mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 12:57:18 +00:00
f75a8efc0d
* rem opts * rem more km opts * more removal of km opts * removal of km opts * definition of internal accounts store * refactor enable/disable * enable build * fix rpc * remove keymanageropts * fix imported tests * table driven tests for enable disable * table driven tests for disable * comprehensive tests for disable * tests complete for enable and disable * pass enable disable tests * clarify imported * fix deadlocks * imported tests pass * remove enable disable entrypoints * better derived text * deep source suggestions * gaz * tidy Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
55 lines
1.5 KiB
Go
55 lines
1.5 KiB
Go
package imported
|
|
|
|
import (
|
|
"context"
|
|
"encoding/hex"
|
|
"testing"
|
|
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
)
|
|
|
|
func TestImportedKeymanager_ExtractKeystores(t *testing.T) {
|
|
secretKeysCache = make(map[[48]byte]bls.SecretKey)
|
|
dr := &Keymanager{}
|
|
validatingKeys := make([]bls.SecretKey, 10)
|
|
for i := 0; i < len(validatingKeys); i++ {
|
|
secretKey, err := bls.RandKey()
|
|
require.NoError(t, err)
|
|
validatingKeys[i] = secretKey
|
|
secretKeysCache[bytesutil.ToBytes48(secretKey.PublicKey().Marshal())] = secretKey
|
|
}
|
|
ctx := context.Background()
|
|
password := "password"
|
|
|
|
// Extracting 0 public keys should return 0 keystores.
|
|
keystores, err := dr.ExtractKeystores(ctx, nil, password)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, 0, len(keystores))
|
|
|
|
// We attempt to extract a few indices.
|
|
keystores, err = dr.ExtractKeystores(
|
|
ctx,
|
|
[]bls.PublicKey{
|
|
validatingKeys[3].PublicKey(),
|
|
validatingKeys[5].PublicKey(),
|
|
validatingKeys[7].PublicKey(),
|
|
},
|
|
password,
|
|
)
|
|
require.NoError(t, err)
|
|
receivedPubKeys := make([][]byte, len(keystores))
|
|
for i, k := range keystores {
|
|
pubKeyBytes, err := hex.DecodeString(k.Pubkey)
|
|
require.NoError(t, err)
|
|
receivedPubKeys[i] = pubKeyBytes
|
|
}
|
|
assert.DeepEqual(t, receivedPubKeys, [][]byte{
|
|
validatingKeys[3].PublicKey().Marshal(),
|
|
validatingKeys[5].PublicKey().Marshal(),
|
|
validatingKeys[7].PublicKey().Marshal(),
|
|
})
|
|
}
|