import React from 'react'; import configureMockStore from 'redux-mock-store'; import { fireEvent, screen } from '@testing-library/react'; import { MESSAGE_TYPE } from '../../../../shared/constants/app'; import mockState from '../../../../test/data/mock-state.json'; import { renderWithProvider } from '../../../../test/lib/render-helpers'; import configureStore from '../../../store/store'; import { SECURITY_PROVIDER_MESSAGE_SEVERITIES } from '../security-provider-banner-message/security-provider-banner-message.constants'; import SignatureRequestOriginal from '.'; const MOCK_SIGN_DATA = JSON.stringify({ domain: { name: 'happydapp.website', }, message: { string: 'haay wuurl', number: 42, }, primaryType: 'Mail', types: { EIP712Domain: [ { name: 'name', type: 'string' }, { name: 'version', type: 'string' }, { name: 'chainId', type: 'uint256' }, { name: 'verifyingContract', type: 'address' }, ], Group: [ { name: 'name', type: 'string' }, { name: 'members', type: 'Person[]' }, ], Mail: [ { name: 'from', type: 'Person' }, { name: 'to', type: 'Person[]' }, { name: 'contents', type: 'string' }, ], Person: [ { name: 'name', type: 'string' }, { name: 'wallets', type: 'address[]' }, ], }, }); const props = { signMessage: jest.fn(), cancelMessage: jest.fn(), txData: { msgParams: { from: '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc', data: MOCK_SIGN_DATA, origin: 'https://happydapp.website/governance?futarchy=true', }, type: MESSAGE_TYPE.ETH_SIGN, }, selectedAccount: { address: '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc', }, }; const render = (txData = props.txData) => { const store = configureStore({ metamask: { ...mockState.metamask, }, }); return renderWithProvider( , store, ); }; describe('SignatureRequestOriginal', () => { const store = configureMockStore()(mockState); it('should match snapshot', () => { const { container } = renderWithProvider( , store, ); expect(container).toMatchSnapshot(); }); it('should render navigation', () => { render(); const navigationContainer = screen.queryByTestId('navigation-container'); expect(navigationContainer).toBeInTheDocument(); }); it('should render eth sign screen', () => { render(); expect(screen.getByText('Signature request')).toBeInTheDocument(); }); it('should render warning for eth sign when sign button clicked', () => { render(); const signButton = screen.getByTestId('page-container-footer-next'); fireEvent.click(signButton); expect(screen.getByText('Your funds may be at risk')).toBeInTheDocument(); }); it('should escape RTL character in label or value', () => { const txData = { msgParams: { from: '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc', data: [ { type: 'string', name: 'Message \u202E test', value: 'Hi, \u202E Alice!', }, ], origin: 'https://happydapp.website/governance?futarchy=true', }, type: MESSAGE_TYPE.ETH_SIGN_TYPED_DATA, }; const { getByText } = render(txData); expect(getByText('Message \\u202E test:')).toBeInTheDocument(); expect(getByText('Hi, \\u202E Alice!')).toBeInTheDocument(); }); it('should render SecurityProviderBannerMessage component properly', () => { props.txData.securityProviderResponse = { flagAsDangerous: '?', reason: 'Some reason...', reason_header: 'Some reason header...', }; render(); expect(screen.getByText('Request not verified')).toBeInTheDocument(); expect( screen.getByText( 'Because of an error, this request was not verified by the security provider. Proceed with caution.', ), ).toBeInTheDocument(); expect(screen.getByText('OpenSea')).toBeInTheDocument(); }); it('should not render SecurityProviderBannerMessage component when flagAsDangerous is not malicious', () => { props.txData.securityProviderResponse = { flagAsDangerous: SECURITY_PROVIDER_MESSAGE_SEVERITIES.NOT_MALICIOUS, }; render(); expect(screen.queryByText('Request not verified')).toBeNull(); expect( screen.queryByText( 'Because of an error, this request was not verified by the security provider. Proceed with caution.', ), ).toBeNull(); expect(screen.queryByText('OpenSea')).toBeNull(); }); });