1e212771b5
* Fix broken transfer total balance (#4127) * Add proper label to method decoding inputs (#4136) * Another minor estimation fix (#4133) * Return 0 instead of error with out of gas on estimate_gas * Fix stuff up. * Another estimate gas fix. * Alter balance to maximum possible rather than GP=0. * Only increase to amount strictly necessary. * Get rid of unsafe code in ethkey, propagate incorrect Secret errors. (#4119) * Implementing secret * Fixing tests * Refactor VoteCollector (#4101) * dir * simple validator list * stub validator contract * make the engine hold Weak<Client> instead of IoChannel * validator set factory * register weak client with ValidatorContract * check chain security * add address array to generator * register provider contract * update validator set on notify * add validator contract spec * simple list test * split update and contract test * contract change * use client in tendermint * fix deadlock * step duration in params * adapt tendermint tests * add storage fields to test spec * constructor spec * execute under wrong address * create under correct address * revert * validator contract constructor * move genesis block lookup * add removal ability to contract * validator contract adding validators * fix basic authority * validator changing test * more docs * update sync tests * remove env_logger * another env_logger * cameltoe * hold EngineClient instead of Client * return error on misbehaviour * nicer return * sprinkle docs * Reenable mainnet update server. (#4137) * basic tests for subscribeToEvents (#4115) * subscribeToEvent fixtures ✅ * subscribeToEvent tests ✅ * temporarily skip failing test (#4138) * Improvements and optimisations to estimate_gas (#4142) * Return 0 instead of error with out of gas on estimate_gas * Fix stuff up. * Another estimate gas fix. * Alter balance to maximum possible rather than GP=0. * Only increase to amount strictly necessary. * Improvements and optimisations to estimate_gas. - Introduce proper error type - Avoid building costly traces * Fix tests. * Actually fix testsActually fix tests * Use estimateGas error (as per updated implementation) (#4131) * Use estimateGas error (as per updated implementation) * EXCEPTION_ERROR as per #4142 * Better error log reporting & handling (#4128) * Don't pop-up notifications after network switch (#4076) * Better notifications * Don't pollute with notifs if switched networks * Better connection close/open events / No more notifs on change network * PR Grumbles * Add close and open events to HTTP // Add tests * Fix tests * WIP Signer Fix * Fix Signer // Better reconnection handling * PR Grumbles * PR Grumbles * Fixes wrong fetching of balances + Notifications * Secure API WIP * Updated Secure API Connection + Status * Linting * Linting * Updated Secure API Logic * Proper handling of token updates // Fixing poping notifications * PR Grumbles * PR Grumbles * Fixing tests * Trim spaces from InputAddress (#4126) * Trim spaces for addresses * onSubmit has only value, not event * onSubmit (again) * Length check on trimmed value * Remove bindActionCreators({}, dispatch) (empty) (#4135)
155 lines
5.2 KiB
Rust
155 lines
5.2 KiB
Rust
// Copyright 2015, 2016 Parity Technologies (UK) Ltd.
|
|
// This file is part of Parity.
|
|
|
|
// Parity is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Parity is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
extern crate rand;
|
|
extern crate ethstore;
|
|
|
|
mod util;
|
|
|
|
use ethstore::{EthStore, SimpleSecretStore};
|
|
use ethstore::ethkey::{Random, Generator, Secret, KeyPair, verify_address};
|
|
use ethstore::dir::DiskDirectory;
|
|
use util::TransientDir;
|
|
|
|
#[test]
|
|
fn secret_store_create() {
|
|
let dir = TransientDir::create().unwrap();
|
|
let _ = EthStore::open(Box::new(dir)).unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic]
|
|
fn secret_store_open_not_existing() {
|
|
let dir = TransientDir::open();
|
|
let _ = EthStore::open(Box::new(dir)).unwrap();
|
|
}
|
|
|
|
fn random_secret() -> Secret {
|
|
Random.generate().unwrap().secret().clone()
|
|
}
|
|
|
|
#[test]
|
|
fn secret_store_create_account() {
|
|
let dir = TransientDir::create().unwrap();
|
|
let store = EthStore::open(Box::new(dir)).unwrap();
|
|
assert_eq!(store.accounts().unwrap().len(), 0);
|
|
assert!(store.insert_account(random_secret(), "").is_ok());
|
|
assert_eq!(store.accounts().unwrap().len(), 1);
|
|
assert!(store.insert_account(random_secret(), "").is_ok());
|
|
assert_eq!(store.accounts().unwrap().len(), 2);
|
|
}
|
|
|
|
#[test]
|
|
fn secret_store_sign() {
|
|
let dir = TransientDir::create().unwrap();
|
|
let store = EthStore::open(Box::new(dir)).unwrap();
|
|
assert!(store.insert_account(random_secret(), "").is_ok());
|
|
let accounts = store.accounts().unwrap();
|
|
assert_eq!(accounts.len(), 1);
|
|
assert!(store.sign(&accounts[0], "", &Default::default()).is_ok());
|
|
assert!(store.sign(&accounts[0], "1", &Default::default()).is_err());
|
|
}
|
|
|
|
#[test]
|
|
fn secret_store_change_password() {
|
|
let dir = TransientDir::create().unwrap();
|
|
let store = EthStore::open(Box::new(dir)).unwrap();
|
|
assert!(store.insert_account(random_secret(), "").is_ok());
|
|
let accounts = store.accounts().unwrap();
|
|
assert_eq!(accounts.len(), 1);
|
|
assert!(store.sign(&accounts[0], "", &Default::default()).is_ok());
|
|
assert!(store.change_password(&accounts[0], "", "1").is_ok());
|
|
assert!(store.sign(&accounts[0], "", &Default::default()).is_err());
|
|
assert!(store.sign(&accounts[0], "1", &Default::default()).is_ok());
|
|
}
|
|
|
|
#[test]
|
|
fn secret_store_remove_account() {
|
|
let dir = TransientDir::create().unwrap();
|
|
let store = EthStore::open(Box::new(dir)).unwrap();
|
|
assert!(store.insert_account(random_secret(), "").is_ok());
|
|
let accounts = store.accounts().unwrap();
|
|
assert_eq!(accounts.len(), 1);
|
|
assert!(store.remove_account(&accounts[0], "").is_ok());
|
|
assert_eq!(store.accounts().unwrap().len(), 0);
|
|
assert!(store.remove_account(&accounts[0], "").is_err());
|
|
}
|
|
|
|
fn test_path() -> &'static str {
|
|
match ::std::fs::metadata("ethstore") {
|
|
Ok(_) => "ethstore/tests/res/geth_keystore",
|
|
Err(_) => "tests/res/geth_keystore",
|
|
}
|
|
}
|
|
|
|
fn pat_path() -> &'static str {
|
|
match ::std::fs::metadata("ethstore") {
|
|
Ok(_) => "ethstore/tests/res/pat",
|
|
Err(_) => "tests/res/pat",
|
|
}
|
|
}
|
|
|
|
fn ciphertext_path() -> &'static str {
|
|
match ::std::fs::metadata("ethstore") {
|
|
Ok(_) => "ethstore/tests/res/ciphertext",
|
|
Err(_) => "tests/res/ciphertext",
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn secret_store_laod_geth_files() {
|
|
let dir = DiskDirectory::at(test_path());
|
|
let store = EthStore::open(Box::new(dir)).unwrap();
|
|
assert_eq!(store.accounts().unwrap(), vec![
|
|
"3f49624084b67849c7b4e805c5988c21a430f9d9".into(),
|
|
"5ba4dcf897e97c2bdf8315b9ef26c13c085988cf".into(),
|
|
"63121b431a52f8043c16fcf0d1df9cb7b5f66649".into(),
|
|
]);
|
|
}
|
|
|
|
#[test]
|
|
fn secret_store_load_pat_files() {
|
|
let dir = DiskDirectory::at(pat_path());
|
|
let store = EthStore::open(Box::new(dir)).unwrap();
|
|
assert_eq!(store.accounts().unwrap(), vec![
|
|
"3f49624084b67849c7b4e805c5988c21a430f9d9".into(),
|
|
"5ba4dcf897e97c2bdf8315b9ef26c13c085988cf".into(),
|
|
]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_decrypting_files_with_short_ciphertext() {
|
|
// 31e9d1e6d844bd3a536800ef8d8be6a9975db509, 30
|
|
let kp1 = KeyPair::from_secret("000081c29e8142bb6a81bef5a92bda7a8328a5c85bb2f9542e76f9b0f94fc018".parse().unwrap()).unwrap();
|
|
// d1e64e5480bfaf733ba7d48712decb8227797a4e , 31
|
|
let kp2 = KeyPair::from_secret("00fa7b3db73dc7dfdf8c5fbdb796d741e4488628c41fc4febd9160a866ba0f35".parse().unwrap()).unwrap();
|
|
let dir = DiskDirectory::at(ciphertext_path());
|
|
let store = EthStore::open(Box::new(dir)).unwrap();
|
|
let accounts = store.accounts().unwrap();
|
|
assert_eq!(accounts, vec![
|
|
"31e9d1e6d844bd3a536800ef8d8be6a9975db509".into(),
|
|
"d1e64e5480bfaf733ba7d48712decb8227797a4e".into(),
|
|
]);
|
|
|
|
let message = Default::default();
|
|
|
|
let s1 = store.sign(&accounts[0], "foo", &message).unwrap();
|
|
let s2 = store.sign(&accounts[1], "foo", &message).unwrap();
|
|
assert!(verify_address(&accounts[0], &s1, &message).unwrap());
|
|
assert!(verify_address(&kp1.address(), &s1, &message).unwrap());
|
|
assert!(verify_address(&kp2.address(), &s2, &message).unwrap());
|
|
}
|