Use keyapi for address generation in import key in dictkeystore

This commit is contained in:
nolash
2021-01-09 20:25:47 +01:00
parent 0afacff6c6
commit e1e585776d
11 changed files with 93 additions and 7 deletions

View File

@@ -0,0 +1,67 @@
#!/usr/bin/python
# standard imports
import unittest
import logging
import base64
import os
# third-party imports
import psycopg2
from psycopg2 import sql
from cryptography.fernet import Fernet, InvalidToken
# local imports
from crypto_dev_signer.keystore import DictKeystore
from crypto_dev_signer.error import UnknownAccountError
logging.basicConfig(level=logging.DEBUG)
logg = logging.getLogger()
script_dir = os.path.realpath(os.path.dirname(__file__))
class TestDatabase(unittest.TestCase):
conn = None
cur = None
symkey = None
address_hex = None
db = None
def setUp(self):
logg.debug('setup')
# arbitrary value
#symkey_hex = 'E92431CAEE69313A7BE9E443C4ABEED9BF8157E9A13553B4D5D6E7D51B5021D9'
#self.symkey = bytes.fromhex(symkey_hex)
#kw = {
# 'symmetric_key': self.symkey,
# }
self.db = DictKeystore()
keystore_filepath = os.path.join(script_dir, 'testdata', 'UTC--2021-01-08T18-37-01.187235289Z--00a329c0648769a73afac7f9381e08fb43dbea72')
#f = open(
#s = f.read()
#f.close()
self.address_hex = self.db.import_keystore_file(keystore_filepath, '')[2:]
def tearDown(self):
pass
def test_get_key(self):
logg.debug('getting {}'.format(self.address_hex))
pk = self.db.get(self.address_hex, '')
self.assertEqual(pk.public_key.to_checksum_address()[2:], self.address_hex)
bogus_account = os.urandom(20).hex()
with self.assertRaises(UnknownAccountError):
self.db.get(bogus_account, '')
if __name__ == '__main__':
unittest.main()

View File

@@ -91,6 +91,7 @@ class TestSign(unittest.TestCase):
s = ReferenceSigner(self.pk_getter)
z = s.signEthereumMessage(tx_ints['from'], 'foo')
z = s.signEthereumMessage(tx_ints['from'], b'foo')
logg.debug('zzz {}'.format(str(z)))
if __name__ == '__main__':

View File

@@ -0,0 +1 @@
{"address":"00a329c0648769a73afac7f9381e08fb43dbea72","crypto":{"cipher":"aes-128-ctr","ciphertext":"e06ab0b0c96e9b4b1f04259ec49d6c8c865bf6363b38b030ab4852fa471269b4","cipherparams":{"iv":"36d3d7781750d12d3802cfe74aed4434"},"kdf":"scrypt","kdfparams":{"dklen":32,"n":262144,"p":1,"r":8,"salt":"94e82d24c10e2af9987b926b5e1a36ce8d03595535a96359ca6648485872d5ba"},"mac":"6cac102b8d4c25203ea52505fea7e0d0b1a70929a1561e2143df88a6b45784da"},"id":"0225f31c-36da-4dd7-95d8-c463bba04387","version":3}