prysm-pulse/shared/keystore/keystore_test.go
shayzluf fe247f6cc5 keystore and account support for multi key (#2054)
* keystore and account support for multi key

* fix service issues

* fix Potential file inclusion

* fix Potential file inclusion try2

* Update shared/keystore/keystore.go

remove security detection for file read

Co-Authored-By: shayzluf <thezluf@gmail.com>

* getkeys uses map to pt multiple copies of the same key

* use 12 char of public key to differentiate file names

* use map in test

* fix changes from 2069 into here

* add // #nosec G304
2019-03-29 17:26:41 -05:00

126 lines
3.1 KiB
Go

package keystore
import (
"bytes"
"crypto/rand"
"os"
"testing"
"github.com/pborman/uuid"
"github.com/prysmaticlabs/prysm/shared/bls"
"github.com/prysmaticlabs/prysm/shared/bytesutil"
"github.com/prysmaticlabs/prysm/shared/testutil"
)
func TestStoreAndGetKey(t *testing.T) {
tmpdir := testutil.TempDir()
filedir := tmpdir + "/keystore"
ks := &Store{
keysDirPath: filedir,
scryptN: LightScryptN,
scryptP: LightScryptP,
}
key, err := NewKey(rand.Reader)
if err != nil {
t.Fatalf("key generation failed %v", err)
}
if err := ks.StoreKey(filedir, key, "password"); err != nil {
t.Fatalf("unable to store key %v", err)
}
newkey, err := ks.GetKey(filedir, "password")
if err != nil {
t.Fatalf("unable to get key %v", err)
}
if !bytes.Equal(newkey.SecretKey.Marshal(), key.SecretKey.Marshal()) {
t.Fatalf("retrieved secret keys are not equal %v , %v", newkey.SecretKey.Marshal(), key.SecretKey.Marshal())
}
if err := os.RemoveAll(filedir); err != nil {
t.Errorf("unable to remove temporary files %v", err)
}
}
func TestStoreAndGetKeys(t *testing.T) {
tmpdir := testutil.TempDir()
filePrefix := "/keystore"
ks := &Store{
keysDirPath: tmpdir,
scryptN: LightScryptN,
scryptP: LightScryptP,
}
key, err := NewKey(rand.Reader)
if err != nil {
t.Fatalf("key generation failed %v", err)
}
if err := ks.StoreKey(tmpdir+filePrefix+"/test-1", key, "password"); err != nil {
t.Fatalf("unable to store key %v", err)
}
key2, err := NewKey(rand.Reader)
if err != nil {
t.Fatalf("key generation failed %v", err)
}
if err := ks.StoreKey(tmpdir+filePrefix+"/test-2", key2, "password"); err != nil {
t.Fatalf("unable to store key %v", err)
}
newkeys, err := ks.GetKeys(tmpdir+filePrefix, "test", "password")
if err != nil {
t.Fatalf("unable to get key %v", err)
}
for _, s := range newkeys {
if !bytes.Equal(s.SecretKey.Marshal(), key.SecretKey.Marshal()) && !bytes.Equal(s.SecretKey.Marshal(), key2.SecretKey.Marshal()) {
t.Fatalf("retrieved secret keys are not equal %v ", s.SecretKey.Marshal())
}
}
if err := os.RemoveAll(tmpdir + filePrefix + "-2"); err != nil {
t.Errorf("unable to remove temporary files %v", err)
}
if err := os.RemoveAll(tmpdir + filePrefix + "-1"); err != nil {
t.Errorf("unable to remove temporary files %v", err)
}
}
func TestEncryptDecryptKey(t *testing.T) {
newID := uuid.NewRandom()
b := []byte("hi")
b32 := bytesutil.ToBytes32(b)
password := "test"
pk, err := bls.SecretKeyFromBytes(b32[:])
if err != nil {
t.Fatal(err)
}
key := &Key{
ID: newID,
SecretKey: pk,
PublicKey: pk.PublicKey(),
}
keyjson, err := EncryptKey(key, password, LightScryptN, LightScryptP)
if err != nil {
t.Fatalf("unable to encrypt key %v", err)
}
newkey, err := DecryptKey(keyjson, password)
if err != nil {
t.Fatalf("unable to decrypt keystore %v", err)
}
if !bytes.Equal(newkey.ID, newID) {
t.Fatalf("decrypted key's uuid doesn't match %v", newkey.ID)
}
expected := pk.Marshal()
if !bytes.Equal(newkey.SecretKey.Marshal(), expected) {
t.Fatalf("decrypted key's value is not equal %v", newkey.SecretKey.Marshal())
}
}