aboutsummaryrefslogtreecommitdiffstats
path: root/test/unit/seed-phrase-verifier-test.js
blob: a7a463dd352be34a3b4cba0139b5171d6eb36784 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
const assert = require('assert')
const clone = require('clone')
const KeyringController = require('eth-keyring-controller')
const firstTimeState = require('../../app/scripts/first-time-state')
const seedPhraseVerifier = require('../../app/scripts/lib/seed-phrase-verifier')
const mockEncryptor = require('../lib/mock-encryptor')

describe('SeedPhraseVerifier', function () {

  describe('verifyAccounts', function () {

    var password = 'passw0rd1'
    let hdKeyTree = 'HD Key Tree'

    it('should be able to verify created account with seed words', async function () {

      let keyringController = new KeyringController({
        initState: clone(firstTimeState),
        encryptor: mockEncryptor,
      })
      assert(keyringController)

      let vault = await keyringController.createNewVaultAndKeychain(password)
      let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]

      let createdAccounts = await primaryKeyring.getAccounts()
      assert.equal(createdAccounts.length, 1)

      let serialized = await primaryKeyring.serialize()
      let seedWords = serialized.mnemonic
      assert.notEqual(seedWords.length, 0)
    
      let result = await seedPhraseVerifier.verifyAccounts(createdAccounts, seedWords)
    })

    it('should return error with good but different seed words', async function () {

      let keyringController = new KeyringController({
        initState: clone(firstTimeState),
        encryptor: mockEncryptor,
      })
      assert(keyringController)

      let vault = await keyringController.createNewVaultAndKeychain(password)
      let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]

      let createdAccounts = await primaryKeyring.getAccounts()
      assert.equal(createdAccounts.length, 1)

      let serialized = await primaryKeyring.serialize()
      let seedWords = 'debris dizzy just program just float decrease vacant alarm reduce speak stadium'
      
      try { 
        let result = await seedPhraseVerifier.verifyAccounts(createdAccounts, seedWords)
        assert.fail("Should reject")
      } catch (err) {
        assert.ok(err.message.indexOf('Not identical accounts!') >= 0, 'Wrong error message')
      }
    })

    it('should return error with undefined existing accounts', async function () {

      let keyringController = new KeyringController({
        initState: clone(firstTimeState),
        encryptor: mockEncryptor,
      })
      assert(keyringController)

      let vault = await keyringController.createNewVaultAndKeychain(password)
      let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]

      let createdAccounts = await primaryKeyring.getAccounts()
      assert.equal(createdAccounts.length, 1)

      let serialized = await primaryKeyring.serialize()
      let seedWords = 'debris dizzy just program just float decrease vacant alarm reduce speak stadium'

      try { 
        let result = await seedPhraseVerifier.verifyAccounts(undefined, seedWords)
        assert.fail("Should reject")
      } catch (err) {
        assert.equal(err.message, 'No created accounts defined.')
      }
    })

    it('should return error with empty accounts array', async function () {

      let keyringController = new KeyringController({
        initState: clone(firstTimeState),
        encryptor: mockEncryptor,
      })
      assert(keyringController)

      let vault = await keyringController.createNewVaultAndKeychain(password)
      let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]

      let createdAccounts = await primaryKeyring.getAccounts()
      assert.equal(createdAccounts.length, 1)

      let serialized = await primaryKeyring.serialize()
      let seedWords = 'debris dizzy just program just float decrease vacant alarm reduce speak stadium'

      try { 
        let result = await seedPhraseVerifier.verifyAccounts([], seedWords)
        assert.fail("Should reject")
      } catch (err) {
        assert.equal(err.message, 'No created accounts defined.')
      }
    })

    it('should be able to verify more than one created account with seed words', async function () {

      let keyringController = new KeyringController({
        initState: clone(firstTimeState),
        encryptor: mockEncryptor,
      })
      assert(keyringController)

      let vault = await keyringController.createNewVaultAndKeychain(password)
      
      let primaryKeyring = keyringController.getKeyringsByType(hdKeyTree)[0]

      const keyState = await keyringController.addNewAccount(primaryKeyring)
      const keyState2 = await keyringController.addNewAccount(primaryKeyring)

      let createdAccounts = await primaryKeyring.getAccounts()
      assert.equal(createdAccounts.length, 3)

      let serialized = await primaryKeyring.serialize()
      let seedWords = serialized.mnemonic
      assert.notEqual(seedWords.length, 0)
    
      let result = await seedPhraseVerifier.verifyAccounts(createdAccounts, seedWords)
    })
  })
})