2020-10-15 22:31:52 +00:00
|
|
|
package accounts
|
2020-07-22 02:41:39 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"flag"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2020-07-27 14:03:30 +00:00
|
|
|
"strconv"
|
2020-07-22 02:41:39 +00:00
|
|
|
"testing"
|
|
|
|
|
2022-03-13 23:30:11 +00:00
|
|
|
"github.com/pkg/errors"
|
2021-03-02 18:58:40 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/cmd/validator/flags"
|
2021-09-23 18:53:46 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/testing/assert"
|
|
|
|
"github.com/prysmaticlabs/prysm/testing/require"
|
2021-02-24 18:05:46 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/validator/accounts/iface"
|
2020-10-15 22:31:52 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/validator/accounts/wallet"
|
|
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager"
|
|
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/derived"
|
2020-07-22 02:41:39 +00:00
|
|
|
"github.com/urfave/cli/v2"
|
|
|
|
)
|
|
|
|
|
2020-09-30 14:13:37 +00:00
|
|
|
type recoverCfgStruct struct {
|
|
|
|
walletDir string
|
|
|
|
passwordFilePath string
|
|
|
|
mnemonicFilePath string
|
|
|
|
numAccounts int64
|
|
|
|
}
|
|
|
|
|
|
|
|
func setupRecoverCfg(t *testing.T) *recoverCfgStruct {
|
2020-11-10 22:45:17 +00:00
|
|
|
testDir := t.TempDir()
|
2020-07-22 02:41:39 +00:00
|
|
|
walletDir := filepath.Join(testDir, walletDirName)
|
|
|
|
passwordFilePath := filepath.Join(testDir, passwordFileName)
|
|
|
|
require.NoError(t, ioutil.WriteFile(passwordFilePath, []byte(password), os.ModePerm))
|
|
|
|
mnemonicFilePath := filepath.Join(testDir, mnemonicFileName)
|
|
|
|
require.NoError(t, ioutil.WriteFile(mnemonicFilePath, []byte(mnemonic), os.ModePerm))
|
|
|
|
|
2020-09-30 14:13:37 +00:00
|
|
|
return &recoverCfgStruct{
|
|
|
|
walletDir: walletDir,
|
|
|
|
passwordFilePath: passwordFilePath,
|
|
|
|
mnemonicFilePath: mnemonicFilePath,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func createRecoverCliCtx(t *testing.T, cfg *recoverCfgStruct) *cli.Context {
|
2020-07-22 02:41:39 +00:00
|
|
|
app := cli.App{}
|
|
|
|
set := flag.NewFlagSet("test", 0)
|
2020-09-30 14:13:37 +00:00
|
|
|
set.String(flags.WalletDirFlag.Name, cfg.walletDir, "")
|
|
|
|
set.String(flags.WalletPasswordFileFlag.Name, cfg.passwordFilePath, "")
|
2020-10-15 22:31:52 +00:00
|
|
|
set.String(flags.KeymanagerKindFlag.Name, keymanager.Derived.String(), "")
|
2020-09-30 14:13:37 +00:00
|
|
|
set.String(flags.MnemonicFileFlag.Name, cfg.mnemonicFilePath, "")
|
2020-10-27 20:51:29 +00:00
|
|
|
set.Bool(flags.SkipMnemonic25thWordCheckFlag.Name, true, "")
|
2020-09-30 14:13:37 +00:00
|
|
|
set.Int64(flags.NumAccountsFlag.Name, cfg.numAccounts, "")
|
2020-10-27 20:51:29 +00:00
|
|
|
assert.NoError(t, set.Set(flags.SkipMnemonic25thWordCheckFlag.Name, "true"))
|
2020-09-30 14:13:37 +00:00
|
|
|
assert.NoError(t, set.Set(flags.WalletDirFlag.Name, cfg.walletDir))
|
|
|
|
assert.NoError(t, set.Set(flags.WalletPasswordFileFlag.Name, cfg.passwordFilePath))
|
2020-10-15 22:31:52 +00:00
|
|
|
assert.NoError(t, set.Set(flags.KeymanagerKindFlag.Name, keymanager.Derived.String()))
|
2020-09-30 14:13:37 +00:00
|
|
|
assert.NoError(t, set.Set(flags.MnemonicFileFlag.Name, cfg.mnemonicFilePath))
|
|
|
|
assert.NoError(t, set.Set(flags.NumAccountsFlag.Name, strconv.Itoa(int(cfg.numAccounts))))
|
|
|
|
return cli.NewContext(&app, set, nil)
|
|
|
|
}
|
2020-07-22 02:41:39 +00:00
|
|
|
|
2020-09-30 14:13:37 +00:00
|
|
|
func TestRecoverDerivedWallet(t *testing.T) {
|
|
|
|
cfg := setupRecoverCfg(t)
|
|
|
|
cfg.numAccounts = 4
|
|
|
|
cliCtx := createRecoverCliCtx(t, cfg)
|
2020-08-31 19:46:45 +00:00
|
|
|
require.NoError(t, RecoverWalletCli(cliCtx))
|
2020-07-22 02:41:39 +00:00
|
|
|
|
|
|
|
ctx := context.Background()
|
2020-09-17 01:34:42 +00:00
|
|
|
w, err := wallet.OpenWallet(cliCtx.Context, &wallet.Config{
|
2020-09-30 14:13:37 +00:00
|
|
|
WalletDir: cfg.walletDir,
|
2020-09-22 14:49:07 +00:00
|
|
|
WalletPassword: password,
|
2020-08-31 19:46:45 +00:00
|
|
|
})
|
2020-07-22 02:41:39 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
|
2021-02-24 18:05:46 +00:00
|
|
|
km, err := w.InitializeKeymanager(cliCtx.Context, iface.InitKeymanagerConfig{ListenForChanges: false})
|
2020-07-27 14:03:30 +00:00
|
|
|
require.NoError(t, err)
|
2020-11-17 06:00:20 +00:00
|
|
|
derivedKM, ok := km.(*derived.Keymanager)
|
2020-07-27 14:03:30 +00:00
|
|
|
if !ok {
|
|
|
|
t.Fatal("not a derived keymanager")
|
|
|
|
}
|
2020-11-17 06:00:20 +00:00
|
|
|
names, err := derivedKM.ValidatingAccountNames(ctx)
|
2020-07-27 14:03:30 +00:00
|
|
|
assert.NoError(t, err)
|
2020-09-30 14:13:37 +00:00
|
|
|
require.Equal(t, len(names), int(cfg.numAccounts))
|
2020-07-22 02:41:39 +00:00
|
|
|
}
|
2020-09-26 10:13:56 +00:00
|
|
|
|
|
|
|
// TestRecoverDerivedWallet_OneAccount is a test for regression in cases where the number of accounts recovered is 1
|
|
|
|
func TestRecoverDerivedWallet_OneAccount(t *testing.T) {
|
2020-09-30 14:13:37 +00:00
|
|
|
cfg := setupRecoverCfg(t)
|
|
|
|
cfg.numAccounts = 1
|
|
|
|
cliCtx := createRecoverCliCtx(t, cfg)
|
2020-09-26 10:13:56 +00:00
|
|
|
require.NoError(t, RecoverWalletCli(cliCtx))
|
|
|
|
|
|
|
|
_, err := wallet.OpenWallet(cliCtx.Context, &wallet.Config{
|
2020-09-30 14:13:37 +00:00
|
|
|
WalletDir: cfg.walletDir,
|
2020-09-26 10:13:56 +00:00
|
|
|
WalletPassword: password,
|
|
|
|
})
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
2020-09-30 14:13:37 +00:00
|
|
|
|
|
|
|
func TestRecoverDerivedWallet_AlreadyExists(t *testing.T) {
|
|
|
|
cfg := setupRecoverCfg(t)
|
|
|
|
cfg.numAccounts = 4
|
|
|
|
cliCtx := createRecoverCliCtx(t, cfg)
|
|
|
|
require.NoError(t, RecoverWalletCli(cliCtx))
|
|
|
|
|
|
|
|
// Trying to recover an HD wallet into a directory that already exists should give an error
|
|
|
|
require.ErrorContains(t, "a wallet already exists at this location", RecoverWalletCli(cliCtx))
|
|
|
|
}
|
2022-03-13 23:30:11 +00:00
|
|
|
|
|
|
|
func TestValidateMnemonic(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
mnemonic string
|
|
|
|
wantErr bool
|
|
|
|
err error
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "Valid Mnemonic",
|
|
|
|
mnemonic: "bag wagon luxury iron swarm yellow course merge trumpet wide decide cash idea disagree deny teach canvas profit slice beach iron sting warfare slide",
|
|
|
|
wantErr: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid Mnemonic with too few words",
|
|
|
|
mnemonic: "bag wagon luxury iron swarm yellow course merge trumpet wide cash idea disagree deny teach canvas profit iron sting warfare slide",
|
|
|
|
wantErr: true,
|
|
|
|
err: ErrIncorrectWordNumber,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid Mnemonic with too many words",
|
|
|
|
mnemonic: "bag wagon luxury iron swarm yellow course merge trumpet cash wide decide profit cash idea disagree deny teach canvas profit slice beach iron sting warfare slide",
|
|
|
|
wantErr: true,
|
|
|
|
err: ErrIncorrectWordNumber,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Empty Mnemonic",
|
|
|
|
mnemonic: "",
|
|
|
|
wantErr: true,
|
|
|
|
err: ErrEmptyMnemonic,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Junk Mnemonic",
|
|
|
|
mnemonic: " a ",
|
|
|
|
wantErr: true,
|
|
|
|
err: ErrIncorrectWordNumber,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Junk Mnemonic ",
|
|
|
|
mnemonic: " evilpacket ",
|
|
|
|
wantErr: true,
|
|
|
|
err: ErrIncorrectWordNumber,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
err := ValidateMnemonic(tt.mnemonic)
|
|
|
|
if (err != nil) != tt.wantErr || (tt.wantErr && !errors.Is(err, tt.err)) {
|
|
|
|
t.Errorf("ValidateMnemonic() error = %v, wantErr %v", err, tt.err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|