package accounts import ( "bytes" "os" "path/filepath" "sort" "testing" "time" "github.com/golang/mock/gomock" fieldparams "github.com/prysmaticlabs/prysm/config/fieldparams" "github.com/prysmaticlabs/prysm/encoding/bytesutil" ethpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1" "github.com/prysmaticlabs/prysm/testing/assert" mock2 "github.com/prysmaticlabs/prysm/testing/mock" "github.com/prysmaticlabs/prysm/testing/require" "github.com/prysmaticlabs/prysm/validator/accounts/wallet" "github.com/prysmaticlabs/prysm/validator/keymanager" "github.com/prysmaticlabs/prysm/validator/keymanager/local" "github.com/sirupsen/logrus/hooks/test" "google.golang.org/grpc/metadata" "google.golang.org/protobuf/types/known/timestamppb" ) func TestExitAccountsCli_OK(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockValidatorClient := mock2.NewMockBeaconNodeValidatorClient(ctrl) mockNodeClient := mock2.NewMockNodeClient(ctrl) mockValidatorClient.EXPECT(). ValidatorIndex(gomock.Any(), gomock.Any()). Return(ðpb.ValidatorIndexResponse{Index: 1}, nil) // Any time in the past will suffice genesisTime := ×tamppb.Timestamp{ Seconds: time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC).Unix(), } mockNodeClient.EXPECT(). GetGenesis(gomock.Any(), gomock.Any()). Return(ðpb.Genesis{GenesisTime: genesisTime}, nil) mockValidatorClient.EXPECT(). DomainData(gomock.Any(), gomock.Any()). Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil) mockValidatorClient.EXPECT(). ProposeExit(gomock.Any(), gomock.AssignableToTypeOf(ðpb.SignedVoluntaryExit{})). Return(ðpb.ProposeExitResponse{}, nil) walletDir, _, passwordFilePath := setupWalletAndPasswordsDir(t) // Write a directory where we will import keys from. keysDir := filepath.Join(t.TempDir(), "keysDir") require.NoError(t, os.MkdirAll(keysDir, os.ModePerm)) // Create keystore file in the keys directory we can then import from in our wallet. keystore, _ := createKeystore(t, keysDir) time.Sleep(time.Second) // We initialize a wallet with a local keymanager. cliCtx := setupWalletCtx(t, &testWalletConfig{ // Wallet configuration flags. walletDir: walletDir, keymanagerKind: keymanager.Local, walletPasswordFile: passwordFilePath, accountPasswordFile: passwordFilePath, // Flag required for ImportAccounts to work. keysDir: keysDir, // Flag required for ExitAccounts to work. voluntaryExitPublicKeys: keystore.Pubkey, }) _, err := CreateWalletWithKeymanager(cliCtx.Context, &CreateWalletConfig{ WalletCfg: &wallet.Config{ WalletDir: walletDir, KeymanagerKind: keymanager.Local, WalletPassword: password, }, }) require.NoError(t, err) require.NoError(t, ImportAccountsCli(cliCtx)) validatingPublicKeys, keymanager, err := prepareWallet(cliCtx) require.NoError(t, err) require.NotNil(t, validatingPublicKeys) require.NotNil(t, keymanager) // Prepare user input for final confirmation step var stdin bytes.Buffer stdin.Write([]byte(exitPassphrase)) rawPubKeys, formattedPubKeys, err := interact(cliCtx, &stdin, validatingPublicKeys) require.NoError(t, err) require.NotNil(t, rawPubKeys) require.NotNil(t, formattedPubKeys) cfg := PerformExitCfg{ mockValidatorClient, mockNodeClient, keymanager, rawPubKeys, formattedPubKeys, } rawExitedKeys, formattedExitedKeys, err := PerformVoluntaryExit(cliCtx.Context, cfg) require.NoError(t, err) require.Equal(t, 1, len(rawExitedKeys)) assert.DeepEqual(t, rawPubKeys[0], rawExitedKeys[0]) require.Equal(t, 1, len(formattedExitedKeys)) assert.Equal(t, "0x"+keystore.Pubkey[:12], formattedExitedKeys[0]) } func TestExitAccountsCli_OK_AllPublicKeys(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockValidatorClient := mock2.NewMockBeaconNodeValidatorClient(ctrl) mockNodeClient := mock2.NewMockNodeClient(ctrl) mockValidatorClient.EXPECT(). ValidatorIndex(gomock.Any(), gomock.Any()). Return(ðpb.ValidatorIndexResponse{Index: 0}, nil) mockValidatorClient.EXPECT(). ValidatorIndex(gomock.Any(), gomock.Any()). Return(ðpb.ValidatorIndexResponse{Index: 1}, nil) // Any time in the past will suffice genesisTime := ×tamppb.Timestamp{ Seconds: time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC).Unix(), } mockNodeClient.EXPECT(). GetGenesis(gomock.Any(), gomock.Any()). Times(2). Return(ðpb.Genesis{GenesisTime: genesisTime}, nil) mockValidatorClient.EXPECT(). DomainData(gomock.Any(), gomock.Any()). Times(2). Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil) mockValidatorClient.EXPECT(). ProposeExit(gomock.Any(), gomock.AssignableToTypeOf(ðpb.SignedVoluntaryExit{})). Times(2). Return(ðpb.ProposeExitResponse{}, nil) walletDir, _, passwordFilePath := setupWalletAndPasswordsDir(t) // Write a directory where we will import keys from. keysDir := filepath.Join(t.TempDir(), "keysDir") require.NoError(t, os.MkdirAll(keysDir, os.ModePerm)) // Create keystore file in the keys directory we can then import from in our wallet. keystore1, _ := createKeystore(t, keysDir) time.Sleep(time.Second) keystore2, _ := createKeystore(t, keysDir) time.Sleep(time.Second) // We initialize a wallet with a local keymanager. cliCtx := setupWalletCtx(t, &testWalletConfig{ // Wallet configuration flags. walletDir: walletDir, keymanagerKind: keymanager.Local, walletPasswordFile: passwordFilePath, accountPasswordFile: passwordFilePath, // Flag required for ImportAccounts to work. keysDir: keysDir, // Exit all public keys. exitAll: true, }) _, err := CreateWalletWithKeymanager(cliCtx.Context, &CreateWalletConfig{ WalletCfg: &wallet.Config{ WalletDir: walletDir, KeymanagerKind: keymanager.Local, WalletPassword: password, }, }) require.NoError(t, err) require.NoError(t, ImportAccountsCli(cliCtx)) validatingPublicKeys, keymanager, err := prepareWallet(cliCtx) require.NoError(t, err) require.NotNil(t, validatingPublicKeys) require.NotNil(t, keymanager) // Prepare user input for final confirmation step var stdin bytes.Buffer stdin.Write([]byte(exitPassphrase)) rawPubKeys, formattedPubKeys, err := interact(cliCtx, &stdin, validatingPublicKeys) require.NoError(t, err) require.NotNil(t, rawPubKeys) require.NotNil(t, formattedPubKeys) cfg := PerformExitCfg{ mockValidatorClient, mockNodeClient, keymanager, rawPubKeys, formattedPubKeys, } rawExitedKeys, formattedExitedKeys, err := PerformVoluntaryExit(cliCtx.Context, cfg) require.NoError(t, err) require.Equal(t, 2, len(rawExitedKeys)) assert.DeepEqual(t, rawPubKeys, rawExitedKeys) require.Equal(t, 2, len(formattedExitedKeys)) wantedFormatted := []string{ "0x" + keystore1.Pubkey[:12], "0x" + keystore2.Pubkey[:12], } sort.Strings(wantedFormatted) sort.Strings(formattedExitedKeys) require.DeepEqual(t, wantedFormatted, formattedExitedKeys) } func TestPrepareWallet_EmptyWalletReturnsError(t *testing.T) { local.ResetCaches() walletDir, _, passwordFilePath := setupWalletAndPasswordsDir(t) cliCtx := setupWalletCtx(t, &testWalletConfig{ walletDir: walletDir, keymanagerKind: keymanager.Local, walletPasswordFile: passwordFilePath, accountPasswordFile: passwordFilePath, }) _, err := CreateWalletWithKeymanager(cliCtx.Context, &CreateWalletConfig{ WalletCfg: &wallet.Config{ WalletDir: walletDir, KeymanagerKind: keymanager.Local, WalletPassword: password, }, }) require.NoError(t, err) _, _, err = prepareWallet(cliCtx) assert.ErrorContains(t, "wallet is empty", err) } func TestPrepareClients_AddsGRPCHeaders(t *testing.T) { local.ResetCaches() walletDir, _, passwordFilePath := setupWalletAndPasswordsDir(t) cliCtx := setupWalletCtx(t, &testWalletConfig{ walletDir: walletDir, keymanagerKind: keymanager.Local, walletPasswordFile: passwordFilePath, accountPasswordFile: passwordFilePath, grpcHeaders: "Authorization=Basic some-token,Some-Other-Header=some-value", }) _, err := CreateWalletWithKeymanager(cliCtx.Context, &CreateWalletConfig{ WalletCfg: &wallet.Config{ WalletDir: walletDir, KeymanagerKind: keymanager.Local, WalletPassword: password, }, }) require.NoError(t, err) _, _, err = prepareClients(cliCtx) require.NoError(t, err) md, _ := metadata.FromOutgoingContext(cliCtx.Context) assert.Equal(t, "Basic some-token", md.Get("Authorization")[0]) assert.Equal(t, "some-value", md.Get("Some-Other-Header")[0]) } func TestDisplayExitInfo(t *testing.T) { logHook := test.NewGlobal() key := []byte("0x123456") displayExitInfo([][]byte{key}, []string{string(key)}) assert.LogsContain(t, logHook, "https://beaconcha.in/validator/3078313233343536") } func TestDisplayExitInfo_NoKeys(t *testing.T) { logHook := test.NewGlobal() displayExitInfo([][]byte{}, []string{}) assert.LogsContain(t, logHook, "No successful voluntary exits") } func TestPrepareAllKeys(t *testing.T) { key1 := bytesutil.ToBytes48([]byte("key1")) key2 := bytesutil.ToBytes48([]byte("key2")) raw, formatted := prepareAllKeys([][fieldparams.BLSPubkeyLength]byte{key1, key2}) require.Equal(t, 2, len(raw)) require.Equal(t, 2, len(formatted)) assert.DeepEqual(t, bytesutil.ToBytes48([]byte{107, 101, 121, 49}), bytesutil.ToBytes48(raw[0])) assert.DeepEqual(t, bytesutil.ToBytes48([]byte{107, 101, 121, 50}), bytesutil.ToBytes48(raw[1])) assert.Equal(t, "0x6b6579310000", formatted[0]) assert.Equal(t, "0x6b6579320000", formatted[1]) }