const assert = require('assert') const sinon = require('sinon') const clone = require('clone') const nock = require('nock') const createThoughStream = require('through2').obj const blacklistJSON = require('eth-phishing-detect/src/config') const MetaMaskController = require('../../../../app/scripts/metamask-controller') const firstTimeState = require('../../../../app/scripts/first-time-state') const createTxMeta = require('../../../lib/createTxMeta') const currentNetworkId = 42 const DEFAULT_LABEL = 'Account 1' const TEST_SEED = 'debris dizzy just program just float decrease vacant alarm reduce speak stadium' const TEST_ADDRESS = '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc' const TEST_SEED_ALT = 'setup olympic issue mobile velvet surge alcohol burger horse view reopen gentle' const TEST_ADDRESS_ALT = '0xc42edfcc21ed14dda456aa0756c153f7985d8813' const CUSTOM_RPC_URL = 'http://localhost:8545' describe('MetaMaskController', function () { let metamaskController const sandbox = sinon.createSandbox() const noop = () => {} beforeEach(function () { nock('https://api.infura.io') .persist() .get('/v2/blacklist') .reply(200, blacklistJSON) nock('https://api.infura.io') .get('/v1/ticker/ethusd') .reply(200, '{"base": "ETH", "quote": "USD", "bid": 288.45, "ask": 288.46, "volume": 112888.17569277, "exchange": "bitfinex", "total_volume": 272175.00106721005, "num_exchanges": 8, "timestamp": 1506444677}') nock('https://api.infura.io') .get('/v1/ticker/ethjpy') .reply(200, '{"base": "ETH", "quote": "JPY", "bid": 32300.0, "ask": 32400.0, "volume": 247.4616071, "exchange": "kraken", "total_volume": 247.4616071, "num_exchanges": 1, "timestamp": 1506444676}') nock('https://api.infura.io') .persist() .get(/.*/) .reply(200) metamaskController = new MetaMaskController({ showUnapprovedTx: noop, showUnconfirmedMessage: noop, encryptor: { encrypt: function (password, object) { this.object = object return Promise.resolve() }, decrypt: function () { return Promise.resolve(this.object) }, }, initState: clone(firstTimeState), }) sandbox.spy(metamaskController.keyringController, 'createNewVaultAndKeychain') sandbox.spy(metamaskController.keyringController, 'createNewVaultAndRestore') }) afterEach(function () { nock.cleanAll() sandbox.restore() }) describe('#getGasPrice', function () { it('gives the 50th percentile lowest accepted gas price from recentBlocksController', async function () { const realRecentBlocksController = metamaskController.recentBlocksController metamaskController.recentBlocksController = { store: { getState: () => { return { recentBlocks: [ { gasPrices: [ '0x3b9aca00', '0x174876e800'] }, { gasPrices: [ '0x3b9aca00', '0x174876e800'] }, { gasPrices: [ '0x174876e800', '0x174876e800' ]}, { gasPrices: [ '0x174876e800', '0x174876e800' ]}, ], } }, }, } const gasPrice = metamaskController.getGasPrice() assert.equal(gasPrice, '0x3b9aca00', 'accurately estimates 50th percentile accepted gas price') metamaskController.recentBlocksController = realRecentBlocksController }) }) describe('#createNewVaultAndKeychain', function () { it('can only create new vault on keyringController once', async function () { const selectStub = sandbox.stub(metamaskController, 'selectFirstIdentity') const password = 'a-fake-password' await metamaskController.createNewVaultAndKeychain(password) await metamaskController.createNewVaultAndKeychain(password) assert(metamaskController.keyringController.createNewVaultAndKeychain.calledOnce) selectStub.reset() }) }) describe('#createNewVaultAndRestore', function () { it('should be able to call newVaultAndRestore despite a mistake.', async function () { const password = 'what-what-what' await metamaskController.createNewVaultAndRestore(password, TEST_SEED.slice(0, -1)).catch((e) => null) await metamaskController.createNewVaultAndRestore(password, TEST_SEED) assert(metamaskController.keyringController.createNewVaultAndRestore.calledTwice) }) it('should clear previous identities after vault restoration', async () => { await metamaskController.createNewVaultAndRestore('foobar1337', TEST_SEED) assert.deepEqual(metamaskController.getState().identities, { [TEST_ADDRESS]: { address: TEST_ADDRESS, name: DEFAULT_LABEL }, }) await metamaskController.preferencesController.setAccountLabel(TEST_ADDRESS, 'Account Foo') assert.deepEqual(metamaskController.getState().identities, { [TEST_ADDRESS]: { address: TEST_ADDRESS, name: 'Account Foo' }, }) await metamaskController.createNewVaultAndRestore('foobar1337', TEST_SEED_ALT) assert.deepEqual(metamaskController.getState().identities, { [TEST_ADDRESS_ALT]: { address: TEST_ADDRESS_ALT, name: DEFAULT_LABEL }, }) }) }) describe('#getApi', function () { let getApi, state beforeEach(function () { getApi = metamaskController.getApi() }) it('getState', function (done) { getApi.getState((err, res) => { if (err) { done(err) } else { state = res } }) assert.deepEqual(state, metamaskController.getState()) done() }) }) describe('preferencesController', function () { it('defaults useBlockie to false', function () { assert.equal(metamaskController.preferencesController.store.getState().useBlockie, false) }) it('setUseBlockie to true', function () { metamaskController.setUseBlockie(true, noop) assert.equal(metamaskController.preferencesController.store.getState().useBlockie, true) }) }) describe('#selectFirstIdentity', function () { let identities, address beforeEach(function () { address = '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc' identities = { '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc': { 'address': address, 'name': 'Account 1', }, '0xc42edfcc21ed14dda456aa0756c153f7985d8813': { 'address': '0xc42edfcc21ed14dda456aa0756c153f7985d8813', 'name': 'Account 2', }, } metamaskController.preferencesController.store.updateState({ identities }) metamaskController.selectFirstIdentity() }) it('changes preferences controller select address', function () { const preferenceControllerState = metamaskController.preferencesController.store.getState() assert.equal(preferenceControllerState.selectedAddress, address) }) it('changes metamask controller selected address', function () { const metamaskState = metamaskController.getState() assert.equal(metamaskState.selectedAddress, address) }) }) describe('#setCustomRpc', function () { let rpcTarget beforeEach(function () { rpcTarget = metamaskController.setCustomRpc(CUSTOM_RPC_URL) }) it('returns custom RPC that when called', async function () { assert.equal(await rpcTarget, CUSTOM_RPC_URL) }) it('changes the network controller rpc', function () { const networkControllerState = metamaskController.networkController.store.getState() assert.equal(networkControllerState.provider.rpcTarget, CUSTOM_RPC_URL) }) }) describe('#setCurrentCurrency', function () { let defaultMetaMaskCurrency beforeEach(function () { defaultMetaMaskCurrency = metamaskController.currencyController.getCurrentCurrency() }) it('defaults to usd', function () { assert.equal(defaultMetaMaskCurrency, 'usd') }) it('sets currency to JPY', function () { metamaskController.setCurrentCurrency('JPY', noop) assert.equal(metamaskController.currencyController.getCurrentCurrency(), 'JPY') }) }) describe('#createShapeshifttx', function () { let depositAddress, depositType, shapeShiftTxList beforeEach(function () { nock('https://shapeshift.io') .get('/txStat/3EevLFfB4H4XMWQwYCgjLie1qCAGpd2WBc') .reply(200, '{"status": "no_deposits", "address": "3EevLFfB4H4XMWQwYCgjLie1qCAGpd2WBc"}') depositAddress = '3EevLFfB4H4XMWQwYCgjLie1qCAGpd2WBc' depositType = 'ETH' shapeShiftTxList = metamaskController.shapeshiftController.store.getState().shapeShiftTxList }) it('creates a shapeshift tx', async function () { metamaskController.createShapeShiftTx(depositAddress, depositType) assert.equal(shapeShiftTxList[0].depositAddress, depositAddress) }) }) describe('#addNewAccount', function () { let addNewAccount beforeEach(function () { addNewAccount = metamaskController.addNewAccount() }) it('errors when an primary keyring is does not exist', async function () { try { await addNewAccount assert.equal(1 === 0) } catch (e) { assert.equal(e.message, 'MetamaskController - No HD Key Tree found') } }) }) describe('#verifyseedPhrase', function () { let seedPhrase, getConfigSeed it('errors when no keying is provided', async function () { try { await metamaskController.verifySeedPhrase() } catch (error) { assert.equal(error.message, 'MetamaskController - No HD Key Tree found') } }) beforeEach(async function () { await metamaskController.createNewVaultAndKeychain('password') seedPhrase = await metamaskController.verifySeedPhrase() }) it('#placeSeedWords should match the initially created vault seed', function () { metamaskController.placeSeedWords((err, result) => { if (err) { console.log(err) } else { getConfigSeed = metamaskController.configManager.getSeedWords() assert.equal(result, seedPhrase) assert.equal(result, getConfigSeed) } }) assert.equal(getConfigSeed, undefined) }) it('#addNewAccount', async function () { await metamaskController.addNewAccount() const getAccounts = await metamaskController.keyringController.getAccounts() assert.equal(getAccounts.length, 2) }) }) describe('#resetAccount', function () { beforeEach(function () { const selectedAddressStub = sinon.stub(metamaskController.preferencesController, 'getSelectedAddress') const getNetworkstub = sinon.stub(metamaskController.txController.txStateManager, 'getNetwork') selectedAddressStub.returns('0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc') getNetworkstub.returns(42) metamaskController.txController.txStateManager._saveTxList([ createTxMeta({ id: 1, status: 'unapproved', metamaskNetworkId: currentNetworkId, txParams: {from: '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc'} }), createTxMeta({ id: 1, status: 'unapproved', metamaskNetworkId: currentNetworkId, txParams: {from: '0x0dcd5d886577d5081b0c52e242ef29e70be3e7bc'} }), createTxMeta({ id: 2, status: 'rejected', metamaskNetworkId: 32 }), createTxMeta({ id: 3, status: 'submitted', metamaskNetworkId: currentNetworkId, txParams: {from: '0xB09d8505E1F4EF1CeA089D47094f5DD3464083d4'} }), ]) }) it('wipes transactions from only the correct network id and with the selected address', async function () { await metamaskController.resetAccount() assert.equal(metamaskController.txController.txStateManager.getTx(1), undefined) }) }) describe('#clearSeedWordCache', function () { it('should have set seed words', function () { metamaskController.configManager.setSeedWords('test words') const getConfigSeed = metamaskController.configManager.getSeedWords() assert.equal(getConfigSeed, 'test words') }) it('should clear config seed phrase', function () { metamaskController.configManager.setSeedWords('test words') metamaskController.clearSeedWordCache((err, result) => { if (err) console.log(err) }) const getConfigSeed = metamaskController.configManager.getSeedWords() assert.equal(getConfigSeed, null) }) }) describe('#setCurrentLocale', function () { it('checks the default currentLocale', function () { const preferenceCurrentLocale = metamaskController.preferencesController.store.getState().currentLocale assert.equal(preferenceCurrentLocale, undefined) }) it('sets current locale in preferences controller', function () { metamaskController.setCurrentLocale('ja', noop) const preferenceCurrentLocale = metamaskController.preferencesController.store.getState().currentLocale assert.equal(preferenceCurrentLocale, 'ja') }) }) describe('#newUnsignedMessage', () => { let msgParams, metamaskMsgs, messages, msgId const address = '0xc42edfcc21ed14dda456aa0756c153f7985d8813' const data = '0x43727970746f6b697474696573' beforeEach(async () => { await metamaskController.createNewVaultAndRestore('foobar1337', TEST_SEED_ALT) msgParams = { 'from': address, 'data': data, } const promise = metamaskController.newUnsignedMessage(msgParams) // handle the promise so it doesn't throw an unhandledRejection promise.then(noop).catch(noop) metamaskMsgs = metamaskController.messageManager.getUnapprovedMsgs() messages = metamaskController.messageManager.messages msgId = Object.keys(metamaskMsgs)[0] messages[0].msgParams.metamaskId = parseInt(msgId) }) it('persists address from msg params', function () { assert.equal(metamaskMsgs[msgId].msgParams.from, address) }) it('persists data from msg params', function () { assert.equal(metamaskMsgs[msgId].msgParams.data, data) }) it('sets the status to unapproved', function () { assert.equal(metamaskMsgs[msgId].status, 'unapproved') }) it('sets the type to eth_sign', function () { assert.equal(metamaskMsgs[msgId].type, 'eth_sign') }) it('rejects the message', function () { const msgIdInt = parseInt(msgId) metamaskController.cancelMessage(msgIdInt, noop) assert.equal(messages[0].status, 'rejected') }) it('errors when signing a message', async function () { try { await metamaskController.signMessage(messages[0].msgParams) } catch (error) { assert.equal(error.message, 'message length is invalid') } }) }) describe('#newUnsignedPersonalMessage', function () { it('errors with no from in msgParams', async () => { const msgParams = { 'data': data, } try { await metamaskController.newUnsignedPersonalMessage(msgParams) assert.fail('should have thrown') } catch (error) { assert.equal(error.message, 'MetaMask Message Signature: from field is required.') } }) let msgParams, metamaskPersonalMsgs, personalMessages, msgId const address = '0xc42edfcc21ed14dda456aa0756c153f7985d8813' const data = '0x43727970746f6b697474696573' beforeEach(async function () { await metamaskController.createNewVaultAndRestore('foobar1337', TEST_SEED_ALT) msgParams = { 'from': address, 'data': data, } const promise = metamaskController.newUnsignedPersonalMessage(msgParams) // handle the promise so it doesn't throw an unhandledRejection promise.then(noop).catch(noop) metamaskPersonalMsgs = metamaskController.personalMessageManager.getUnapprovedMsgs() personalMessages = metamaskController.personalMessageManager.messages msgId = Object.keys(metamaskPersonalMsgs)[0] personalMessages[0].msgParams.metamaskId = parseInt(msgId) }) it('persists address from msg params', function () { assert.equal(metamaskPersonalMsgs[msgId].msgParams.from, address) }) it('persists data from msg params', function () { assert.equal(metamaskPersonalMsgs[msgId].msgParams.data, data) }) it('sets the status to unapproved', function () { assert.equal(metamaskPersonalMsgs[msgId].status, 'unapproved') }) it('sets the type to personal_sign', function () { assert.equal(metamaskPersonalMsgs[msgId].type, 'personal_sign') }) it('rejects the message', function () { const msgIdInt = parseInt(msgId) metamaskController.cancelPersonalMessage(msgIdInt, noop) assert.equal(personalMessages[0].status, 'rejected') }) it('errors when signing a message', async function () { await metamaskController.signPersonalMessage(personalMessages[0].msgParams) assert.equal(metamaskPersonalMsgs[msgId].status, 'signed') assert.equal(metamaskPersonalMsgs[msgId].rawSig, '0x6a1b65e2b8ed53cf398a769fad24738f9fbe29841fe6854e226953542c4b6a173473cb152b6b1ae5f06d601d45dd699a129b0a8ca84e78b423031db5baa734741b') }) }) describe('#setupUntrustedCommunication', function () { let streamTest const phishingUrl = 'myethereumwalletntw.com' afterEach(function () { streamTest.end() }) it('sets up phishing stream for untrusted communication ', async () => { await metamaskController.blacklistController.updatePhishingList() console.log(blacklistJSON.blacklist.includes(phishingUrl)) const { promise, resolve } = deferredPromise() streamTest = createThoughStream((chunk, enc, cb) => { if (chunk.name !== 'phishing') return cb() assert.equal(chunk.data.hostname, phishingUrl) resolve() cb() }) metamaskController.setupUntrustedCommunication(streamTest, phishingUrl) await promise }) }) describe('#setupTrustedCommunication', function () { let streamTest afterEach(function () { streamTest.end() }) it('sets up controller dnode api for trusted communication', function (done) { streamTest = createThoughStream((chunk, enc, cb) => { assert.equal(chunk.name, 'controller') cb() done() }) metamaskController.setupTrustedCommunication(streamTest, 'mycrypto.com') }) }) describe('#markAccountsFound', function () { it('adds lost accounts to config manager data', function () { metamaskController.markAccountsFound(noop) const configManagerData = metamaskController.configManager.getData() assert.deepEqual(configManagerData.lostAccounts, []) }) }) describe('#markPasswordForgotten', function () { it('adds and sets forgottenPassword to config data to true', function () { metamaskController.markPasswordForgotten(noop) const configManagerData = metamaskController.configManager.getData() assert.equal(configManagerData.forgottenPassword, true) }) }) describe('#unMarkPasswordForgotten', function () { it('adds and sets forgottenPassword to config data to false', function () { metamaskController.unMarkPasswordForgotten(noop) const configManagerData = metamaskController.configManager.getData() assert.equal(configManagerData.forgottenPassword, false) }) }) }) function deferredPromise () { let resolve const promise = new Promise(_resolve => { resolve = _resolve }) return { promise, resolve } }