// Copyright 2015-2019 Parity Technologies (UK) Ltd. // This file is part of Parity Ethereum. // Parity Ethereum is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // Parity Ethereum is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with Parity Ethereum. If not, see . use std::thread; use std::str::FromStr; use std::sync::Arc; use std::time::Duration; use rlp; use jsonrpc_core::{IoHandler, Success}; use jsonrpc_core::futures::Future; use v1::impls::SigningQueueClient; use v1::metadata::Metadata; use v1::traits::{EthSigning, ParitySigning, Parity}; use v1::helpers::{nonce, dispatch, FullDispatcher}; use v1::helpers::external_signer::{SignerService, SigningQueue}; use v1::types::{ConfirmationResponse, RichRawTransaction}; use v1::tests::helpers::TestMinerService; use v1::tests::mocked::parity; use accounts::AccountProvider; use bytes::ToPretty; use ethcore::test_helpers::TestBlockChainClient; use ethereum_types::{U256, Address, Signature, H256}; use crypto::publickey::{Generator, Random, Secret}; use parity_runtime::{Runtime, Executor}; use parking_lot::Mutex; use serde_json; use types::transaction::{Transaction, Action, SignedTransaction}; struct SigningTester { pub runtime: Runtime, pub signer: Arc, pub client: Arc, pub miner: Arc, pub accounts: Arc, pub io: IoHandler, } impl SigningTester { fn new(signing_queue_enabled: bool) ->Self { let runtime = Runtime::with_thread_count(1); let signer = Arc::new(SignerService::new_test(signing_queue_enabled)); let client = Arc::new(TestBlockChainClient::default()); let miner = Arc::new(TestMinerService::default()); let accounts = Arc::new(AccountProvider::transient_provider()); let account_signer = Arc::new(dispatch::Signer::new(accounts.clone())) as _; let reservations = Arc::new(Mutex::new(nonce::Reservations::new(runtime.executor()))); let mut io = IoHandler::default(); let dispatcher = FullDispatcher::new(client.clone(), miner.clone(), reservations, 50); let executor = Executor::new_thread_per_future(); let rpc = SigningQueueClient::new(&signer, dispatcher.clone(), executor.clone(), &account_signer); io.extend_with(EthSigning::to_delegate(rpc)); let rpc = SigningQueueClient::new(&signer, dispatcher, executor, &account_signer); io.extend_with(ParitySigning::to_delegate(rpc)); SigningTester { runtime, signer: signer, client: client, miner: miner, accounts: accounts, io: io, } } } fn eth_signing(signing_queue_enabled: bool) -> SigningTester { SigningTester::new(signing_queue_enabled) } #[test] fn rpc_eth_sign() { use rustc_hex::FromHex; let tester = eth_signing(true); let account = tester.accounts.insert_account(Secret::from([69u8; 32]), &"abcd".into()).unwrap(); tester.accounts.unlock_account_permanently(account, "abcd".into()).unwrap(); let _message = "0cc175b9c0f1b6a831c399e26977266192eb5ffee6ae2fec3ad71c777531578f".from_hex().unwrap(); let req = r#"{ "jsonrpc": "2.0", "method": "eth_sign", "params": [ ""#.to_owned() + &format!("0x{:x}", account) + r#"", "0x0cc175b9c0f1b6a831c399e26977266192eb5ffee6ae2fec3ad71c777531578f" ], "id": 1 }"#; let res = r#"{"jsonrpc":"2.0","result":"0xa2870db1d0c26ef93c7b72d2a0830fa6b841e0593f7186bc6c7cc317af8cf3a42fda03bd589a49949aa05db83300cdb553116274518dbe9d90c65d0213f4af491b","id":1}"#; assert_eq!(tester.io.handle_request_sync(&req), Some(res.into())); } #[test] fn should_add_sign_to_queue() { // given let tester = eth_signing(true); let address = Address::random(); assert_eq!(tester.signer.requests().len(), 0); // when let request = r#"{ "jsonrpc": "2.0", "method": "eth_sign", "params": [ ""#.to_owned() + format!("0x{:x}", address).as_ref() + r#"", "0x0000000000000000000000000000000000000000000000000000000000000005" ], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":"0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000","id":1}"#; // then let promise = tester.io.handle_request(&request); // the future must be polled at least once before request is queued. let signer = tester.signer.clone(); ::std::thread::spawn(move || loop { if signer.requests().len() == 1 { // respond let sender = signer.take(&1.into()).unwrap(); signer.request_confirmed(sender, Ok(ConfirmationResponse::Signature(Signature::zero()))); break } ::std::thread::sleep(Duration::from_millis(100)) }); let res = promise.wait().unwrap(); assert_eq!(res, Some(response.to_owned())); } #[test] fn should_post_sign_to_queue() { // given let tester = eth_signing(true); let address = Address::random(); assert_eq!(tester.signer.requests().len(), 0); // when let request = r#"{ "jsonrpc": "2.0", "method": "parity_postSign", "params": [ ""#.to_owned() + format!("0x{:x}", address).as_ref() + r#"", "0x0000000000000000000000000000000000000000000000000000000000000005" ], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":"0x1","id":1}"#; // then assert_eq!(tester.io.handle_request_sync(&request), Some(response.to_owned())); assert_eq!(tester.signer.requests().len(), 1); } #[test] fn should_check_status_of_request() { // given let tester = eth_signing(true); let address = Address::random(); let request = r#"{ "jsonrpc": "2.0", "method": "parity_postSign", "params": [ ""#.to_owned() + format!("0x{:x}", address).as_ref() + r#"", "0x0000000000000000000000000000000000000000000000000000000000000005" ], "id": 1 }"#; tester.io.handle_request_sync(&request).expect("Sent"); // when let request = r#"{ "jsonrpc": "2.0", "method": "parity_checkRequest", "params": ["0x1"], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":null,"id":1}"#; // then assert_eq!(tester.io.handle_request_sync(&request), Some(response.to_owned())); } #[test] fn should_check_status_of_request_when_its_resolved() { // given let tester = eth_signing(true); let address = Address::random(); let request = r#"{ "jsonrpc": "2.0", "method": "parity_postSign", "params": [ ""#.to_owned() + format!("0x{:x}", address).as_ref() + r#"", "0x0000000000000000000000000000000000000000000000000000000000000005" ], "id": 1 }"#; tester.io.handle_request_sync(&request).expect("Sent"); let sender = tester.signer.take(&1.into()).unwrap(); tester.signer.request_confirmed(sender, Ok(ConfirmationResponse::Signature(Signature::from_low_u64_be(1)))); // This is not ideal, but we need to give futures some time to be executed, and they need to run in a separate thread thread::sleep(Duration::from_millis(100)); // when let request = r#"{ "jsonrpc": "2.0", "method": "parity_checkRequest", "params": ["0x1"], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":"0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001","id":1}"#; // then assert_eq!(tester.io.handle_request_sync(&request), Some(response.to_owned())); } #[test] fn eth_sign_locked_account() { let secret = "8a283037bb19c4fed7b1c569e40c7dcff366165eb869110a1b11532963eb9cb2".parse().unwrap(); let tester = eth_signing(false); let address = tester.accounts.insert_account(secret, &"".into()).unwrap(); let req_send_trans = r#"{ "jsonrpc": "2.0", "method": "eth_sendTransaction", "params": [{ "from": ""#.to_owned() + format!("0x{:x}", address).as_ref() + r#"", "to": "0xd46e8dd67c5d32be8058bb8eb970870f07244567", "gas": "0x30000", "gasPrice": "0x1", "value": "0x9184e72a" }], "id": 16 }"#; // expected error response let error_res = r#"{ "jsonrpc":"2.0", "error": { "code":-32020, "message":"Your account is locked and the signing queue is disabled. You can either Unlock the account via CLI, personal_unlockAccount or enable the signing queue to use Trusted Signer." }, "id":16 }"#; // dispatch the transaction, without unlocking the account. assert_eq!( error_res.replace("\t", "").replace("\n", ""), tester.io.handle_request_sync(&req_send_trans).unwrap() ); // unlock the account tester.accounts.unlock_account_permanently(address, "".into()).unwrap(); // try again, this time account is unlocked. assert_eq!( r#"{"jsonrpc":"2.0","result":"0x70df76392fba654351714803d99a90be1d58d165352e0008e376427284314c88","id":16}"#, tester.io.handle_request_sync(&req_send_trans).unwrap() ); } #[test] fn should_sign_if_account_is_unlocked() { // given let tester = eth_signing(true); let data = vec![5u8]; let acc = tester.accounts.insert_account(Secret::from([69u8; 32]), &"test".into()).unwrap(); tester.accounts.unlock_account_permanently(acc, "test".into()).unwrap(); // when let request = r#"{ "jsonrpc": "2.0", "method": "eth_sign", "params": [ ""#.to_owned() + format!("0x{:x}", acc).as_ref() + r#"", ""# + format!("0x{}", data.to_hex()).as_ref() + r#"" ], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":"0xdb53b32e56cf3e9735377b7664d6de5a03e125b1bf8ec55715d253668b4238503b4ac931fe6af90add73e72a585e952665376b2b9afc5b6b239b7df74c734e121b","id":1}"#; assert_eq!(tester.io.handle_request_sync(&request), Some(response.to_owned())); assert_eq!(tester.signer.requests().len(), 0); } #[test] fn should_add_transaction_to_queue() { // given let tester = eth_signing(true); let address = Address::random(); assert_eq!(tester.signer.requests().len(), 0); // when let request = r#"{ "jsonrpc": "2.0", "method": "eth_sendTransaction", "params": [{ "from": ""#.to_owned() + format!("0x{:x}", address).as_ref() + r#"", "to": "0xd46e8dd67c5d32be8058bb8eb970870f07244567", "gas": "0x76c0", "gasPrice": "0x9184e72a000", "value": "0x9184e72a" }], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":"0x0000000000000000000000000000000000000000000000000000000000000000","id":1}"#; // then let promise = tester.io.handle_request(&request); // the future must be polled at least once before request is queued. let signer = tester.signer.clone(); ::std::thread::spawn(move || loop { if signer.requests().len() == 1 { // respond let sender = signer.take(&1.into()).unwrap(); signer.request_confirmed(sender, Ok(ConfirmationResponse::SendTransaction(H256::zero()))); break } ::std::thread::sleep(Duration::from_millis(100)) }); let res = promise.wait().unwrap(); assert_eq!(res, Some(response.to_owned())); } #[test] fn should_add_sign_transaction_to_the_queue() { // given let tester = eth_signing(true); let address = tester.accounts.new_account(&"test".into()).unwrap(); assert_eq!(tester.signer.requests().len(), 0); // when let request = r#"{ "jsonrpc": "2.0", "method": "eth_signTransaction", "params": [{ "from": ""#.to_owned() + format!("0x{:x}", address).as_ref() + r#"", "to": "0xd46e8dd67c5d32be8058bb8eb970870f07244567", "gas": "0x76c0", "gasPrice": "0x9184e72a000", "value": "0x9184e72a" }], "id": 1 }"#; let t = Transaction { nonce: U256::one(), gas_price: U256::from(0x9184e72a000u64), gas: U256::from(0x76c0), action: Action::Call(Address::from_str("d46e8dd67c5d32be8058bb8eb970870f07244567").unwrap()), value: U256::from(0x9184e72au64), data: vec![] }; let signature = tester.accounts.sign(address, Some("test".into()), t.hash(None)).unwrap(); let t = t.with_signature(signature, None); let t = SignedTransaction::new(t).unwrap(); let signature = t.signature(); let rlp = rlp::encode(&t); let response = r#"{"jsonrpc":"2.0","result":{"#.to_owned() + r#""raw":"0x"# + &rlp.to_hex() + r#"","# + r#""tx":{"# + r#""blockHash":null,"blockNumber":null,"# + &format!("\"chainId\":{},", t.chain_id().map_or("null".to_owned(), |n| format!("{}", n))) + r#""condition":null,"creates":null,"# + &format!("\"from\":\"0x{:x}\",", &address) + r#""gas":"0x76c0","gasPrice":"0x9184e72a000","# + &format!("\"hash\":\"0x{:x}\",", t.hash()) + r#""input":"0x","# + r#""nonce":"0x1","# + &format!("\"publicKey\":\"0x{:x}\",", t.public_key().unwrap()) + &format!("\"r\":\"0x{:x}\",", U256::from(signature.r())) + &format!("\"raw\":\"0x{}\",", rlp.to_hex()) + &format!("\"s\":\"0x{:x}\",", U256::from(signature.s())) + &format!("\"standardV\":\"0x{:x}\",", U256::from(t.standard_v())) + r#""to":"0xd46e8dd67c5d32be8058bb8eb970870f07244567","transactionIndex":null,"# + &format!("\"v\":\"0x{:x}\",", U256::from(t.original_v())) + r#""value":"0x9184e72a""# + r#"}},"id":1}"#; // then tester.miner.increment_nonce(&address); let promise = tester.io.handle_request(&request); // the future must be polled at least once before request is queued. let signer = tester.signer.clone(); ::std::thread::spawn(move || loop { if signer.requests().len() == 1 { // respond let sender = signer.take(&1.into()).unwrap(); signer.request_confirmed(sender, Ok(ConfirmationResponse::SignTransaction( RichRawTransaction::from_signed(t.into()) ))); break } ::std::thread::sleep(Duration::from_millis(100)) }); let res = promise.wait().unwrap(); assert_eq!(res, Some(response.to_owned())); } #[test] fn should_dispatch_transaction_if_account_is_unlock() { // given let tester = eth_signing(true); let acc = tester.accounts.new_account(&"test".into()).unwrap(); tester.accounts.unlock_account_permanently(acc, "test".into()).unwrap(); let t = Transaction { nonce: U256::zero(), gas_price: U256::from(0x9184e72a000u64), gas: U256::from(0x76c0), action: Action::Call(Address::from_str("d46e8dd67c5d32be8058bb8eb970870f07244567").unwrap()), value: U256::from(0x9184e72au64), data: vec![] }; let signature = tester.accounts.sign(acc, None, t.hash(None)).unwrap(); let t = t.with_signature(signature, None); // when let request = r#"{ "jsonrpc": "2.0", "method": "eth_sendTransaction", "params": [{ "from": ""#.to_owned() + format!("0x{:x}", acc).as_ref() + r#"", "to": "0xd46e8dd67c5d32be8058bb8eb970870f07244567", "gas": "0x76c0", "gasPrice": "0x9184e72a000", "value": "0x9184e72a" }], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":""#.to_owned() + format!("0x{:x}", t.hash()).as_ref() + r#"","id":1}"#; // then assert_eq!(tester.io.handle_request_sync(&request), Some(response.to_owned())); } #[test] fn should_decrypt_message_if_account_is_unlocked() { // given let mut tester = eth_signing(true); let parity = parity::Dependencies::new(); tester.io.extend_with(parity.client(None).to_delegate()); let (address, public) = tester.accounts.new_account_and_public(&"test".into()).unwrap(); tester.accounts.unlock_account_permanently(address, "test".into()).unwrap(); // First encrypt message let request = format!("{}0x{:x}{}", r#"{"jsonrpc": "2.0", "method": "parity_encryptMessage", "params":[""#, public, r#"", "0x01020304"], "id": 1}"# ); let encrypted: Success = serde_json::from_str(&tester.io.handle_request_sync(&request).unwrap()).unwrap(); // then call decrypt let request = format!("{}{:x}{}{}{}", r#"{"jsonrpc": "2.0", "method": "parity_decryptMessage", "params":["0x"#, address, r#"","#, encrypted.result, r#"], "id": 1}"# ); println!("Request: {:?}", request); let response = r#"{"jsonrpc":"2.0","result":"0x01020304","id":1}"#; // then assert_eq!(tester.io.handle_request_sync(&request), Some(response.into())); } #[test] fn should_add_decryption_to_the_queue() { // given let tester = eth_signing(true); let acc = Random.generate().unwrap(); assert_eq!(tester.signer.requests().len(), 0); // when let request = r#"{ "jsonrpc": "2.0", "method": "parity_decryptMessage", "params": ["0x"#.to_owned() + &format!("{:x}", acc.address()) + r#"", "0x012345"], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":"0x0102","id":1}"#; // then let promise = tester.io.handle_request(&request); // the future must be polled at least once before request is queued. let signer = tester.signer.clone(); ::std::thread::spawn(move || loop { if signer.requests().len() == 1 { // respond let sender = signer.take(&1.into()).unwrap(); signer.request_confirmed(sender, Ok(ConfirmationResponse::Decrypt(vec![0x1, 0x2].into()))); break } ::std::thread::sleep(Duration::from_millis(10)) }); // check response: will deadlock if unsuccessful. let res = promise.wait().unwrap(); assert_eq!(res, Some(response.to_owned())); } #[test] fn should_compose_transaction() { // given let tester = eth_signing(true); let acc = Random.generate().unwrap(); assert_eq!(tester.signer.requests().len(), 0); let from = format!("{:x}", acc.address()); // when let request = r#"{ "jsonrpc": "2.0", "method": "parity_composeTransaction", "params": [{"from":"0x"#.to_owned() + &from + r#"","value":"0x5"}], "id": 1 }"#; let response = r#"{"jsonrpc":"2.0","result":{"condition":null,"data":"0x","from":"0x"#.to_owned() + &from + r#"","gas":"0x5208","gasPrice":"0x4a817c800","nonce":"0x0","to":null,"value":"0x5"},"id":1}"#; // then let res = tester.io.handle_request(&request).wait().unwrap(); assert_eq!(res, Some(response.to_owned())); }