prysm-pulse/shared/keystore/keystore_test.go
Victor Farazdagi 3621b2ff25
Better naming for constructor funcs (#7316)
* sync/initial-sync
* NewBeaconClientService -> NewService
* NewSlashingProtectionService -> NewService
* NewPrometheusService -> NewService
* NewColdStartService -> NewService
* NewRegularSync -> NewService
* NewDetectionService -> NewService
* NewWallet -> New
* NewKeystore -> New
* Merge branch 'master' into better-naming
* Merge branch 'master' into better-naming
* NewDepositCache -> New
2020-09-23 08:59:49 +00:00

114 lines
3.2 KiB
Go

package keystore
import (
"bytes"
"crypto/rand"
"fmt"
"math/big"
"os"
"path"
"testing"
"github.com/pborman/uuid"
"github.com/prysmaticlabs/prysm/shared/bls"
"github.com/prysmaticlabs/prysm/shared/bytesutil"
"github.com/prysmaticlabs/prysm/shared/testutil"
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
"github.com/prysmaticlabs/prysm/shared/testutil/require"
)
func TestStoreAndGetKey(t *testing.T) {
tempDir, teardown := setupTempKeystoreDir(t)
defer teardown()
ks := &Keystore{
keysDirPath: tempDir,
scryptN: LightScryptN,
scryptP: LightScryptP,
}
key, err := NewKey()
require.NoError(t, err)
require.NoError(t, ks.StoreKey(tempDir, key, "password"))
decryptedKey, err := ks.GetKey(tempDir, "password")
require.NoError(t, err)
require.Equal(t, true, bytes.Equal(decryptedKey.SecretKey.Marshal(), key.SecretKey.Marshal()))
}
func TestStoreAndGetKeys(t *testing.T) {
tempDir, teardown := setupTempKeystoreDir(t)
defer teardown()
ks := &Keystore{
keysDirPath: tempDir,
scryptN: LightScryptN,
scryptP: LightScryptP,
}
key, err := NewKey()
require.NoError(t, err)
require.NoError(t, ks.StoreKey(tempDir+"/test-1", key, "password"))
key2, err := NewKey()
require.NoError(t, err)
require.NoError(t, ks.StoreKey(tempDir+"/test-2", key, "password"))
decryptedKeys, err := ks.GetKeys(tempDir, "test", "password", false)
require.NoError(t, err)
for _, s := range decryptedKeys {
require.Equal(t, true, bytes.Equal(s.SecretKey.Marshal(), key.SecretKey.Marshal()) && !bytes.Equal(s.SecretKey.Marshal(), key2.SecretKey.Marshal()))
}
}
func TestEncryptDecryptKey(t *testing.T) {
newID := uuid.NewRandom()
b := []byte("hi")
b32 := bytesutil.ToBytes32(b)
password := "test"
pk, err := bls.SecretKeyFromBytes(b32[:])
require.NoError(t, err)
key := &Key{
ID: newID,
SecretKey: pk,
PublicKey: pk.PublicKey(),
}
keyJSON, err := EncryptKey(key, password, LightScryptN, LightScryptP)
require.NoError(t, err)
decryptedKey, err := DecryptKey(keyJSON, password)
require.NoError(t, err)
require.Equal(t, true, bytes.Equal(decryptedKey.ID, newID))
expected := pk.Marshal()
require.Equal(t, true, bytes.Equal(decryptedKey.SecretKey.Marshal(), expected))
}
func TestGetSymlinkedKeys(t *testing.T) {
tempDir, teardown := setupTempKeystoreDir(t)
defer teardown()
ks := &Keystore{
scryptN: LightScryptN,
scryptP: LightScryptP,
}
key, err := NewKey()
require.NoError(t, err)
require.NoError(t, ks.StoreKey(tempDir+"/files/test-1", key, "password"))
require.NoError(t, os.Symlink(tempDir+"/files/test-1", tempDir+"/test-1"))
decryptedKeys, err := ks.GetKeys(tempDir, "test", "password", false)
require.NoError(t, err)
assert.Equal(t, 1, len(decryptedKeys))
for _, s := range decryptedKeys {
require.Equal(t, true, bytes.Equal(s.SecretKey.Marshal(), key.SecretKey.Marshal()))
}
}
// setupTempKeystoreDir creates temporary directory for storing keystore files.
func setupTempKeystoreDir(t *testing.T) (string, func()) {
randPath, err := rand.Int(rand.Reader, big.NewInt(1000000))
require.NoError(t, err)
tempDir := path.Join(testutil.TempDir(), fmt.Sprintf("%d", randPath), "keystore")
return tempDir, func() {
assert.NoError(t, os.RemoveAll(tempDir))
}
}