forked from cerc-io/plugeth
8d066f1f42
This commit replaces ioutil.TempDir with t.TempDir in tests. The directory created by t.TempDir is automatically removed when the test and all its subtests complete. Prior to this commit, temporary directory created using ioutil.TempDir had to be removed manually by calling os.RemoveAll, which is omitted in some tests. The error handling boilerplate e.g. defer func() { if err := os.RemoveAll(dir); err != nil { t.Fatal(err) } } is also tedious, but t.TempDir handles this for us nicely. Reference: https://pkg.go.dev/testing#T.TempDir Signed-off-by: Eng Zer Jun <engzerjun@gmail.com>
336 lines
12 KiB
Go
336 lines
12 KiB
Go
// Copyright 2016 The go-ethereum Authors
|
|
// This file is part of go-ethereum.
|
|
//
|
|
// go-ethereum is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// go-ethereum is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with go-ethereum. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package main
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/cespare/cp"
|
|
)
|
|
|
|
// These tests are 'smoke tests' for the account related
|
|
// subcommands and flags.
|
|
//
|
|
// For most tests, the test files from package accounts
|
|
// are copied into a temporary keystore directory.
|
|
|
|
func tmpDatadirWithKeystore(t *testing.T) string {
|
|
datadir := t.TempDir()
|
|
keystore := filepath.Join(datadir, "keystore")
|
|
source := filepath.Join("..", "..", "accounts", "keystore", "testdata", "keystore")
|
|
if err := cp.CopyAll(keystore, source); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
return datadir
|
|
}
|
|
|
|
func TestAccountListEmpty(t *testing.T) {
|
|
geth := runGeth(t, "account", "list")
|
|
geth.ExpectExit()
|
|
}
|
|
|
|
func TestAccountList(t *testing.T) {
|
|
datadir := tmpDatadirWithKeystore(t)
|
|
geth := runGeth(t, "account", "list", "--datadir", datadir)
|
|
defer geth.ExpectExit()
|
|
if runtime.GOOS == "windows" {
|
|
geth.Expect(`
|
|
Account #0: {7ef5a6135f1fd6a02593eedc869c6d41d934aef8} keystore://{{.Datadir}}\keystore\UTC--2016-03-22T12-57-55.920751759Z--7ef5a6135f1fd6a02593eedc869c6d41d934aef8
|
|
Account #1: {f466859ead1932d743d622cb74fc058882e8648a} keystore://{{.Datadir}}\keystore\aaa
|
|
Account #2: {289d485d9771714cce91d3393d764e1311907acc} keystore://{{.Datadir}}\keystore\zzz
|
|
`)
|
|
} else {
|
|
geth.Expect(`
|
|
Account #0: {7ef5a6135f1fd6a02593eedc869c6d41d934aef8} keystore://{{.Datadir}}/keystore/UTC--2016-03-22T12-57-55.920751759Z--7ef5a6135f1fd6a02593eedc869c6d41d934aef8
|
|
Account #1: {f466859ead1932d743d622cb74fc058882e8648a} keystore://{{.Datadir}}/keystore/aaa
|
|
Account #2: {289d485d9771714cce91d3393d764e1311907acc} keystore://{{.Datadir}}/keystore/zzz
|
|
`)
|
|
}
|
|
}
|
|
|
|
func TestAccountNew(t *testing.T) {
|
|
geth := runGeth(t, "account", "new", "--lightkdf")
|
|
defer geth.ExpectExit()
|
|
geth.Expect(`
|
|
Your new account is locked with a password. Please give a password. Do not forget this password.
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "foobar"}}
|
|
Repeat password: {{.InputLine "foobar"}}
|
|
|
|
Your new key was generated
|
|
`)
|
|
geth.ExpectRegexp(`
|
|
Public address of the key: 0x[0-9a-fA-F]{40}
|
|
Path of the secret key file: .*UTC--.+--[0-9a-f]{40}
|
|
|
|
- You can share your public address with anyone. Others need it to interact with you.
|
|
- You must NEVER share the secret key with anyone! The key controls access to your funds!
|
|
- You must BACKUP your key file! Without the key, it's impossible to access account funds!
|
|
- You must REMEMBER your password! Without the password, it's impossible to decrypt the key!
|
|
`)
|
|
}
|
|
|
|
func TestAccountImport(t *testing.T) {
|
|
tests := []struct{ name, key, output string }{
|
|
{
|
|
name: "correct account",
|
|
key: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef",
|
|
output: "Address: {fcad0b19bb29d4674531d6f115237e16afce377c}\n",
|
|
},
|
|
{
|
|
name: "invalid character",
|
|
key: "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef1",
|
|
output: "Fatal: Failed to load the private key: invalid character '1' at end of key file\n",
|
|
},
|
|
}
|
|
for _, test := range tests {
|
|
test := test
|
|
t.Run(test.name, func(t *testing.T) {
|
|
t.Parallel()
|
|
importAccountWithExpect(t, test.key, test.output)
|
|
})
|
|
}
|
|
}
|
|
|
|
func importAccountWithExpect(t *testing.T, key string, expected string) {
|
|
dir := t.TempDir()
|
|
keyfile := filepath.Join(dir, "key.prv")
|
|
if err := ioutil.WriteFile(keyfile, []byte(key), 0600); err != nil {
|
|
t.Error(err)
|
|
}
|
|
passwordFile := filepath.Join(dir, "password.txt")
|
|
if err := ioutil.WriteFile(passwordFile, []byte("foobar"), 0600); err != nil {
|
|
t.Error(err)
|
|
}
|
|
geth := runGeth(t, "--lightkdf", "account", "import", keyfile, "-password", passwordFile)
|
|
defer geth.ExpectExit()
|
|
geth.Expect(expected)
|
|
}
|
|
|
|
func TestAccountNewBadRepeat(t *testing.T) {
|
|
geth := runGeth(t, "account", "new", "--lightkdf")
|
|
defer geth.ExpectExit()
|
|
geth.Expect(`
|
|
Your new account is locked with a password. Please give a password. Do not forget this password.
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "something"}}
|
|
Repeat password: {{.InputLine "something else"}}
|
|
Fatal: Passwords do not match
|
|
`)
|
|
}
|
|
|
|
func TestAccountUpdate(t *testing.T) {
|
|
datadir := tmpDatadirWithKeystore(t)
|
|
geth := runGeth(t, "account", "update",
|
|
"--datadir", datadir, "--lightkdf",
|
|
"f466859ead1932d743d622cb74fc058882e8648a")
|
|
defer geth.ExpectExit()
|
|
geth.Expect(`
|
|
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "foobar"}}
|
|
Please give a new password. Do not forget this password.
|
|
Password: {{.InputLine "foobar2"}}
|
|
Repeat password: {{.InputLine "foobar2"}}
|
|
`)
|
|
}
|
|
|
|
func TestWalletImport(t *testing.T) {
|
|
geth := runGeth(t, "wallet", "import", "--lightkdf", "testdata/guswallet.json")
|
|
defer geth.ExpectExit()
|
|
geth.Expect(`
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "foo"}}
|
|
Address: {d4584b5f6229b7be90727b0fc8c6b91bb427821f}
|
|
`)
|
|
|
|
files, err := ioutil.ReadDir(filepath.Join(geth.Datadir, "keystore"))
|
|
if len(files) != 1 {
|
|
t.Errorf("expected one key file in keystore directory, found %d files (error: %v)", len(files), err)
|
|
}
|
|
}
|
|
|
|
func TestWalletImportBadPassword(t *testing.T) {
|
|
geth := runGeth(t, "wallet", "import", "--lightkdf", "testdata/guswallet.json")
|
|
defer geth.ExpectExit()
|
|
geth.Expect(`
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "wrong"}}
|
|
Fatal: could not decrypt key with given password
|
|
`)
|
|
}
|
|
|
|
func TestUnlockFlag(t *testing.T) {
|
|
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "js", "testdata/empty.js")
|
|
geth.Expect(`
|
|
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "foobar"}}
|
|
`)
|
|
geth.ExpectExit()
|
|
|
|
wantMessages := []string{
|
|
"Unlocked account",
|
|
"=0xf466859eAD1932D743d622CB74FC058882E8648A",
|
|
}
|
|
for _, m := range wantMessages {
|
|
if !strings.Contains(geth.StderrText(), m) {
|
|
t.Errorf("stderr text does not contain %q", m)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestUnlockFlagWrongPassword(t *testing.T) {
|
|
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "js", "testdata/empty.js")
|
|
|
|
defer geth.ExpectExit()
|
|
geth.Expect(`
|
|
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "wrong1"}}
|
|
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 2/3
|
|
Password: {{.InputLine "wrong2"}}
|
|
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 3/3
|
|
Password: {{.InputLine "wrong3"}}
|
|
Fatal: Failed to unlock account f466859ead1932d743d622cb74fc058882e8648a (could not decrypt key with given password)
|
|
`)
|
|
}
|
|
|
|
// https://github.com/ethereum/go-ethereum/issues/1785
|
|
func TestUnlockFlagMultiIndex(t *testing.T) {
|
|
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--unlock", "0,2", "js", "testdata/empty.js")
|
|
|
|
geth.Expect(`
|
|
Unlocking account 0 | Attempt 1/3
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "foobar"}}
|
|
Unlocking account 2 | Attempt 1/3
|
|
Password: {{.InputLine "foobar"}}
|
|
`)
|
|
geth.ExpectExit()
|
|
|
|
wantMessages := []string{
|
|
"Unlocked account",
|
|
"=0x7EF5A6135f1FD6a02593eEdC869c6D41D934aef8",
|
|
"=0x289d485D9771714CCe91D3393D764E1311907ACc",
|
|
}
|
|
for _, m := range wantMessages {
|
|
if !strings.Contains(geth.StderrText(), m) {
|
|
t.Errorf("stderr text does not contain %q", m)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestUnlockFlagPasswordFile(t *testing.T) {
|
|
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--password", "testdata/passwords.txt", "--unlock", "0,2", "js", "testdata/empty.js")
|
|
|
|
geth.ExpectExit()
|
|
|
|
wantMessages := []string{
|
|
"Unlocked account",
|
|
"=0x7EF5A6135f1FD6a02593eEdC869c6D41D934aef8",
|
|
"=0x289d485D9771714CCe91D3393D764E1311907ACc",
|
|
}
|
|
for _, m := range wantMessages {
|
|
if !strings.Contains(geth.StderrText(), m) {
|
|
t.Errorf("stderr text does not contain %q", m)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestUnlockFlagPasswordFileWrongPassword(t *testing.T) {
|
|
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--password",
|
|
"testdata/wrong-passwords.txt", "--unlock", "0,2")
|
|
defer geth.ExpectExit()
|
|
geth.Expect(`
|
|
Fatal: Failed to unlock account 0 (could not decrypt key with given password)
|
|
`)
|
|
}
|
|
|
|
func TestUnlockFlagAmbiguous(t *testing.T) {
|
|
store := filepath.Join("..", "..", "accounts", "keystore", "testdata", "dupes")
|
|
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--keystore",
|
|
store, "--unlock", "f466859ead1932d743d622cb74fc058882e8648a",
|
|
"js", "testdata/empty.js")
|
|
defer geth.ExpectExit()
|
|
|
|
// Helper for the expect template, returns absolute keystore path.
|
|
geth.SetTemplateFunc("keypath", func(file string) string {
|
|
abs, _ := filepath.Abs(filepath.Join(store, file))
|
|
return abs
|
|
})
|
|
geth.Expect(`
|
|
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "foobar"}}
|
|
Multiple key files exist for address f466859ead1932d743d622cb74fc058882e8648a:
|
|
keystore://{{keypath "1"}}
|
|
keystore://{{keypath "2"}}
|
|
Testing your password against all of them...
|
|
Your password unlocked keystore://{{keypath "1"}}
|
|
In order to avoid this warning, you need to remove the following duplicate key files:
|
|
keystore://{{keypath "2"}}
|
|
`)
|
|
geth.ExpectExit()
|
|
|
|
wantMessages := []string{
|
|
"Unlocked account",
|
|
"=0xf466859eAD1932D743d622CB74FC058882E8648A",
|
|
}
|
|
for _, m := range wantMessages {
|
|
if !strings.Contains(geth.StderrText(), m) {
|
|
t.Errorf("stderr text does not contain %q", m)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestUnlockFlagAmbiguousWrongPassword(t *testing.T) {
|
|
store := filepath.Join("..", "..", "accounts", "keystore", "testdata", "dupes")
|
|
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--keystore",
|
|
store, "--unlock", "f466859ead1932d743d622cb74fc058882e8648a")
|
|
|
|
defer geth.ExpectExit()
|
|
|
|
// Helper for the expect template, returns absolute keystore path.
|
|
geth.SetTemplateFunc("keypath", func(file string) string {
|
|
abs, _ := filepath.Abs(filepath.Join(store, file))
|
|
return abs
|
|
})
|
|
geth.Expect(`
|
|
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
!! Unsupported terminal, password will be echoed.
|
|
Password: {{.InputLine "wrong"}}
|
|
Multiple key files exist for address f466859ead1932d743d622cb74fc058882e8648a:
|
|
keystore://{{keypath "1"}}
|
|
keystore://{{keypath "2"}}
|
|
Testing your password against all of them...
|
|
Fatal: None of the listed files could be unlocked.
|
|
`)
|
|
geth.ExpectExit()
|
|
}
|