mirror of
https://github.com/kremalicious/metamask-extension.git
synced 2024-11-28 23:06:37 +01:00
178 lines
5.9 KiB
JavaScript
178 lines
5.9 KiB
JavaScript
import {
|
|
CaveatTypes,
|
|
RestrictedMethods,
|
|
} from '../../../../shared/constants/permissions';
|
|
import { getPermissionBackgroundApiMethods } from './background-api';
|
|
|
|
describe('permission background API methods', () => {
|
|
describe('addPermittedAccount', () => {
|
|
it('adds a permitted account', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return { type: CaveatTypes.restrictReturnedAccounts, value: ['0x1'] };
|
|
}),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).addPermittedAccount('foo.com', '0x2');
|
|
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.updateCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.updateCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
['0x1', '0x2'],
|
|
);
|
|
});
|
|
|
|
it('does not add a permitted account', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return { type: CaveatTypes.restrictReturnedAccounts, value: ['0x1'] };
|
|
}),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).addPermittedAccount('foo.com', '0x1');
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.updateCaveat).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe('removePermittedAccount', () => {
|
|
it('removes a permitted account', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return {
|
|
type: CaveatTypes.restrictReturnedAccounts,
|
|
value: ['0x1', '0x2'],
|
|
};
|
|
}),
|
|
revokePermission: jest.fn(),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).removePermittedAccount('foo.com', '0x2');
|
|
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.revokePermission).not.toHaveBeenCalled();
|
|
|
|
expect(permissionController.updateCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.updateCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
['0x1'],
|
|
);
|
|
});
|
|
|
|
it('revokes the accounts permission if the removed account is the only permitted account', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return {
|
|
type: CaveatTypes.restrictReturnedAccounts,
|
|
value: ['0x1'],
|
|
};
|
|
}),
|
|
revokePermission: jest.fn(),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).removePermittedAccount('foo.com', '0x1');
|
|
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.revokePermission).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.revokePermission).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
);
|
|
|
|
expect(permissionController.updateCaveat).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('does not call permissionController.updateCaveat if the specified account is not permitted', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return { type: CaveatTypes.restrictReturnedAccounts, value: ['0x1'] };
|
|
}),
|
|
revokePermission: jest.fn(),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).removePermittedAccount('foo.com', '0x2');
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.revokePermission).not.toHaveBeenCalled();
|
|
expect(permissionController.updateCaveat).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe('requestAccountsPermissionWithId', () => {
|
|
it('request an accounts permission and returns the request id', async () => {
|
|
const permissionController = {
|
|
requestPermissions: jest
|
|
.fn()
|
|
.mockImplementationOnce(async (_, __, { id }) => {
|
|
return [null, { id }];
|
|
}),
|
|
};
|
|
|
|
const id = await getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).requestAccountsPermissionWithId('foo.com');
|
|
|
|
expect(permissionController.requestPermissions).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.requestPermissions).toHaveBeenCalledWith(
|
|
{ origin: 'foo.com' },
|
|
{ eth_accounts: {} },
|
|
{ id: expect.any(String) },
|
|
);
|
|
|
|
expect(id.length > 0).toBe(true);
|
|
expect(id).toStrictEqual(
|
|
permissionController.requestPermissions.mock.calls[0][2].id,
|
|
);
|
|
});
|
|
});
|
|
});
|