prysm-pulse/shared/keystore/keystore_test.go
Raul Jordan cd415b0eda
Track Previously Seen Merkle Index to Prevent Duplicate Log Spam (#1566)
* using little endian and tests for encoding dep inputs

* use decode value and timestamp method in state

* updated comments to match serialization format

* latest compiled contract, abi, bytecode, and bindings

* to little endian everywhere

* fix all tests except for contract tests

* include contract changes

* address broken build

* compile with vyper v8

* update readme

* fix pkg name

* add skip chainstart delay

* skip chainstart delay tests pass

* to little endian timestamp

* using genesis timestamp instead of bool

* update with gofmt

* make more fields public

* duplicate log spam inconsistent root fixed by tracking last seen index

* sync with master

* readd weird removal of import

* readd libp2p import

* gazelle

* readd eth

* comments
2019-02-12 13:50:39 -06:00

75 lines
1.6 KiB
Go

package keystore
import (
"bytes"
"crypto/rand"
"os"
"testing"
"github.com/pborman/uuid"
bls "github.com/prysmaticlabs/go-bls"
)
func TestStoreandGetKey(t *testing.T) {
tmpdir := os.TempDir()
filedir := tmpdir + "/keystore"
ks := &Store{
keysDirPath: filedir,
scryptN: LightScryptN,
scryptP: LightScryptP,
}
key, err := NewKey(rand.Reader)
if err != nil {
t.Fatalf("key generation failed %v", err)
}
if err := ks.StoreKey(filedir, key, "password"); err != nil {
t.Fatalf("unable to store key %v", err)
}
newkey, err := ks.GetKey(filedir, "password")
if err != nil {
t.Fatalf("unable to get key %v", err)
}
if !newkey.SecretKey.IsEqual(key.SecretKey) {
t.Fatalf("retrieved secret keys are not equal %v , %v", newkey.SecretKey.LittleEndian(), key.SecretKey.LittleEndian())
}
if err := os.RemoveAll(filedir); err != nil {
t.Errorf("unable to remove temporary files %v", err)
}
}
func TestEncryptDecryptKey(t *testing.T) {
newID := uuid.NewRandom()
blsKey := &bls.SecretKey{}
blsKey.SetByCSPRNG()
password := "test"
key := &Key{
ID: newID,
SecretKey: blsKey,
PublicKey: blsKey.GetPublicKey(),
}
keyjson, err := EncryptKey(key, password, LightScryptN, LightScryptP)
if err != nil {
t.Fatalf("unable to encrypt key %v", err)
}
newkey, err := DecryptKey(keyjson, password)
if err != nil {
t.Fatalf("unable to decrypt keystore %v", err)
}
if !bytes.Equal(newkey.ID, newID) {
t.Fatalf("decrypted key's uuid doesn't match %v", newkey.ID)
}
if !newkey.SecretKey.IsEqual(blsKey) {
t.Fatalf("decrypted key's value is not equal %v", newkey.SecretKey.LittleEndian())
}
}