mirror of
https://github.com/kremalicious/metamask-extension.git
synced 2024-11-22 18:00:18 +01:00
0b4532ec1b
* remove state.json files * move file * Update Readme * Create fixture builder * load test fixture * remove redundant method * update snap tests * update stats tests * update extension tests * update extension tests * Update fixture data * snap test dapp connection * Update fixture data * add onboarding fixture * use onboarding fixture * reuse import account vault * remove unnecessary use of class * use fixture builder in new tests * switch to function * update default fixture * update default fixture * update test * update 1559 test fixttures * update 1559 test fixtures * update 1559 test fixtures * dismiss 3box whats new * remove redundant code * move docs * remove unused code * token detection * use default timeout * remove redundant code * Update fixture builder hide `Protect your funds` dialog remove browser environment remove default network details hide dismiss seed backup reminder recursively merges fixture data * add token to tokencontroller * remove network details * add missing identities to preference controller * remove duplicate properties * update bip-32 to use fixturebuilder * alphabetise snap permissions * update get snaps to use fixturebuilder * Update test-snap-bip-32.spec.js wait for window * add popular network state * update test * lint
239 lines
8.4 KiB
JavaScript
239 lines
8.4 KiB
JavaScript
const { strict: assert } = require('assert');
|
|
const {
|
|
convertToHexValue,
|
|
withFixtures,
|
|
regularDelayMs,
|
|
} = require('../helpers');
|
|
const FixtureBuilder = require('../fixture-builder');
|
|
|
|
describe('Sign Typed Data V4 Signature Request', function () {
|
|
it('can initiate and confirm a Signature Request', async function () {
|
|
const ganacheOptions = {
|
|
accounts: [
|
|
{
|
|
secretKey:
|
|
'0x7C9529A67102755B7E6102D6D950AC5D5863C98713805CEC576B945B15B71EAC',
|
|
balance: convertToHexValue(25000000000000000000),
|
|
},
|
|
],
|
|
};
|
|
const publicAddress = '0x5cfe73b6021e818b776b421b1c4db2474086a7e1';
|
|
await withFixtures(
|
|
{
|
|
dapp: true,
|
|
fixtures: new FixtureBuilder()
|
|
.withPermissionControllerConnectedToTestDapp()
|
|
.build(),
|
|
ganacheOptions,
|
|
title: this.test.title,
|
|
},
|
|
async ({ driver }) => {
|
|
await driver.navigate();
|
|
await driver.fill('#password', 'correct horse battery staple');
|
|
await driver.press('#password', driver.Key.ENTER);
|
|
|
|
await driver.openNewPage('http://127.0.0.1:8080/');
|
|
|
|
// creates a sign typed data signature request
|
|
await driver.clickElement('#signTypedDataV4');
|
|
|
|
await driver.waitUntilXWindowHandles(3);
|
|
let windowHandles = await driver.getAllWindowHandles();
|
|
await driver.switchToWindowWithTitle(
|
|
'MetaMask Notification',
|
|
windowHandles,
|
|
);
|
|
|
|
const title = await driver.findElement(
|
|
'.signature-request-content__title',
|
|
);
|
|
const name = await driver.findElement(
|
|
'.signature-request-content__info--bolded',
|
|
);
|
|
const content = await driver.findElements(
|
|
'.signature-request-content__info',
|
|
);
|
|
const origin = content[0];
|
|
const address = content[1];
|
|
const message = await driver.findElement(
|
|
'.signature-request-message--node-value',
|
|
);
|
|
assert.equal(await title.getText(), 'Signature request');
|
|
assert.equal(await name.getText(), 'Ether Mail');
|
|
assert.equal(await origin.getText(), 'http://127.0.0.1:8080');
|
|
assert.equal(
|
|
await address.getText(),
|
|
`${publicAddress.slice(0, 8)}...${publicAddress.slice(
|
|
publicAddress.length - 8,
|
|
)}`,
|
|
);
|
|
assert.equal(await message.getText(), 'Hello, Bob!');
|
|
// Approve signing typed data
|
|
await driver.clickElement(
|
|
'[data-testid="signature-request-scroll-button"]',
|
|
);
|
|
await driver.delay(regularDelayMs);
|
|
await driver.clickElement({ text: 'Sign', tag: 'button' });
|
|
await driver.waitUntilXWindowHandles(2);
|
|
windowHandles = await driver.getAllWindowHandles();
|
|
|
|
// switch to the Dapp and verify the signed addressed
|
|
await driver.switchToWindowWithTitle('E2E Test Dapp', windowHandles);
|
|
await driver.clickElement('#signTypedDataV4Verify');
|
|
const recoveredAddress = await driver.findElement(
|
|
'#signTypedDataV4VerifyResult',
|
|
);
|
|
assert.equal(await recoveredAddress.getText(), publicAddress);
|
|
},
|
|
);
|
|
});
|
|
});
|
|
|
|
/* eslint-disable-next-line mocha/max-top-level-suites */
|
|
describe('Sign Typed Data V3 Signature Request', function () {
|
|
it('can initiate and confirm a Signature Request', async function () {
|
|
const ganacheOptions = {
|
|
accounts: [
|
|
{
|
|
secretKey:
|
|
'0x7C9529A67102755B7E6102D6D950AC5D5863C98713805CEC576B945B15B71EAC',
|
|
balance: convertToHexValue(25000000000000000000),
|
|
},
|
|
],
|
|
};
|
|
const publicAddress = '0x5cfe73b6021e818b776b421b1c4db2474086a7e1';
|
|
await withFixtures(
|
|
{
|
|
dapp: true,
|
|
fixtures: new FixtureBuilder()
|
|
.withPermissionControllerConnectedToTestDapp()
|
|
.build(),
|
|
ganacheOptions,
|
|
title: this.test.title,
|
|
},
|
|
async ({ driver }) => {
|
|
await driver.navigate();
|
|
await driver.fill('#password', 'correct horse battery staple');
|
|
await driver.press('#password', driver.Key.ENTER);
|
|
|
|
await driver.openNewPage('http://127.0.0.1:8080/');
|
|
|
|
// creates a sign typed data signature request
|
|
await driver.clickElement('#signTypedDataV3');
|
|
|
|
await driver.waitUntilXWindowHandles(3);
|
|
let windowHandles = await driver.getAllWindowHandles();
|
|
await driver.switchToWindowWithTitle(
|
|
'MetaMask Notification',
|
|
windowHandles,
|
|
);
|
|
|
|
const title = await driver.findElement(
|
|
'.signature-request-content__title',
|
|
);
|
|
const name = await driver.findElement(
|
|
'.signature-request-content__info--bolded',
|
|
);
|
|
const content = await driver.findElements(
|
|
'.signature-request-content__info',
|
|
);
|
|
const origin = content[0];
|
|
const address = content[1];
|
|
const messages = await driver.findElements(
|
|
'.signature-request-message--node-value',
|
|
);
|
|
assert.equal(await title.getText(), 'Signature request');
|
|
assert.equal(await name.getText(), 'Ether Mail');
|
|
assert.equal(await origin.getText(), 'http://127.0.0.1:8080');
|
|
assert.equal(
|
|
await address.getText(),
|
|
`${publicAddress.slice(0, 8)}...${publicAddress.slice(
|
|
publicAddress.length - 8,
|
|
)}`,
|
|
);
|
|
assert.equal(await messages[4].getText(), 'Hello, Bob!');
|
|
|
|
// Approve signing typed data
|
|
await driver.clickElement({ text: 'Sign', tag: 'button' });
|
|
await driver.waitUntilXWindowHandles(2);
|
|
windowHandles = await driver.getAllWindowHandles();
|
|
|
|
// switch to the Dapp and verify the signed addressed
|
|
await driver.switchToWindowWithTitle('E2E Test Dapp', windowHandles);
|
|
await driver.clickElement('#signTypedDataV3Verify');
|
|
const recoveredAddress = await driver.findElement(
|
|
'#signTypedDataV3VerifyResult',
|
|
);
|
|
assert.equal(await recoveredAddress.getText(), publicAddress);
|
|
},
|
|
);
|
|
});
|
|
});
|
|
|
|
describe('Sign Typed Data Signature Request', function () {
|
|
it('can initiate and confirm a Signature Request', async function () {
|
|
const ganacheOptions = {
|
|
accounts: [
|
|
{
|
|
secretKey:
|
|
'0x7C9529A67102755B7E6102D6D950AC5D5863C98713805CEC576B945B15B71EAC',
|
|
balance: convertToHexValue(25000000000000000000),
|
|
},
|
|
],
|
|
};
|
|
const publicAddress = '0x5cfe73b6021e818b776b421b1c4db2474086a7e1';
|
|
await withFixtures(
|
|
{
|
|
dapp: true,
|
|
fixtures: new FixtureBuilder()
|
|
.withPermissionControllerConnectedToTestDapp()
|
|
.build(),
|
|
ganacheOptions,
|
|
title: this.test.title,
|
|
},
|
|
async ({ driver }) => {
|
|
await driver.navigate();
|
|
await driver.fill('#password', 'correct horse battery staple');
|
|
await driver.press('#password', driver.Key.ENTER);
|
|
|
|
await driver.openNewPage('http://127.0.0.1:8080/');
|
|
|
|
// creates a sign typed data signature request
|
|
await driver.clickElement('#signTypedData');
|
|
|
|
await driver.waitUntilXWindowHandles(3);
|
|
let windowHandles = await driver.getAllWindowHandles();
|
|
await driver.switchToWindowWithTitle(
|
|
'MetaMask Notification',
|
|
windowHandles,
|
|
);
|
|
|
|
const title = await driver.findElement(
|
|
'.request-signature__header__text',
|
|
);
|
|
const origin = await driver.findElement('.request-signature__origin');
|
|
const message = await driver.findElements(
|
|
'.request-signature__row-value',
|
|
);
|
|
assert.equal(await title.getText(), 'Signature request');
|
|
assert.equal(await origin.getText(), 'http://127.0.0.1:8080');
|
|
assert.equal(await message[0].getText(), 'Hi, Alice!');
|
|
assert.equal(await message[1].getText(), '1337');
|
|
|
|
// Approve signing typed data
|
|
await driver.clickElement({ text: 'Sign', tag: 'button' });
|
|
await driver.waitUntilXWindowHandles(2);
|
|
windowHandles = await driver.getAllWindowHandles();
|
|
|
|
// switch to the Dapp and verify the signed addressed
|
|
await driver.switchToWindowWithTitle('E2E Test Dapp', windowHandles);
|
|
await driver.clickElement('#signTypedDataVerify');
|
|
const recoveredAddress = await driver.findElement(
|
|
'#signTypedDataVerifyResult',
|
|
);
|
|
assert.equal(await recoveredAddress.getText(), publicAddress);
|
|
},
|
|
);
|
|
});
|
|
});
|