(res, WALLET_PREFIX + str, 'should prefix correctly')
})
})
})