@@ -358,35 +358,6 @@ class BraveWalletProviderImplUnitTest : public testing::Test {
358
358
run_loop.Run ();
359
359
}
360
360
361
- void SignTypedMessage (absl::optional<bool > user_approved,
362
- const std::string& address,
363
- const std::string& message,
364
- const std::string& message_to_sign,
365
- base::Value&& domain,
366
- std::string* signature_out,
367
- int * error_out,
368
- std::string* error_message_out) {
369
- if (!signature_out || !error_out || !error_message_out)
370
- return ;
371
-
372
- base::RunLoop run_loop;
373
- provider ()->SignTypedMessage (
374
- address, message, message_to_sign, std::move (domain),
375
- base::BindLambdaForTesting ([&](const std::string& signature, int error,
376
- const std::string& error_message) {
377
- *signature_out = signature;
378
- *error_out = error;
379
- *error_message_out = error_message;
380
- run_loop.Quit ();
381
- }));
382
- // Wait for BraveWalletProviderImpl::ContinueSignMessage
383
- browser_task_environment_.RunUntilIdle ();
384
- if (user_approved)
385
- brave_wallet_service_->NotifySignMessageRequestProcessed (
386
- *user_approved, provider ()->sign_message_id_ - 1 );
387
- run_loop.Run ();
388
- }
389
-
390
361
// current request id will be returned
391
362
int SignMessageRequest (const std::string& address,
392
363
const std::string& message) {
@@ -949,118 +920,6 @@ TEST_F(BraveWalletProviderImplUnitTest, SignMessage) {
949
920
base::ASCIIToUTF16 (addresses[0 ])));
950
921
}
951
922
952
- TEST_F (BraveWalletProviderImplUnitTest, SignTypedMessage) {
953
- EXPECT_EQ (eth_json_rpc_controller ()->GetChainId (), " 0x1" );
954
- CreateWallet ();
955
- AddAccount ();
956
- const std::string valid_message_to_sign =
957
- " be609aee343fb3c4b28e1df9e632fca64fcfaede20f02e86244efddf30957bd2" ;
958
- std::string signature;
959
- int error;
960
- std::string error_message;
961
- base::Value domain (base::Value::Type::DICTIONARY);
962
- domain.SetIntKey (" chainId" , 1 );
963
- SignTypedMessage (absl::nullopt, " 1234" , " {...}" , valid_message_to_sign,
964
- domain.Clone (), &signature, &error, &error_message);
965
- EXPECT_TRUE (signature.empty ());
966
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kInvalidParams ));
967
- EXPECT_EQ (error_message,
968
- l10n_util::GetStringUTF8 (IDS_WALLET_INVALID_PARAMETERS));
969
-
970
- SignTypedMessage (absl::nullopt, " 0x12345678" , " {...}" , valid_message_to_sign,
971
- domain.Clone (), &signature, &error, &error_message);
972
- EXPECT_TRUE (signature.empty ());
973
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kInvalidParams ));
974
- EXPECT_EQ (error_message,
975
- l10n_util::GetStringUTF8 (IDS_WALLET_INVALID_PARAMETERS));
976
-
977
- const std::string address = " 0x1234567890123456789012345678901234567890" ;
978
- // domain not dict
979
- SignTypedMessage (absl::nullopt, address, " {...}" , valid_message_to_sign,
980
- base::Value (" not dict" ), &signature, &error, &error_message);
981
- EXPECT_TRUE (signature.empty ());
982
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kInvalidParams ));
983
- EXPECT_EQ (error_message,
984
- l10n_util::GetStringUTF8 (IDS_WALLET_INVALID_PARAMETERS));
985
-
986
- // not valid hex
987
- SignTypedMessage (absl::nullopt, address, " {...}" , " brave" , domain.Clone (),
988
- &signature, &error, &error_message);
989
- EXPECT_TRUE (signature.empty ());
990
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kInvalidParams ));
991
- EXPECT_EQ (error_message,
992
- l10n_util::GetStringUTF8 (IDS_WALLET_INVALID_PARAMETERS));
993
-
994
- // not valid eip712 hash
995
- SignTypedMessage (absl::nullopt, address, " {...}" , " deadbeef" , domain.Clone (),
996
- &signature, &error, &error_message);
997
- EXPECT_TRUE (signature.empty ());
998
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kInvalidParams ));
999
- EXPECT_EQ (error_message,
1000
- l10n_util::GetStringUTF8 (IDS_WALLET_INVALID_PARAMETERS));
1001
-
1002
- domain.SetIntKey (" chainId" , 4 );
1003
- std::string chain_id = " 0x4" ;
1004
- // not active network
1005
- SignTypedMessage (absl::nullopt, address, " {...}" , valid_message_to_sign,
1006
- domain.Clone (), &signature, &error, &error_message);
1007
- EXPECT_TRUE (signature.empty ());
1008
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kInternalError ));
1009
- EXPECT_EQ (error_message,
1010
- l10n_util::GetStringFUTF8 (
1011
- IDS_BRAVE_WALLET_SIGN_TYPED_MESSAGE_CHAIN_ID_MISMATCH,
1012
- base::ASCIIToUTF16 (chain_id)));
1013
- domain.SetIntKey (" chainId" , 1 );
1014
-
1015
- SignTypedMessage (absl::nullopt, address, " {...}" , valid_message_to_sign,
1016
- domain.Clone (), &signature, &error, &error_message);
1017
- EXPECT_TRUE (signature.empty ());
1018
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kUnauthorized ));
1019
- EXPECT_EQ (error_message,
1020
- l10n_util::GetStringFUTF8 (IDS_WALLET_ETH_SIGN_NOT_AUTHED,
1021
- base::ASCIIToUTF16 (address)));
1022
-
1023
- // No permission
1024
- const std::vector<std::string> addresses = GetAddresses ();
1025
- ASSERT_FALSE (address.empty ());
1026
- SignTypedMessage (absl::nullopt, addresses[0 ], " {...}" , valid_message_to_sign,
1027
- domain.Clone (), &signature, &error, &error_message);
1028
- EXPECT_TRUE (signature.empty ());
1029
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kUnauthorized ));
1030
- EXPECT_EQ (error_message,
1031
- l10n_util::GetStringFUTF8 (IDS_WALLET_ETH_SIGN_NOT_AUTHED,
1032
- base::ASCIIToUTF16 (addresses[0 ])));
1033
- GURL url (" https://brave.com" );
1034
- Navigate (url);
1035
- AddEthereumPermission (url);
1036
- SignTypedMessage (true , addresses[0 ], " {...}" , valid_message_to_sign,
1037
- domain.Clone (), &signature, &error, &error_message);
1038
-
1039
- EXPECT_FALSE (signature.empty ());
1040
- EXPECT_EQ (error, 0 );
1041
- EXPECT_TRUE (error_message.empty ());
1042
-
1043
- // User reject request
1044
- SignTypedMessage (false , addresses[0 ], " {...}" , valid_message_to_sign,
1045
- domain.Clone (), &signature, &error, &error_message);
1046
- EXPECT_TRUE (signature.empty ());
1047
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kUserRejectedRequest ));
1048
- EXPECT_EQ (error_message,
1049
- l10n_util::GetStringUTF8 (IDS_WALLET_USER_REJECTED_REQUEST));
1050
-
1051
- keyring_controller ()->Lock ();
1052
-
1053
- // nullopt for the first param here because we don't AddSignMessageRequest
1054
- // whent here are no accounts returned.
1055
- SignTypedMessage (absl::nullopt, addresses[0 ], " {...}" , valid_message_to_sign,
1056
- domain.Clone (), &signature, &error, &error_message);
1057
- EXPECT_TRUE (signature.empty ());
1058
- EXPECT_EQ (error, static_cast <int >(ProviderErrors::kUnauthorized ));
1059
- EXPECT_EQ (error_message,
1060
- l10n_util::GetStringFUTF8 (IDS_WALLET_ETH_SIGN_NOT_AUTHED,
1061
- base::ASCIIToUTF16 (addresses[0 ])));
1062
- }
1063
-
1064
923
TEST_F (BraveWalletProviderImplUnitTest, SignMessageRequestQueue) {
1065
924
CreateWallet ();
1066
925
AddAccount ();
0 commit comments