mirror of
https://github.com/kremalicious/metamask-extension.git
synced 2024-11-22 01:47:00 +01:00
395 lines
12 KiB
TypeScript
395 lines
12 KiB
TypeScript
import { EncryptionPublicKeyManager } from '@metamask/message-manager';
|
|
import {
|
|
AbstractMessage,
|
|
OriginalRequest,
|
|
} from '@metamask/message-manager/dist/AbstractMessageManager';
|
|
import { KeyringType } from '../../../shared/constants/keyring';
|
|
import { MetaMetricsEventCategory } from '../../../shared/constants/metametrics';
|
|
import EncryptionPublicKeyController, {
|
|
EncryptionPublicKeyControllerMessenger,
|
|
EncryptionPublicKeyControllerOptions,
|
|
} from './encryption-public-key';
|
|
|
|
jest.mock('@metamask/message-manager', () => ({
|
|
EncryptionPublicKeyManager: jest.fn(),
|
|
}));
|
|
|
|
const messageIdMock = '123';
|
|
const messageIdMock2 = '456';
|
|
const stateMock = { test: 123 };
|
|
const addressMock = '0xc38bf1ad06ef69f0c04e29dbeb4152b4175f0a8d';
|
|
const publicKeyMock = '32762347862378feb87123781623a=';
|
|
const keyringTypeMock = KeyringType.hdKeyTree;
|
|
|
|
const messageParamsMock = {
|
|
from: addressMock,
|
|
origin: 'http://test.com',
|
|
data: addressMock,
|
|
metamaskId: messageIdMock,
|
|
};
|
|
|
|
const messageMock = {
|
|
id: messageIdMock,
|
|
time: 123,
|
|
status: 'unapproved',
|
|
type: 'testType',
|
|
rawSig: undefined,
|
|
} as any as AbstractMessage;
|
|
|
|
const coreMessageMock = {
|
|
...messageMock,
|
|
messageParams: messageParamsMock,
|
|
};
|
|
|
|
const stateMessageMock = {
|
|
...messageMock,
|
|
msgParams: addressMock,
|
|
origin: messageParamsMock.origin,
|
|
};
|
|
|
|
const requestMock = {
|
|
origin: 'http://test2.com',
|
|
} as OriginalRequest;
|
|
|
|
const createMessengerMock = () =>
|
|
({
|
|
registerActionHandler: jest.fn(),
|
|
publish: jest.fn(),
|
|
call: jest.fn(),
|
|
} as any as jest.Mocked<EncryptionPublicKeyControllerMessenger>);
|
|
|
|
const createEncryptionPublicKeyManagerMock = <T>() =>
|
|
({
|
|
getUnapprovedMessages: jest.fn(),
|
|
getUnapprovedMessagesCount: jest.fn(),
|
|
addUnapprovedMessageAsync: jest.fn(),
|
|
approveMessage: jest.fn(),
|
|
setMessageStatusAndResult: jest.fn(),
|
|
rejectMessage: jest.fn(),
|
|
subscribe: jest.fn(),
|
|
update: jest.fn(),
|
|
hub: {
|
|
on: jest.fn(),
|
|
},
|
|
} as any as jest.Mocked<T>);
|
|
|
|
describe('EncryptionPublicKeyController', () => {
|
|
let encryptionPublicKeyController: EncryptionPublicKeyController;
|
|
|
|
const encryptionPublicKeyManagerConstructorMock =
|
|
EncryptionPublicKeyManager as jest.MockedClass<
|
|
typeof EncryptionPublicKeyManager
|
|
>;
|
|
const encryptionPublicKeyManagerMock =
|
|
createEncryptionPublicKeyManagerMock<EncryptionPublicKeyManager>();
|
|
const messengerMock = createMessengerMock();
|
|
const getEncryptionPublicKeyMock = jest.fn();
|
|
const getAccountKeyringTypeMock = jest.fn();
|
|
const getStateMock = jest.fn();
|
|
const metricsEventMock = jest.fn();
|
|
|
|
beforeEach(() => {
|
|
jest.resetAllMocks();
|
|
|
|
encryptionPublicKeyManagerConstructorMock.mockReturnValue(
|
|
encryptionPublicKeyManagerMock,
|
|
);
|
|
|
|
encryptionPublicKeyController = new EncryptionPublicKeyController({
|
|
messenger: messengerMock as any,
|
|
getEncryptionPublicKey: getEncryptionPublicKeyMock as any,
|
|
getAccountKeyringType: getAccountKeyringTypeMock as any,
|
|
getState: getStateMock as any,
|
|
metricsEvent: metricsEventMock as any,
|
|
} as EncryptionPublicKeyControllerOptions);
|
|
});
|
|
|
|
describe('unapprovedMsgCount', () => {
|
|
it('returns value from message manager getter', () => {
|
|
encryptionPublicKeyManagerMock.getUnapprovedMessagesCount.mockReturnValueOnce(
|
|
10,
|
|
);
|
|
expect(encryptionPublicKeyController.unapprovedMsgCount).toBe(10);
|
|
});
|
|
});
|
|
|
|
describe('resetState', () => {
|
|
it('sets state to initial state', () => {
|
|
// eslint-disable-next-line @typescript-eslint/ban-ts-comment
|
|
// @ts-ignore
|
|
encryptionPublicKeyController.update(() => ({
|
|
unapprovedEncryptionPublicKeyMsgs: {
|
|
[messageIdMock]: messageMock,
|
|
} as any,
|
|
unapprovedEncryptionPublicKeyMsgCount: 1,
|
|
}));
|
|
|
|
encryptionPublicKeyController.resetState();
|
|
|
|
expect(encryptionPublicKeyController.state).toEqual({
|
|
unapprovedEncryptionPublicKeyMsgs: {},
|
|
unapprovedEncryptionPublicKeyMsgCount: 0,
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('rejectUnapproved', () => {
|
|
beforeEach(() => {
|
|
const messages = {
|
|
[messageIdMock]: messageMock,
|
|
[messageIdMock2]: messageMock,
|
|
};
|
|
encryptionPublicKeyManagerMock.getUnapprovedMessages.mockReturnValueOnce(
|
|
messages as any,
|
|
);
|
|
// eslint-disable-next-line @typescript-eslint/ban-ts-comment
|
|
// @ts-ignore
|
|
encryptionPublicKeyController.update(() => ({
|
|
unapprovedEncryptionPublicKeyMsgs: messages as any,
|
|
}));
|
|
});
|
|
|
|
it('rejects all messages in the message manager', () => {
|
|
encryptionPublicKeyController.rejectUnapproved('Test Reason');
|
|
expect(
|
|
encryptionPublicKeyManagerMock.rejectMessage,
|
|
).toHaveBeenCalledTimes(2);
|
|
expect(encryptionPublicKeyManagerMock.rejectMessage).toHaveBeenCalledWith(
|
|
messageIdMock,
|
|
);
|
|
expect(encryptionPublicKeyManagerMock.rejectMessage).toHaveBeenCalledWith(
|
|
messageIdMock2,
|
|
);
|
|
});
|
|
|
|
it('fires metrics event with reject reason', () => {
|
|
encryptionPublicKeyController.rejectUnapproved('Test Reason');
|
|
expect(metricsEventMock).toHaveBeenCalledTimes(2);
|
|
expect(metricsEventMock).toHaveBeenLastCalledWith({
|
|
event: 'Test Reason',
|
|
category: MetaMetricsEventCategory.Messages,
|
|
properties: {
|
|
action: 'Encryption public key Request',
|
|
},
|
|
});
|
|
});
|
|
});
|
|
|
|
describe('clearUnapproved', () => {
|
|
it('resets state in all message managers', () => {
|
|
encryptionPublicKeyController.clearUnapproved();
|
|
|
|
const defaultState = {
|
|
unapprovedMessages: {},
|
|
unapprovedMessagesCount: 0,
|
|
};
|
|
|
|
expect(encryptionPublicKeyManagerMock.update).toHaveBeenCalledTimes(1);
|
|
expect(encryptionPublicKeyManagerMock.update).toHaveBeenCalledWith(
|
|
defaultState,
|
|
);
|
|
});
|
|
});
|
|
|
|
describe('newRequestEncryptionPublicKey', () => {
|
|
it.each([
|
|
['Ledger', KeyringType.ledger],
|
|
['Trezor', KeyringType.trezor],
|
|
['Lattice', KeyringType.lattice],
|
|
['QR hardware', KeyringType.qr],
|
|
])(
|
|
'throws if keyring is not supported',
|
|
async (keyringName, keyringType) => {
|
|
getAccountKeyringTypeMock.mockResolvedValueOnce(keyringType);
|
|
|
|
await expect(
|
|
encryptionPublicKeyController.newRequestEncryptionPublicKey(
|
|
addressMock,
|
|
requestMock,
|
|
),
|
|
).rejects.toThrowError(
|
|
`${keyringName} does not support eth_getEncryptionPublicKey.`,
|
|
);
|
|
},
|
|
);
|
|
|
|
it('adds message to message manager', async () => {
|
|
getAccountKeyringTypeMock.mockResolvedValueOnce(keyringTypeMock);
|
|
|
|
await encryptionPublicKeyController.newRequestEncryptionPublicKey(
|
|
addressMock,
|
|
requestMock,
|
|
);
|
|
|
|
expect(
|
|
encryptionPublicKeyManagerMock.addUnapprovedMessageAsync,
|
|
).toHaveBeenCalledTimes(1);
|
|
expect(
|
|
encryptionPublicKeyManagerMock.addUnapprovedMessageAsync,
|
|
).toHaveBeenCalledWith({ from: addressMock }, requestMock);
|
|
});
|
|
});
|
|
|
|
describe('encryptionPublicKey', () => {
|
|
beforeEach(() => {
|
|
encryptionPublicKeyManagerMock.approveMessage.mockResolvedValueOnce({
|
|
from: messageParamsMock.data,
|
|
});
|
|
|
|
getEncryptionPublicKeyMock.mockResolvedValueOnce(publicKeyMock);
|
|
});
|
|
|
|
it('approves message and signs', async () => {
|
|
await encryptionPublicKeyController.encryptionPublicKey(
|
|
messageParamsMock,
|
|
);
|
|
|
|
expect(getEncryptionPublicKeyMock).toHaveBeenCalledTimes(1);
|
|
expect(getEncryptionPublicKeyMock).toHaveBeenCalledWith(
|
|
messageParamsMock.data,
|
|
);
|
|
|
|
expect(
|
|
encryptionPublicKeyManagerMock.setMessageStatusAndResult,
|
|
).toHaveBeenCalledTimes(1);
|
|
expect(
|
|
encryptionPublicKeyManagerMock.setMessageStatusAndResult,
|
|
).toHaveBeenCalledWith(
|
|
messageParamsMock.metamaskId,
|
|
publicKeyMock,
|
|
'received',
|
|
);
|
|
});
|
|
|
|
it('returns current state', async () => {
|
|
getStateMock.mockReturnValueOnce(stateMock);
|
|
expect(
|
|
await encryptionPublicKeyController.encryptionPublicKey(
|
|
messageParamsMock,
|
|
),
|
|
).toEqual(stateMock);
|
|
});
|
|
|
|
it('accepts approval', async () => {
|
|
await encryptionPublicKeyController.encryptionPublicKey(
|
|
messageParamsMock,
|
|
);
|
|
|
|
expect(messengerMock.call).toHaveBeenCalledTimes(1);
|
|
expect(messengerMock.call).toHaveBeenCalledWith(
|
|
'ApprovalController:acceptRequest',
|
|
messageParamsMock.metamaskId,
|
|
);
|
|
});
|
|
|
|
it('rejects message on error', async () => {
|
|
getEncryptionPublicKeyMock.mockReset();
|
|
getEncryptionPublicKeyMock.mockRejectedValue(new Error('Test Error'));
|
|
|
|
await expect(
|
|
encryptionPublicKeyController.encryptionPublicKey(messageParamsMock),
|
|
).rejects.toThrow('Test Error');
|
|
|
|
expect(
|
|
encryptionPublicKeyManagerMock.rejectMessage,
|
|
).toHaveBeenCalledTimes(1);
|
|
expect(encryptionPublicKeyManagerMock.rejectMessage).toHaveBeenCalledWith(
|
|
messageParamsMock.metamaskId,
|
|
);
|
|
});
|
|
|
|
it('rejects approval on error', async () => {
|
|
getEncryptionPublicKeyMock.mockReset();
|
|
getEncryptionPublicKeyMock.mockRejectedValue(new Error('Test Error'));
|
|
|
|
await expect(
|
|
encryptionPublicKeyController.encryptionPublicKey(messageParamsMock),
|
|
).rejects.toThrow('Test Error');
|
|
|
|
expect(messengerMock.call).toHaveBeenCalledTimes(1);
|
|
expect(messengerMock.call).toHaveBeenCalledWith(
|
|
'ApprovalController:rejectRequest',
|
|
messageParamsMock.metamaskId,
|
|
'Cancel',
|
|
);
|
|
});
|
|
});
|
|
|
|
describe('cancelEncryptionPublicKey', () => {
|
|
it('rejects message using message manager', async () => {
|
|
encryptionPublicKeyController.cancelEncryptionPublicKey(messageIdMock);
|
|
|
|
expect(
|
|
encryptionPublicKeyManagerMock.rejectMessage,
|
|
).toHaveBeenCalledTimes(1);
|
|
expect(encryptionPublicKeyManagerMock.rejectMessage).toHaveBeenCalledWith(
|
|
messageParamsMock.metamaskId,
|
|
);
|
|
});
|
|
|
|
it('rejects approval using approval controller', async () => {
|
|
encryptionPublicKeyController.cancelEncryptionPublicKey(messageIdMock);
|
|
|
|
expect(messengerMock.call).toHaveBeenCalledTimes(1);
|
|
expect(messengerMock.call).toHaveBeenCalledWith(
|
|
'ApprovalController:rejectRequest',
|
|
messageParamsMock.metamaskId,
|
|
'Cancel',
|
|
);
|
|
});
|
|
|
|
it('returns current state', async () => {
|
|
getStateMock.mockReturnValueOnce(stateMock);
|
|
expect(
|
|
await encryptionPublicKeyController.cancelEncryptionPublicKey(
|
|
messageIdMock,
|
|
),
|
|
).toEqual(stateMock);
|
|
});
|
|
});
|
|
|
|
describe('message manager events', () => {
|
|
it('bubbles update badge event from EncryptionPublicKeyManager', () => {
|
|
const mockListener = jest.fn();
|
|
|
|
encryptionPublicKeyController.hub.on('updateBadge', mockListener);
|
|
(encryptionPublicKeyManagerMock.hub.on as any).mock.calls[0][1]();
|
|
|
|
expect(mockListener).toHaveBeenCalledTimes(1);
|
|
});
|
|
|
|
it('requires approval on unapproved message event from EncryptionPublicKeyManager', () => {
|
|
messengerMock.call.mockResolvedValueOnce({});
|
|
|
|
(encryptionPublicKeyManagerMock.hub.on as any).mock.calls[1][1](
|
|
messageParamsMock,
|
|
);
|
|
|
|
expect(messengerMock.call).toHaveBeenCalledTimes(1);
|
|
expect(messengerMock.call).toHaveBeenCalledWith(
|
|
'ApprovalController:addRequest',
|
|
{
|
|
id: messageIdMock,
|
|
origin: messageParamsMock.origin,
|
|
type: 'eth_getEncryptionPublicKey',
|
|
},
|
|
true,
|
|
);
|
|
});
|
|
|
|
it('updates state on EncryptionPublicKeyManager state change', async () => {
|
|
await encryptionPublicKeyManagerMock.subscribe.mock.calls[0][0]({
|
|
unapprovedMessages: { [messageIdMock]: coreMessageMock as any },
|
|
unapprovedMessagesCount: 3,
|
|
});
|
|
|
|
expect(encryptionPublicKeyController.state).toEqual({
|
|
unapprovedEncryptionPublicKeyMsgs: {
|
|
[messageIdMock]: stateMessageMock as any,
|
|
},
|
|
unapprovedEncryptionPublicKeyMsgCount: 3,
|
|
});
|
|
});
|
|
});
|
|
});
|