2017-12-19 15:45:30 +00:00
|
|
|
package account
|
2017-05-16 12:09:52 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"reflect"
|
|
|
|
"testing"
|
|
|
|
|
2017-12-14 02:03:55 +00:00
|
|
|
"github.com/ethereum/go-ethereum/accounts/keystore"
|
2017-05-16 12:09:52 +00:00
|
|
|
gethcommon "github.com/ethereum/go-ethereum/common"
|
2017-12-18 14:08:31 +00:00
|
|
|
whisper "github.com/ethereum/go-ethereum/whisper/whisperv5"
|
2017-12-14 02:03:55 +00:00
|
|
|
"github.com/golang/mock/gomock"
|
2017-05-16 12:09:52 +00:00
|
|
|
"github.com/status-im/status-go/geth/common"
|
2017-10-11 14:20:51 +00:00
|
|
|
. "github.com/status-im/status-go/testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
2017-12-19 13:07:31 +00:00
|
|
|
"github.com/stretchr/testify/suite"
|
2017-05-16 12:09:52 +00:00
|
|
|
)
|
|
|
|
|
2017-10-11 14:20:51 +00:00
|
|
|
func TestVerifyAccountPassword(t *testing.T) {
|
2017-12-19 15:45:30 +00:00
|
|
|
accManager := NewManager(nil)
|
2017-05-16 12:09:52 +00:00
|
|
|
keyStoreDir, err := ioutil.TempDir(os.TempDir(), "accounts")
|
2017-10-11 14:20:51 +00:00
|
|
|
require.NoError(t, err)
|
2017-10-20 09:06:22 +00:00
|
|
|
defer os.RemoveAll(keyStoreDir) //nolint: errcheck
|
2017-05-16 12:09:52 +00:00
|
|
|
|
2017-10-11 14:20:51 +00:00
|
|
|
emptyKeyStoreDir, err := ioutil.TempDir(os.TempDir(), "accounts_empty")
|
|
|
|
require.NoError(t, err)
|
2017-10-20 09:06:22 +00:00
|
|
|
defer os.RemoveAll(emptyKeyStoreDir) //nolint: errcheck
|
2017-05-16 12:09:52 +00:00
|
|
|
|
|
|
|
// import account keys
|
2017-11-20 18:21:30 +00:00
|
|
|
require.NoError(t, common.ImportTestAccount(keyStoreDir, GetAccount1PKFile()))
|
|
|
|
require.NoError(t, common.ImportTestAccount(keyStoreDir, GetAccount2PKFile()))
|
2017-05-16 12:09:52 +00:00
|
|
|
|
|
|
|
account1Address := gethcommon.BytesToAddress(gethcommon.FromHex(TestConfig.Account1.Address))
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
keyPath string
|
|
|
|
address string
|
|
|
|
password string
|
|
|
|
expectedError error
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
"correct address, correct password (decrypt should succeed)",
|
|
|
|
keyStoreDir,
|
|
|
|
TestConfig.Account1.Address,
|
|
|
|
TestConfig.Account1.Password,
|
|
|
|
nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"correct address, correct password, non-existent key store",
|
|
|
|
filepath.Join(keyStoreDir, "non-existent-folder"),
|
|
|
|
TestConfig.Account1.Address,
|
|
|
|
TestConfig.Account1.Password,
|
|
|
|
fmt.Errorf("cannot traverse key store folder: lstat %s/non-existent-folder: no such file or directory", keyStoreDir),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"correct address, correct password, empty key store (pk is not there)",
|
|
|
|
emptyKeyStoreDir,
|
|
|
|
TestConfig.Account1.Address,
|
|
|
|
TestConfig.Account1.Password,
|
2017-10-10 09:38:49 +00:00
|
|
|
fmt.Errorf("cannot locate account for address: %s", account1Address.Hex()),
|
2017-05-16 12:09:52 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"wrong address, correct password",
|
|
|
|
keyStoreDir,
|
|
|
|
"0x79791d3e8f2daa1f7fec29649d152c0ada3cc535",
|
|
|
|
TestConfig.Account1.Password,
|
2017-10-10 09:38:49 +00:00
|
|
|
fmt.Errorf("cannot locate account for address: %s", "0x79791d3E8F2dAa1F7FeC29649d152c0aDA3cc535"),
|
2017-05-16 12:09:52 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"correct address, wrong password",
|
|
|
|
keyStoreDir,
|
|
|
|
TestConfig.Account1.Address,
|
|
|
|
"wrong password", // wrong password
|
|
|
|
errors.New("could not decrypt key with given passphrase"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, testCase := range testCases {
|
2017-12-19 15:45:30 +00:00
|
|
|
accountKey, err := accManager.VerifyAccountPassword(testCase.keyPath, testCase.address, testCase.password)
|
2017-05-16 12:09:52 +00:00
|
|
|
if !reflect.DeepEqual(err, testCase.expectedError) {
|
2017-10-11 14:20:51 +00:00
|
|
|
require.FailNow(t, fmt.Sprintf("unexpected error: expected \n'%v', got \n'%v'", testCase.expectedError, err))
|
2017-05-16 12:09:52 +00:00
|
|
|
}
|
|
|
|
if err == nil {
|
|
|
|
if accountKey == nil {
|
2017-10-11 14:20:51 +00:00
|
|
|
require.Fail(t, "no error reported, but account key is missing")
|
2017-05-16 12:09:52 +00:00
|
|
|
}
|
|
|
|
accountAddress := gethcommon.BytesToAddress(gethcommon.FromHex(testCase.address))
|
|
|
|
if accountKey.Address != accountAddress {
|
2017-10-11 14:20:51 +00:00
|
|
|
require.Fail(t, "account mismatch: have %s, want %s", accountKey.Address.Hex(), accountAddress.Hex())
|
2017-05-16 12:09:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-10-10 09:38:49 +00:00
|
|
|
|
|
|
|
// TestVerifyAccountPasswordWithAccountBeforeEIP55 verifies if VerifyAccountPassword
|
|
|
|
// can handle accounts before introduction of EIP55.
|
2017-10-11 14:20:51 +00:00
|
|
|
func TestVerifyAccountPasswordWithAccountBeforeEIP55(t *testing.T) {
|
2017-10-10 09:38:49 +00:00
|
|
|
keyStoreDir, err := ioutil.TempDir("", "status-accounts-test")
|
2017-10-11 14:20:51 +00:00
|
|
|
require.NoError(t, err)
|
2017-10-20 09:06:22 +00:00
|
|
|
defer os.RemoveAll(keyStoreDir) //nolint: errcheck
|
2017-10-10 09:38:49 +00:00
|
|
|
|
|
|
|
// Import keys and make sure one was created before EIP55 introduction.
|
2017-11-07 17:46:11 +00:00
|
|
|
err = common.ImportTestAccount(keyStoreDir, "test-account3-before-eip55.pk")
|
2017-10-11 14:20:51 +00:00
|
|
|
require.NoError(t, err)
|
2017-10-10 09:38:49 +00:00
|
|
|
|
2017-12-19 15:45:30 +00:00
|
|
|
accManager := NewManager(nil)
|
2017-10-10 09:38:49 +00:00
|
|
|
|
2017-11-07 17:46:11 +00:00
|
|
|
address := gethcommon.HexToAddress(TestConfig.Account3.Address)
|
2017-12-19 15:45:30 +00:00
|
|
|
_, err = accManager.VerifyAccountPassword(keyStoreDir, address.Hex(), TestConfig.Account3.Password)
|
2017-10-11 14:20:51 +00:00
|
|
|
require.NoError(t, err)
|
2017-10-10 09:38:49 +00:00
|
|
|
}
|
2017-12-14 02:03:55 +00:00
|
|
|
|
2017-12-19 13:07:31 +00:00
|
|
|
func TestManagerTestSuite(t *testing.T) {
|
2017-12-19 15:45:30 +00:00
|
|
|
nodeManager := newMockNodeManager(t)
|
2017-12-14 02:03:55 +00:00
|
|
|
|
2017-12-19 13:07:31 +00:00
|
|
|
keyStoreDir, err := ioutil.TempDir(os.TempDir(), "accounts")
|
2017-12-14 02:03:55 +00:00
|
|
|
require.NoError(t, err)
|
2017-12-19 13:07:31 +00:00
|
|
|
keyStore := keystore.NewKeyStore(keyStoreDir, keystore.LightScryptN, keystore.LightScryptP)
|
|
|
|
defer os.RemoveAll(keyStoreDir) //nolint: errcheck
|
2017-12-14 13:48:01 +00:00
|
|
|
|
2017-12-19 13:07:31 +00:00
|
|
|
suite.Run(t, &ManagerTestSuite{
|
|
|
|
nodeManager: nodeManager,
|
2017-12-19 15:45:30 +00:00
|
|
|
accManager: NewManager(nodeManager),
|
2017-12-19 13:07:31 +00:00
|
|
|
password: "test-password",
|
|
|
|
keyStore: keyStore,
|
|
|
|
shh: whisper.New(nil),
|
|
|
|
})
|
|
|
|
}
|
2017-12-14 02:03:55 +00:00
|
|
|
|
2017-12-19 15:45:30 +00:00
|
|
|
func newMockNodeManager(t *testing.T) *common.MockNodeManager {
|
|
|
|
ctrl := gomock.NewController(t)
|
|
|
|
return common.NewMockNodeManager(ctrl)
|
|
|
|
}
|
|
|
|
|
2017-12-19 13:07:31 +00:00
|
|
|
type ManagerTestSuite struct {
|
|
|
|
suite.Suite
|
|
|
|
nodeManager *common.MockNodeManager
|
2017-12-19 15:45:30 +00:00
|
|
|
accManager *Manager
|
2017-12-19 13:07:31 +00:00
|
|
|
password string
|
|
|
|
keyStore *keystore.KeyStore
|
|
|
|
shh *whisper.Whisper
|
|
|
|
}
|
2017-12-14 02:03:55 +00:00
|
|
|
|
2017-12-19 15:45:30 +00:00
|
|
|
// reinitMock is for reassigning a new mock node manager to account manager.
|
|
|
|
// Stating the amount of times for mock calls kills the flexibility for
|
|
|
|
// development so this is a good workaround to use with EXPECT().AnyTimes()
|
|
|
|
func (s *ManagerTestSuite) reinitMock() {
|
|
|
|
s.nodeManager = newMockNodeManager(s.T())
|
|
|
|
s.accManager.nodeManager = s.nodeManager
|
|
|
|
}
|
|
|
|
|
2017-12-19 13:07:31 +00:00
|
|
|
func (s *ManagerTestSuite) TestCreateAndRecoverAccountSuccess() {
|
2017-12-19 15:45:30 +00:00
|
|
|
s.reinitMock()
|
2017-12-14 02:03:55 +00:00
|
|
|
|
2017-12-14 13:50:12 +00:00
|
|
|
// Don't fail on empty password
|
2017-12-19 15:45:30 +00:00
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil)
|
|
|
|
_, _, _, err := s.accManager.CreateAccount(s.password)
|
2017-12-19 13:07:31 +00:00
|
|
|
s.NoError(err)
|
2017-12-14 13:50:12 +00:00
|
|
|
|
2017-12-19 15:45:30 +00:00
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil)
|
|
|
|
addr1, pubKey1, mnemonic, err := s.accManager.CreateAccount(s.password)
|
2017-12-19 13:07:31 +00:00
|
|
|
s.NoError(err)
|
|
|
|
s.NotNil(addr1)
|
|
|
|
s.NotNil(pubKey1)
|
|
|
|
s.NotNil(mnemonic)
|
2017-12-14 02:03:55 +00:00
|
|
|
|
|
|
|
// Now recover the account using the mnemonic seed and the password
|
2017-12-19 15:45:30 +00:00
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil)
|
|
|
|
addr2, pubKey2, err := s.accManager.RecoverAccount(s.password, mnemonic)
|
2017-12-19 13:07:31 +00:00
|
|
|
s.NoError(err)
|
|
|
|
s.Equal(addr1, addr2)
|
|
|
|
s.Equal(pubKey1, pubKey2)
|
2017-12-14 13:48:01 +00:00
|
|
|
}
|
|
|
|
|
2017-12-19 13:07:31 +00:00
|
|
|
func (s *ManagerTestSuite) TestCreateAndRecoverAccountFail_KeyStore() {
|
2017-12-19 15:45:30 +00:00
|
|
|
s.reinitMock()
|
2017-12-14 02:03:55 +00:00
|
|
|
|
2017-12-14 13:48:01 +00:00
|
|
|
expectedErr := errors.New("Non-nil error string")
|
2017-12-19 15:45:30 +00:00
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(nil, expectedErr)
|
|
|
|
_, _, _, err := s.accManager.CreateAccount(s.password)
|
2017-12-19 13:07:31 +00:00
|
|
|
s.Equal(err, expectedErr)
|
2017-12-14 13:48:01 +00:00
|
|
|
|
|
|
|
// Create a new account to use the mnemonic seed.
|
2017-12-19 15:45:30 +00:00
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil)
|
|
|
|
_, _, mnemonic, err := s.accManager.CreateAccount(s.password)
|
2017-12-19 13:07:31 +00:00
|
|
|
s.NoError(err)
|
2017-12-14 13:48:01 +00:00
|
|
|
|
2017-12-19 15:45:30 +00:00
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(nil, expectedErr)
|
|
|
|
_, _, err = s.accManager.RecoverAccount(s.password, mnemonic)
|
2017-12-19 13:07:31 +00:00
|
|
|
s.Equal(err, expectedErr)
|
2017-12-14 02:03:55 +00:00
|
|
|
}
|
2017-12-18 14:08:31 +00:00
|
|
|
|
2017-12-19 13:07:31 +00:00
|
|
|
func (s *ManagerTestSuite) TestSelectAccount() {
|
2017-12-19 15:45:30 +00:00
|
|
|
s.reinitMock()
|
2017-12-18 14:08:31 +00:00
|
|
|
|
2017-12-19 15:45:30 +00:00
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil)
|
|
|
|
addr, _, _, err := s.accManager.CreateAccount(s.password)
|
2017-12-19 13:07:31 +00:00
|
|
|
s.NoError(err)
|
2017-12-18 14:08:31 +00:00
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
accountKeyStoreReturn []interface{}
|
|
|
|
whisperServiceReturn []interface{}
|
|
|
|
address string
|
|
|
|
password string
|
|
|
|
fail bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
"success",
|
2017-12-19 15:45:30 +00:00
|
|
|
[]interface{}{s.keyStore, nil},
|
|
|
|
[]interface{}{s.shh, nil},
|
2017-12-18 14:08:31 +00:00
|
|
|
addr,
|
2017-12-19 15:45:30 +00:00
|
|
|
s.password,
|
2017-12-18 14:08:31 +00:00
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"fail_keyStore",
|
2017-12-19 15:45:30 +00:00
|
|
|
[]interface{}{nil, errors.New("Can't return a key store")},
|
|
|
|
[]interface{}{s.shh, nil},
|
2017-12-18 14:08:31 +00:00
|
|
|
addr,
|
2017-12-19 15:45:30 +00:00
|
|
|
s.password,
|
2017-12-18 14:08:31 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"fail_whisperService",
|
2017-12-19 15:45:30 +00:00
|
|
|
[]interface{}{s.keyStore, nil},
|
|
|
|
[]interface{}{nil, errors.New("Can't return a whisper service")},
|
2017-12-18 14:08:31 +00:00
|
|
|
addr,
|
2017-12-19 15:45:30 +00:00
|
|
|
s.password,
|
2017-12-18 14:08:31 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"fail_wrongAddress",
|
2017-12-19 15:45:30 +00:00
|
|
|
[]interface{}{s.keyStore, nil},
|
|
|
|
[]interface{}{s.shh, nil},
|
2017-12-18 14:08:31 +00:00
|
|
|
"wrong-address",
|
2017-12-19 15:45:30 +00:00
|
|
|
s.password,
|
2017-12-18 14:08:31 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"fail_wrongPassword",
|
2017-12-19 15:45:30 +00:00
|
|
|
[]interface{}{s.keyStore, nil},
|
|
|
|
[]interface{}{s.shh, nil},
|
2017-12-18 14:08:31 +00:00
|
|
|
addr,
|
|
|
|
"wrong-password",
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, testCase := range testCases {
|
2017-12-19 13:07:31 +00:00
|
|
|
s.T().Run(testCase.name, func(t *testing.T) {
|
2017-12-19 15:45:30 +00:00
|
|
|
s.reinitMock()
|
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(testCase.accountKeyStoreReturn...).AnyTimes()
|
|
|
|
s.nodeManager.EXPECT().WhisperService().Return(testCase.whisperServiceReturn...).AnyTimes()
|
|
|
|
err = s.accManager.SelectAccount(testCase.address, testCase.password)
|
|
|
|
if testCase.fail {
|
|
|
|
s.Error(err)
|
|
|
|
} else {
|
|
|
|
s.NoError(err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *ManagerTestSuite) TestCreateChildAccount() {
|
|
|
|
s.reinitMock()
|
|
|
|
|
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil)
|
|
|
|
addr, _, _, err := s.accManager.CreateAccount(s.password)
|
|
|
|
s.NoError(err)
|
|
|
|
|
|
|
|
// First, test the negative case where an account is not selected
|
|
|
|
// and an address is not provided.
|
|
|
|
s.accManager.selectedAccount = nil
|
|
|
|
s.T().Run("fail_noAccount", func(t *testing.T) {
|
|
|
|
s.reinitMock()
|
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil).AnyTimes()
|
|
|
|
_, _, err := s.accManager.CreateChildAccount("", s.password)
|
|
|
|
s.Error(err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Now, select the account for rest of the test cases.
|
|
|
|
s.reinitMock()
|
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil).AnyTimes()
|
|
|
|
s.nodeManager.EXPECT().WhisperService().Return(s.shh, nil).AnyTimes()
|
|
|
|
err = s.accManager.SelectAccount(addr, s.password)
|
|
|
|
s.NoError(err)
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
address string
|
|
|
|
password string
|
|
|
|
accountKeyStoreReturn []interface{}
|
|
|
|
fail bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
"success",
|
|
|
|
addr,
|
|
|
|
s.password,
|
|
|
|
[]interface{}{s.keyStore, nil},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"fail_keyStore",
|
|
|
|
addr,
|
|
|
|
s.password,
|
|
|
|
[]interface{}{nil, errors.New("Can't return a key store")},
|
|
|
|
true,
|
|
|
|
},
|
2017-12-19 15:52:13 +00:00
|
|
|
{
|
|
|
|
"fail_wrongAddress",
|
|
|
|
"wrong-address",
|
|
|
|
s.password,
|
|
|
|
[]interface{}{s.keyStore, nil},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"fail_wrongPassword",
|
|
|
|
addr,
|
|
|
|
"wrong-password",
|
|
|
|
[]interface{}{s.keyStore, nil},
|
|
|
|
true,
|
|
|
|
},
|
2017-12-19 15:45:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, testCase := range testCases {
|
|
|
|
s.T().Run(testCase.name, func(t *testing.T) {
|
|
|
|
s.reinitMock()
|
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(testCase.accountKeyStoreReturn...).AnyTimes()
|
|
|
|
childAddr, childPubKey, err := s.accManager.CreateChildAccount(testCase.address, testCase.password)
|
2017-12-18 14:08:31 +00:00
|
|
|
if testCase.fail {
|
2017-12-19 13:07:31 +00:00
|
|
|
s.Error(err)
|
2017-12-18 14:08:31 +00:00
|
|
|
} else {
|
2017-12-19 13:07:31 +00:00
|
|
|
s.NoError(err)
|
2017-12-19 15:45:30 +00:00
|
|
|
s.NotNil(childAddr)
|
|
|
|
s.NotNil(childPubKey)
|
2017-12-18 14:08:31 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2017-12-19 16:11:46 +00:00
|
|
|
|
|
|
|
func (s *ManagerTestSuite) TestSelectedAccount() {
|
|
|
|
s.reinitMock()
|
|
|
|
|
|
|
|
// Create and select an account
|
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil)
|
|
|
|
addr, _, _, err := s.accManager.CreateAccount(s.password)
|
|
|
|
s.NoError(err)
|
|
|
|
s.nodeManager.EXPECT().AccountKeyStore().Return(s.keyStore, nil).AnyTimes()
|
|
|
|
s.nodeManager.EXPECT().WhisperService().Return(s.shh, nil).AnyTimes()
|
|
|
|
err = s.accManager.SelectAccount(addr, s.password)
|
|
|
|
s.NoError(err)
|
|
|
|
|
|
|
|
s.T().Run("success", func(t *testing.T) {
|
|
|
|
acc, err := s.accManager.SelectedAccount()
|
|
|
|
s.NoError(err)
|
|
|
|
s.NotNil(acc)
|
|
|
|
})
|
|
|
|
|
|
|
|
s.accManager.selectedAccount = nil
|
|
|
|
|
|
|
|
s.T().Run("fail", func(t *testing.T) {
|
|
|
|
_, err := s.accManager.SelectedAccount()
|
|
|
|
s.Equal(ErrNoAccountSelected, err)
|
|
|
|
})
|
|
|
|
}
|