100 lines
2.2 KiB
Go
100 lines
2.2 KiB
Go
|
package crypto
|
||
|
|
||
|
import (
|
||
|
"strings"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/stretchr/testify/require"
|
||
|
|
||
|
ethcrypto "github.com/ethereum/go-ethereum/crypto"
|
||
|
|
||
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
||
|
"github.com/cosmos/cosmos-sdk/crypto/keys/hd"
|
||
|
"github.com/cosmos/cosmos-sdk/tests"
|
||
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
||
|
)
|
||
|
|
||
|
func TestEthermintKeygenFunc(t *testing.T) {
|
||
|
privkey, err := GenerateKey()
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
testCases := []struct {
|
||
|
name string
|
||
|
privKey []byte
|
||
|
algo keyring.SigningAlgo
|
||
|
expPass bool
|
||
|
}{
|
||
|
{
|
||
|
"valid ECDSA privKey",
|
||
|
ethcrypto.FromECDSA(privkey.ToECDSA()),
|
||
|
EthSecp256k1,
|
||
|
true,
|
||
|
},
|
||
|
{
|
||
|
"nil bytes, valid algo",
|
||
|
nil,
|
||
|
EthSecp256k1,
|
||
|
true,
|
||
|
},
|
||
|
{
|
||
|
"empty bytes, valid algo",
|
||
|
[]byte{},
|
||
|
EthSecp256k1,
|
||
|
true,
|
||
|
},
|
||
|
{
|
||
|
"invalid algo",
|
||
|
nil,
|
||
|
keyring.MultiAlgo,
|
||
|
false,
|
||
|
},
|
||
|
}
|
||
|
|
||
|
for _, tc := range testCases {
|
||
|
privkey, err := EthermintKeygenFunc(tc.privKey, tc.algo)
|
||
|
if tc.expPass {
|
||
|
require.NoError(t, err, tc.name)
|
||
|
} else {
|
||
|
require.Error(t, err, tc.name)
|
||
|
require.Nil(t, privkey, tc.name)
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestKeyring(t *testing.T) {
|
||
|
dir, cleanup := tests.NewTestCaseDir(t)
|
||
|
mockIn := strings.NewReader("")
|
||
|
t.Cleanup(cleanup)
|
||
|
|
||
|
kr, err := keyring.NewKeyring("ethermint", keyring.BackendTest, dir, mockIn, EthSecp256k1Options()...)
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
// fail in retrieving key
|
||
|
info, err := kr.Get("foo")
|
||
|
require.Error(t, err)
|
||
|
require.Nil(t, info)
|
||
|
|
||
|
mockIn.Reset("password\npassword\n")
|
||
|
info, mnemonic, err := kr.CreateMnemonic("foo", keyring.English, sdk.FullFundraiserPath, EthSecp256k1)
|
||
|
require.NoError(t, err)
|
||
|
require.NotEmpty(t, mnemonic)
|
||
|
require.Equal(t, "foo", info.GetName())
|
||
|
require.Equal(t, "local", info.GetType().String())
|
||
|
require.Equal(t, EthSecp256k1, info.GetAlgo())
|
||
|
|
||
|
params := *hd.NewFundraiserParams(0, sdk.CoinType, 0)
|
||
|
hdPath := params.String()
|
||
|
|
||
|
bz, err := DeriveKey(mnemonic, keyring.DefaultBIP39Passphrase, hdPath, EthSecp256k1)
|
||
|
require.NoError(t, err)
|
||
|
require.NotEmpty(t, bz)
|
||
|
|
||
|
bz, err = DeriveKey(mnemonic, keyring.DefaultBIP39Passphrase, hdPath, keyring.Secp256k1)
|
||
|
require.NoError(t, err)
|
||
|
require.NotEmpty(t, bz)
|
||
|
|
||
|
bz, err = DeriveKey(mnemonic, keyring.DefaultBIP39Passphrase, hdPath, keyring.SigningAlgo(""))
|
||
|
require.Error(t, err)
|
||
|
require.Empty(t, bz)
|
||
|
}
|