package accounts import ( "context" "flag" "io/ioutil" "os" "path/filepath" "strconv" "testing" "github.com/pkg/errors" "github.com/prysmaticlabs/prysm/cmd/validator/flags" "github.com/prysmaticlabs/prysm/config/params" "github.com/prysmaticlabs/prysm/testing/assert" "github.com/prysmaticlabs/prysm/testing/require" "github.com/prysmaticlabs/prysm/validator/accounts/wallet" "github.com/prysmaticlabs/prysm/validator/keymanager" "github.com/prysmaticlabs/prysm/validator/keymanager/imported" "github.com/prysmaticlabs/prysm/validator/keymanager/remote" "github.com/sirupsen/logrus" logTest "github.com/sirupsen/logrus/hooks/test" "github.com/urfave/cli/v2" ) const ( walletDirName = "wallet" passwordFileName = "password.txt" password = "OhWOWthisisatest42!$" mnemonicFileName = "mnemonic.txt" mnemonic = "garage car helmet trade salmon embrace market giant movie wet same champion dawn chair shield drill amazing panther accident puzzle garden mosquito kind arena" ) func init() { logrus.SetLevel(logrus.DebugLevel) logrus.SetOutput(ioutil.Discard) } type testWalletConfig struct { exitAll bool skipDepositConfirm bool keymanagerKind keymanager.Kind numAccounts int64 grpcHeaders string privateKeyFile string accountPasswordFile string walletPasswordFile string backupPasswordFile string backupPublicKeys string voluntaryExitPublicKeys string deletePublicKeys string keysDir string backupDir string passwordsDir string walletDir string } func setupWalletCtx( tb testing.TB, cfg *testWalletConfig, ) *cli.Context { app := cli.App{} set := flag.NewFlagSet("test", 0) set.String(flags.WalletDirFlag.Name, cfg.walletDir, "") set.String(flags.KeysDirFlag.Name, cfg.keysDir, "") set.String(flags.KeymanagerKindFlag.Name, cfg.keymanagerKind.String(), "") set.String(flags.DeletePublicKeysFlag.Name, cfg.deletePublicKeys, "") set.String(flags.VoluntaryExitPublicKeysFlag.Name, cfg.voluntaryExitPublicKeys, "") set.String(flags.BackupDirFlag.Name, cfg.backupDir, "") set.String(flags.BackupPasswordFile.Name, cfg.backupPasswordFile, "") set.String(flags.BackupPublicKeysFlag.Name, cfg.backupPublicKeys, "") set.String(flags.WalletPasswordFileFlag.Name, cfg.walletPasswordFile, "") set.String(flags.AccountPasswordFileFlag.Name, cfg.accountPasswordFile, "") set.Int64(flags.NumAccountsFlag.Name, cfg.numAccounts, "") set.Bool(flags.SkipDepositConfirmationFlag.Name, cfg.skipDepositConfirm, "") set.Bool(flags.SkipMnemonic25thWordCheckFlag.Name, true, "") set.Bool(flags.ExitAllFlag.Name, cfg.exitAll, "") set.String(flags.GrpcHeadersFlag.Name, cfg.grpcHeaders, "") if cfg.privateKeyFile != "" { set.String(flags.ImportPrivateKeyFileFlag.Name, cfg.privateKeyFile, "") assert.NoError(tb, set.Set(flags.ImportPrivateKeyFileFlag.Name, cfg.privateKeyFile)) } assert.NoError(tb, set.Set(flags.WalletDirFlag.Name, cfg.walletDir)) assert.NoError(tb, set.Set(flags.SkipMnemonic25thWordCheckFlag.Name, "true")) assert.NoError(tb, set.Set(flags.KeysDirFlag.Name, cfg.keysDir)) assert.NoError(tb, set.Set(flags.KeymanagerKindFlag.Name, cfg.keymanagerKind.String())) assert.NoError(tb, set.Set(flags.DeletePublicKeysFlag.Name, cfg.deletePublicKeys)) assert.NoError(tb, set.Set(flags.VoluntaryExitPublicKeysFlag.Name, cfg.voluntaryExitPublicKeys)) assert.NoError(tb, set.Set(flags.BackupDirFlag.Name, cfg.backupDir)) assert.NoError(tb, set.Set(flags.BackupPublicKeysFlag.Name, cfg.backupPublicKeys)) assert.NoError(tb, set.Set(flags.BackupPasswordFile.Name, cfg.backupPasswordFile)) assert.NoError(tb, set.Set(flags.WalletPasswordFileFlag.Name, cfg.walletPasswordFile)) assert.NoError(tb, set.Set(flags.AccountPasswordFileFlag.Name, cfg.accountPasswordFile)) assert.NoError(tb, set.Set(flags.NumAccountsFlag.Name, strconv.Itoa(int(cfg.numAccounts)))) assert.NoError(tb, set.Set(flags.SkipDepositConfirmationFlag.Name, strconv.FormatBool(cfg.skipDepositConfirm))) assert.NoError(tb, set.Set(flags.ExitAllFlag.Name, strconv.FormatBool(cfg.exitAll))) assert.NoError(tb, set.Set(flags.GrpcHeadersFlag.Name, cfg.grpcHeaders)) return cli.NewContext(&app, set, nil) } func setupWalletAndPasswordsDir(t testing.TB) (string, string, string) { walletDir := filepath.Join(t.TempDir(), "wallet") passwordsDir := filepath.Join(t.TempDir(), "passwords") passwordFileDir := filepath.Join(t.TempDir(), "passwordFile") require.NoError(t, os.MkdirAll(passwordFileDir, params.BeaconIoConfig().ReadWriteExecutePermissions)) passwordFilePath := filepath.Join(passwordFileDir, passwordFileName) require.NoError(t, ioutil.WriteFile(passwordFilePath, []byte(password), os.ModePerm)) return walletDir, passwordsDir, passwordFilePath } func TestCreateOrOpenWallet(t *testing.T) { hook := logTest.NewGlobal() walletDir, passwordsDir, walletPasswordFile := setupWalletAndPasswordsDir(t) cliCtx := setupWalletCtx(t, &testWalletConfig{ walletDir: walletDir, passwordsDir: passwordsDir, keymanagerKind: keymanager.Imported, walletPasswordFile: walletPasswordFile, }) createImportedWallet := func(cliCtx *cli.Context) (*wallet.Wallet, error) { cfg, err := extractWalletCreationConfigFromCli(cliCtx, keymanager.Imported) if err != nil { return nil, err } w := wallet.New(&wallet.Config{ KeymanagerKind: cfg.WalletCfg.KeymanagerKind, WalletDir: cfg.WalletCfg.WalletDir, WalletPassword: cfg.WalletCfg.WalletPassword, }) if err = createImportedKeymanagerWallet(cliCtx.Context, w); err != nil { return nil, errors.Wrap(err, "could not create keymanager") } log.WithField("wallet-path", cfg.WalletCfg.WalletDir).Info( "Successfully created new wallet", ) return w, nil } createdWallet, err := wallet.OpenWalletOrElseCli(cliCtx, createImportedWallet) require.NoError(t, err) require.LogsContain(t, hook, "Successfully created new wallet") openedWallet, err := wallet.OpenWalletOrElseCli(cliCtx, createImportedWallet) require.NoError(t, err) assert.Equal(t, createdWallet.KeymanagerKind(), openedWallet.KeymanagerKind()) assert.Equal(t, createdWallet.AccountsDir(), openedWallet.AccountsDir()) } func TestCreateWallet_Imported(t *testing.T) { walletDir, passwordsDir, walletPasswordFile := setupWalletAndPasswordsDir(t) cliCtx := setupWalletCtx(t, &testWalletConfig{ walletDir: walletDir, passwordsDir: passwordsDir, keymanagerKind: keymanager.Imported, walletPasswordFile: walletPasswordFile, }) // We attempt to create the wallet. _, err := CreateAndSaveWalletCli(cliCtx) require.NoError(t, err) // We attempt to open the newly created wallet. w, err := wallet.OpenWallet(cliCtx.Context, &wallet.Config{ WalletDir: walletDir, }) assert.NoError(t, err) _, err = w.ReadFileAtPath(cliCtx.Context, imported.AccountsPath, imported.AccountsKeystoreFileName) require.NoError(t, err) } func TestCreateWallet_Derived(t *testing.T) { walletDir, passwordsDir, passwordFile := setupWalletAndPasswordsDir(t) cliCtx := setupWalletCtx(t, &testWalletConfig{ walletDir: walletDir, passwordsDir: passwordsDir, walletPasswordFile: passwordFile, keymanagerKind: keymanager.Derived, numAccounts: 1, }) // We attempt to create the wallet. _, err := CreateAndSaveWalletCli(cliCtx) require.NoError(t, err) // We attempt to open the newly created wallet. _, err = wallet.OpenWallet(cliCtx.Context, &wallet.Config{ WalletDir: walletDir, }) assert.NoError(t, err) } // TestCreateWallet_WalletAlreadyExists checks for expected error if trying to create a wallet when there is one already. func TestCreateWallet_WalletAlreadyExists(t *testing.T) { walletDir, passwordsDir, passwordFile := setupWalletAndPasswordsDir(t) cliCtx := setupWalletCtx(t, &testWalletConfig{ walletDir: walletDir, passwordsDir: passwordsDir, walletPasswordFile: passwordFile, keymanagerKind: keymanager.Derived, numAccounts: 1, }) // We attempt to create the wallet. _, err := CreateAndSaveWalletCli(cliCtx) require.NoError(t, err) // We attempt to create another wallet of the same type at the same location. We expect an error. _, err = CreateAndSaveWalletCli(cliCtx) require.ErrorContains(t, "already exists", err) cliCtx = setupWalletCtx(t, &testWalletConfig{ walletDir: walletDir, passwordsDir: passwordsDir, walletPasswordFile: passwordFile, keymanagerKind: keymanager.Imported, }) // We attempt to create another wallet of different type at the same location. We expect an error. _, err = CreateAndSaveWalletCli(cliCtx) require.ErrorContains(t, "already exists", err) } func TestCreateWallet_Remote(t *testing.T) { walletDir, _, walletPasswordFile := setupWalletAndPasswordsDir(t) wantCfg := &remote.KeymanagerOpts{ RemoteCertificate: &remote.CertificateConfig{ RequireTls: true, ClientCertPath: "/tmp/client.crt", ClientKeyPath: "/tmp/client.key", CACertPath: "/tmp/ca.crt", }, RemoteAddr: "host.example.com:4000", } app := cli.App{} set := flag.NewFlagSet("test", 0) keymanagerKind := "remote" set.String(flags.WalletDirFlag.Name, walletDir, "") set.String(flags.WalletPasswordFileFlag.Name, walletDir, "") set.String(flags.KeymanagerKindFlag.Name, keymanagerKind, "") set.String(flags.GrpcRemoteAddressFlag.Name, wantCfg.RemoteAddr, "") set.String(flags.RemoteSignerCertPathFlag.Name, wantCfg.RemoteCertificate.ClientCertPath, "") set.String(flags.RemoteSignerKeyPathFlag.Name, wantCfg.RemoteCertificate.ClientKeyPath, "") set.String(flags.RemoteSignerCACertPathFlag.Name, wantCfg.RemoteCertificate.CACertPath, "") assert.NoError(t, set.Set(flags.WalletDirFlag.Name, walletDir)) assert.NoError(t, set.Set(flags.WalletPasswordFileFlag.Name, walletPasswordFile)) assert.NoError(t, set.Set(flags.KeymanagerKindFlag.Name, keymanagerKind)) assert.NoError(t, set.Set(flags.GrpcRemoteAddressFlag.Name, wantCfg.RemoteAddr)) assert.NoError(t, set.Set(flags.RemoteSignerCertPathFlag.Name, wantCfg.RemoteCertificate.ClientCertPath)) assert.NoError(t, set.Set(flags.RemoteSignerKeyPathFlag.Name, wantCfg.RemoteCertificate.ClientKeyPath)) assert.NoError(t, set.Set(flags.RemoteSignerCACertPathFlag.Name, wantCfg.RemoteCertificate.CACertPath)) cliCtx := cli.NewContext(&app, set, nil) // We attempt to create the wallet. _, err := CreateAndSaveWalletCli(cliCtx) require.NoError(t, err) // We attempt to open the newly created wallet. ctx := context.Background() w, err := wallet.OpenWallet(cliCtx.Context, &wallet.Config{ WalletDir: walletDir, }) assert.NoError(t, err) // We read the keymanager config for the newly created wallet. encoded, err := w.ReadKeymanagerConfigFromDisk(ctx) assert.NoError(t, err) cfg, err := remote.UnmarshalOptionsFile(encoded) assert.NoError(t, err) // We assert the created configuration was as desired. assert.DeepEqual(t, wantCfg, cfg) }