// Copyright 2015-2020 Parity Technologies (UK) Ltd. // This file is part of OpenEthereum. // OpenEthereum is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // OpenEthereum is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with OpenEthereum. If not, see . extern crate ethstore; extern crate rand; mod util; use ethstore::{ accounts_dir::RootDiskDirectory, ethkey::{verify_address, Generator, KeyPair, Random, Secret}, EthStore, SecretVaultRef, SimpleSecretStore, StoreAccountRef, }; use util::TransientDir; #[test] fn secret_store_create() { let dir = TransientDir::create().unwrap(); let _ = EthStore::open(Box::new(dir)).unwrap(); } #[test] #[should_panic] fn secret_store_open_not_existing() { let dir = TransientDir::open(); let _ = EthStore::open(Box::new(dir)).unwrap(); } fn random_secret() -> Secret { Random.generate().unwrap().secret().clone() } #[test] fn secret_store_create_account() { let dir = TransientDir::create().unwrap(); let store = EthStore::open(Box::new(dir)).unwrap(); assert_eq!(store.accounts().unwrap().len(), 0); assert!(store .insert_account(SecretVaultRef::Root, random_secret(), &"".into()) .is_ok()); assert_eq!(store.accounts().unwrap().len(), 1); assert!(store .insert_account(SecretVaultRef::Root, random_secret(), &"".into()) .is_ok()); assert_eq!(store.accounts().unwrap().len(), 2); } #[test] fn secret_store_sign() { let dir = TransientDir::create().unwrap(); let store = EthStore::open(Box::new(dir)).unwrap(); assert!(store .insert_account(SecretVaultRef::Root, random_secret(), &"".into()) .is_ok()); let accounts = store.accounts().unwrap(); assert_eq!(accounts.len(), 1); assert!(store .sign(&accounts[0], &"".into(), &Default::default()) .is_ok()); assert!(store .sign(&accounts[0], &"1".into(), &Default::default()) .is_err()); } #[test] fn secret_store_change_password() { let dir = TransientDir::create().unwrap(); let store = EthStore::open(Box::new(dir)).unwrap(); assert!(store .insert_account(SecretVaultRef::Root, random_secret(), &"".into()) .is_ok()); let accounts = store.accounts().unwrap(); assert_eq!(accounts.len(), 1); assert!(store .sign(&accounts[0], &"".into(), &Default::default()) .is_ok()); assert!(store .change_password(&accounts[0], &"".into(), &"1".into()) .is_ok()); assert!(store .sign(&accounts[0], &"".into(), &Default::default()) .is_err()); assert!(store .sign(&accounts[0], &"1".into(), &Default::default()) .is_ok()); } #[test] fn secret_store_remove_account() { let dir = TransientDir::create().unwrap(); let store = EthStore::open(Box::new(dir)).unwrap(); assert!(store .insert_account(SecretVaultRef::Root, random_secret(), &"".into()) .is_ok()); let accounts = store.accounts().unwrap(); assert_eq!(accounts.len(), 1); assert!(store.remove_account(&accounts[0], &"".into()).is_ok()); assert_eq!(store.accounts().unwrap().len(), 0); assert!(store.remove_account(&accounts[0], &"".into()).is_err()); } fn test_path() -> &'static str { match ::std::fs::metadata("ethstore") { Ok(_) => "ethstore/tests/res/geth_keystore", Err(_) => "tests/res/geth_keystore", } } fn pat_path() -> &'static str { match ::std::fs::metadata("ethstore") { Ok(_) => "ethstore/tests/res/pat", Err(_) => "tests/res/pat", } } fn ciphertext_path() -> &'static str { match ::std::fs::metadata("ethstore") { Ok(_) => "ethstore/tests/res/ciphertext", Err(_) => "tests/res/ciphertext", } } #[test] fn secret_store_laod_geth_files() { let dir = RootDiskDirectory::at(test_path()); let store = EthStore::open(Box::new(dir)).unwrap(); assert_eq!( store.accounts().unwrap(), vec![ StoreAccountRef::root("3f49624084b67849c7b4e805c5988c21a430f9d9".into()), StoreAccountRef::root("5ba4dcf897e97c2bdf8315b9ef26c13c085988cf".into()), StoreAccountRef::root("63121b431a52f8043c16fcf0d1df9cb7b5f66649".into()), ] ); } #[test] fn secret_store_load_pat_files() { let dir = RootDiskDirectory::at(pat_path()); let store = EthStore::open(Box::new(dir)).unwrap(); assert_eq!( store.accounts().unwrap(), vec![ StoreAccountRef::root("3f49624084b67849c7b4e805c5988c21a430f9d9".into()), StoreAccountRef::root("5ba4dcf897e97c2bdf8315b9ef26c13c085988cf".into()), ] ); } #[test] fn test_decrypting_files_with_short_ciphertext() { // 31e9d1e6d844bd3a536800ef8d8be6a9975db509, 30 let kp1 = KeyPair::from_secret( "000081c29e8142bb6a81bef5a92bda7a8328a5c85bb2f9542e76f9b0f94fc018" .parse() .unwrap(), ) .unwrap(); // d1e64e5480bfaf733ba7d48712decb8227797a4e , 31 let kp2 = KeyPair::from_secret( "00fa7b3db73dc7dfdf8c5fbdb796d741e4488628c41fc4febd9160a866ba0f35" .parse() .unwrap(), ) .unwrap(); let dir = RootDiskDirectory::at(ciphertext_path()); let store = EthStore::open(Box::new(dir)).unwrap(); let accounts = store.accounts().unwrap(); assert_eq!( accounts, vec![ StoreAccountRef::root("31e9d1e6d844bd3a536800ef8d8be6a9975db509".into()), StoreAccountRef::root("d1e64e5480bfaf733ba7d48712decb8227797a4e".into()), ] ); let message = Default::default(); let s1 = store.sign(&accounts[0], &"foo".into(), &message).unwrap(); let s2 = store.sign(&accounts[1], &"foo".into(), &message).unwrap(); assert!(verify_address(&accounts[0].address, &s1, &message).unwrap()); assert!(verify_address(&kp1.address(), &s1, &message).unwrap()); assert!(verify_address(&kp2.address(), &s2, &message).unwrap()); }