mirror of
https://github.com/kremalicious/metamask-extension.git
synced 2024-12-23 09:52:26 +01:00
5e3770eb13
* siwe: re-enable warning UI for mismatched domains - unblocks mismatched domain support - we may re-add error handling here #18184 - reverts logic from #16616 * siwe: fix mismatch domain warning msg UI * lint: rm whitespace EOL * siwe: rm unit test * lint: fix whitespace * Icon: support .mm-icon - apply to SIWE actionable-message - .mm-icon is a <span> * lint: fix newline * Revert "siwe: rm unit test" This reverts commit c80a4a2e661609c46c76d1e43e05909b6db3f0f5. * ActionableMessage: add deprecation * siwe: replace actionable-msg w/ banner-alert * ActionableMessage: add param for lint * revert .mm_icon ActionableMessage support * siwe: create tests * siwe: fix typo in tests * siwe: fix - do not allow nested <p> elements * Update ui/components/app/signature-request-siwe/signature-request-siwe.js Co-authored-by: George Marshall <george.marshall@consensys.net> * Update ui/components/app/signature-request-siwe/signature-request-siwe.js Co-authored-by: George Marshall <george.marshall@consensys.net> * eslint fix --------- Co-authored-by: legobeat <109787230+legobeat@users.noreply.github.com> Co-authored-by: George Marshall <george.marshall@consensys.net>
114 lines
4.3 KiB
JavaScript
114 lines
4.3 KiB
JavaScript
import React from 'react';
|
|
import { cloneDeep } from 'lodash';
|
|
import { MESSAGE_TYPE } from '../../../../shared/constants/app';
|
|
import mockState from '../../../../test/data/mock-state.json';
|
|
import { renderWithProvider } from '../../../../test/lib/render-helpers';
|
|
import configureStore from '../../../store/store';
|
|
import SignatureRequestSIWE from '.';
|
|
|
|
const MOCK_ORIGIN = 'https://example-dapp.website';
|
|
const MOCK_ADDRESS = '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc';
|
|
|
|
const mockStoreInitialState = {
|
|
metamask: {
|
|
...mockState.metamask,
|
|
subjectMetadata: {
|
|
[MOCK_ORIGIN]: {
|
|
iconUrl: 'https://example-dapp.website/favicon-32x32.png',
|
|
name: 'Example Test Dapp',
|
|
},
|
|
},
|
|
},
|
|
};
|
|
|
|
const mockProps = {
|
|
cancelPersonalMessage: jest.fn(),
|
|
signPersonalMessage: jest.fn(),
|
|
txData: {
|
|
msgParams: {
|
|
from: MOCK_ADDRESS,
|
|
data: '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',
|
|
origin: MOCK_ORIGIN,
|
|
siwe: {
|
|
isSIWEMessage: true,
|
|
parsedMessage: {
|
|
domain: 'example-dapp.website',
|
|
address: MOCK_ADDRESS,
|
|
statement:
|
|
'Click to sign in and accept the Terms of Service: https://community.metamask.io/tos',
|
|
uri: 'http://localhost:8080',
|
|
version: '1',
|
|
nonce: 'STMt6KQMwwdOXE306',
|
|
chainId: 1,
|
|
issuedAt: '2023-03-18T21:40:40.823Z',
|
|
resources: [
|
|
'ipfs://Qme7ss3ARVgxv6rXqVPiikMJ8u2NLgmgszg13pYrDKEoiu',
|
|
'https://example.com/my-web2-claim.json',
|
|
],
|
|
},
|
|
},
|
|
},
|
|
type: MESSAGE_TYPE.PERSONAL_SIGN,
|
|
},
|
|
};
|
|
|
|
const render = (txData = mockProps.txData) => {
|
|
const store = configureStore(mockStoreInitialState);
|
|
|
|
return renderWithProvider(
|
|
<SignatureRequestSIWE {...mockProps} txData={txData} />,
|
|
store,
|
|
);
|
|
};
|
|
|
|
describe('SignatureRequestSIWE (Sign in with Ethereum)', () => {
|
|
it('should match snapshot', () => {
|
|
const { container } = render();
|
|
expect(container).toMatchSnapshot();
|
|
});
|
|
|
|
it('should render', async () => {
|
|
const { container, findByText } = render();
|
|
const bannerAlert = container.querySelector('.mm-banner-alert');
|
|
|
|
expect(bannerAlert).not.toBeTruthy();
|
|
expect(await findByText('Sign-in request')).toBeInTheDocument();
|
|
});
|
|
|
|
it('should render SiteOrigin', () => {
|
|
const { container } = render();
|
|
const siteOriginElem = container.querySelector('.site-origin');
|
|
expect(siteOriginElem).toHaveTextContent(MOCK_ORIGIN);
|
|
});
|
|
|
|
it('should render BannerAlert when addresses do not match', () => {
|
|
const store = configureStore(mockStoreInitialState);
|
|
const txData = cloneDeep(mockProps.txData);
|
|
txData.msgParams.siwe.parsedMessage.address = '0x12345';
|
|
|
|
const { container } = renderWithProvider(
|
|
<SignatureRequestSIWE {...mockProps} txData={txData} />,
|
|
store,
|
|
);
|
|
const bannerAlert = container.querySelector('.mm-banner-alert');
|
|
|
|
expect(bannerAlert).toBeTruthy();
|
|
expect(bannerAlert).toHaveTextContent('does not match the address');
|
|
});
|
|
|
|
it('should render BannerAlert when domains do not match', () => {
|
|
const store = configureStore(mockStoreInitialState);
|
|
const txData = cloneDeep(mockProps.txData);
|
|
txData.msgParams.siwe.parsedMessage.domain = 'potentially-malicious.com';
|
|
|
|
const { container } = renderWithProvider(
|
|
<SignatureRequestSIWE {...mockProps} txData={txData} />,
|
|
store,
|
|
);
|
|
const bannerAlert = container.querySelector('.mm-banner-alert');
|
|
|
|
expect(bannerAlert).toBeTruthy();
|
|
expect(bannerAlert).toHaveTextContent('Deceptive site request.');
|
|
});
|
|
});
|