279 lines
7.8 KiB
Go
279 lines
7.8 KiB
Go
package keys
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/tendermint/tendermint/libs/cli"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client"
|
|
"github.com/cosmos/cosmos-sdk/client/flags"
|
|
"github.com/cosmos/cosmos-sdk/crypto/hd"
|
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
|
"github.com/cosmos/cosmos-sdk/simapp"
|
|
"github.com/cosmos/cosmos-sdk/testutil"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
"github.com/cosmos/go-bip39"
|
|
)
|
|
|
|
func Test_runAddCmdBasic(t *testing.T) {
|
|
cmd := AddKeyCommand()
|
|
cmd.Flags().AddFlagSet(Commands("home").PersistentFlags())
|
|
|
|
mockIn := testutil.ApplyMockIODiscardOutErr(cmd)
|
|
kbHome := t.TempDir()
|
|
|
|
cdc := simapp.MakeTestEncodingConfig().Codec
|
|
|
|
kb, err := keyring.New(sdk.KeyringServiceName(), keyring.BackendTest, kbHome, mockIn, cdc)
|
|
require.NoError(t, err)
|
|
|
|
clientCtx := client.Context{}.WithKeyringDir(kbHome).WithInput(mockIn).WithCodec(cdc)
|
|
ctx := context.WithValue(context.Background(), client.ClientContextKey, &clientCtx)
|
|
|
|
t.Cleanup(func() {
|
|
_ = kb.Delete("keyname1")
|
|
_ = kb.Delete("keyname2")
|
|
})
|
|
|
|
cmd.SetArgs([]string{
|
|
"keyname1",
|
|
fmt.Sprintf("--%s=%s", flags.FlagHome, kbHome),
|
|
fmt.Sprintf("--%s=%s", cli.OutputFlag, OutputFormatText),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyAlgorithm, string(hd.Secp256k1Type)),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyringBackend, keyring.BackendTest),
|
|
})
|
|
mockIn.Reset("y\n")
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
|
|
mockIn.Reset("N\n")
|
|
require.Error(t, cmd.ExecuteContext(ctx))
|
|
|
|
cmd.SetArgs([]string{
|
|
"keyname2",
|
|
fmt.Sprintf("--%s=%s", flags.FlagHome, kbHome),
|
|
fmt.Sprintf("--%s=%s", cli.OutputFlag, OutputFormatText),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyAlgorithm, string(hd.Secp256k1Type)),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyringBackend, keyring.BackendTest),
|
|
})
|
|
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
require.Error(t, cmd.ExecuteContext(ctx))
|
|
|
|
mockIn.Reset("y\n")
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
|
|
cmd.SetArgs([]string{
|
|
"keyname4",
|
|
fmt.Sprintf("--%s=%s", flags.FlagHome, kbHome),
|
|
fmt.Sprintf("--%s=%s", cli.OutputFlag, OutputFormatText),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyAlgorithm, string(hd.Secp256k1Type)),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyringBackend, keyring.BackendTest),
|
|
})
|
|
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
require.Error(t, cmd.ExecuteContext(ctx))
|
|
|
|
cmd.SetArgs([]string{
|
|
"keyname5",
|
|
fmt.Sprintf("--%s=%s", flags.FlagHome, kbHome),
|
|
fmt.Sprintf("--%s=true", flags.FlagDryRun),
|
|
fmt.Sprintf("--%s=%s", cli.OutputFlag, OutputFormatText),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyAlgorithm, string(hd.Secp256k1Type)),
|
|
})
|
|
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
|
|
// In recovery mode
|
|
cmd.SetArgs([]string{
|
|
"keyname6",
|
|
fmt.Sprintf("--%s=true", flagRecover),
|
|
})
|
|
|
|
// use valid mnemonic and complete recovery key generation successfully
|
|
mockIn.Reset("decide praise business actor peasant farm drastic weather extend front hurt later song give verb rhythm worry fun pond reform school tumble august one\n")
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
|
|
// use invalid mnemonic and fail recovery key generation
|
|
mockIn.Reset("invalid mnemonic\n")
|
|
require.Error(t, cmd.ExecuteContext(ctx))
|
|
|
|
// In interactive mode
|
|
cmd.SetArgs([]string{
|
|
"keyname7",
|
|
"-i",
|
|
fmt.Sprintf("--%s=false", flagRecover),
|
|
})
|
|
|
|
const password = "password1!"
|
|
|
|
// set password and complete interactive key generation successfully
|
|
mockIn.Reset("\n" + password + "\n" + password + "\n")
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
|
|
// passwords don't match and fail interactive key generation
|
|
mockIn.Reset("\n" + password + "\n" + "fail" + "\n")
|
|
require.Error(t, cmd.ExecuteContext(ctx))
|
|
}
|
|
|
|
func Test_runAddCmdDryRun(t *testing.T) {
|
|
pubkey1 := `{"@type":"/cosmos.crypto.secp256k1.PubKey","key":"AtObiFVE4s+9+RX5SP8TN9r2mxpoaT4eGj9CJfK7VRzN"}`
|
|
pubkey2 := `{"@type":"/cosmos.crypto.secp256k1.PubKey","key":"A/se1vkqgdQ7VJQCM4mxN+L+ciGhnnJ4XYsQCRBMrdRi"}`
|
|
cdc := simapp.MakeTestEncodingConfig().Codec
|
|
|
|
testData := []struct {
|
|
name string
|
|
args []string
|
|
added bool
|
|
}{
|
|
{
|
|
name: "account is added",
|
|
args: []string{
|
|
"testkey",
|
|
fmt.Sprintf("--%s=%s", flags.FlagDryRun, "false"),
|
|
},
|
|
added: true,
|
|
},
|
|
{
|
|
name: "account is not added with dry run",
|
|
args: []string{
|
|
"testkey",
|
|
fmt.Sprintf("--%s=%s", flags.FlagDryRun, "true"),
|
|
},
|
|
added: false,
|
|
},
|
|
{
|
|
name: "multisig account is added",
|
|
args: []string{
|
|
"testkey",
|
|
fmt.Sprintf("--%s=%s", flags.FlagDryRun, "false"),
|
|
fmt.Sprintf("--%s=%s", flagMultisig, "subkey"),
|
|
},
|
|
added: true,
|
|
},
|
|
{
|
|
name: "multisig account is not added with dry run",
|
|
args: []string{
|
|
"testkey",
|
|
fmt.Sprintf("--%s=%s", flags.FlagDryRun, "true"),
|
|
fmt.Sprintf("--%s=%s", flagMultisig, "subkey"),
|
|
},
|
|
added: false,
|
|
},
|
|
{
|
|
name: "pubkey account is added",
|
|
args: []string{
|
|
"testkey",
|
|
fmt.Sprintf("--%s=%s", flags.FlagDryRun, "false"),
|
|
fmt.Sprintf("--%s=%s", FlagPublicKey, pubkey1),
|
|
},
|
|
added: true,
|
|
},
|
|
{
|
|
name: "pubkey account is not added with dry run",
|
|
args: []string{
|
|
"testkey",
|
|
fmt.Sprintf("--%s=%s", flags.FlagDryRun, "true"),
|
|
fmt.Sprintf("--%s=%s", FlagPublicKey, pubkey2),
|
|
},
|
|
added: false,
|
|
},
|
|
}
|
|
for _, tt := range testData {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
cmd := AddKeyCommand()
|
|
cmd.Flags().AddFlagSet(Commands("home").PersistentFlags())
|
|
|
|
kbHome := t.TempDir()
|
|
mockIn := testutil.ApplyMockIODiscardOutErr(cmd)
|
|
|
|
kb, err := keyring.New(sdk.KeyringServiceName(), keyring.BackendTest, kbHome, mockIn, cdc)
|
|
require.NoError(t, err)
|
|
|
|
clientCtx := client.Context{}.
|
|
WithCodec(cdc).
|
|
WithKeyringDir(kbHome).
|
|
WithKeyring(kb)
|
|
ctx := context.WithValue(context.Background(), client.ClientContextKey, &clientCtx)
|
|
|
|
path := sdk.GetConfig().GetFullBIP44Path()
|
|
_, err = kb.NewAccount("subkey", testutil.TestMnemonic, "", path, hd.Secp256k1)
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(func() {
|
|
_ = kb.Delete("subkey")
|
|
})
|
|
|
|
b := bytes.NewBufferString("")
|
|
cmd.SetOut(b)
|
|
|
|
cmd.SetArgs(tt.args)
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
|
|
if tt.added {
|
|
_, err := kb.Key("testkey")
|
|
require.NoError(t, err)
|
|
|
|
out, err := io.ReadAll(b)
|
|
require.NoError(t, err)
|
|
require.Contains(t, string(out), "name: testkey")
|
|
} else {
|
|
_, err = kb.Key("testkey")
|
|
require.Error(t, err)
|
|
require.Equal(t, "testkey: key not found", err.Error())
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestAddRecoverFileBackend(t *testing.T) {
|
|
cmd := AddKeyCommand()
|
|
cmd.Flags().AddFlagSet(Commands("home").PersistentFlags())
|
|
cdc := simapp.MakeTestEncodingConfig().Codec
|
|
|
|
mockIn := testutil.ApplyMockIODiscardOutErr(cmd)
|
|
kbHome := t.TempDir()
|
|
|
|
clientCtx := client.Context{}.WithKeyringDir(kbHome).WithInput(mockIn).WithCodec(cdc)
|
|
ctx := context.WithValue(context.Background(), client.ClientContextKey, &clientCtx)
|
|
|
|
cmd.SetArgs([]string{
|
|
"keyname1",
|
|
fmt.Sprintf("--%s=%s", flags.FlagHome, kbHome),
|
|
fmt.Sprintf("--%s=%s", cli.OutputFlag, OutputFormatText),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyAlgorithm, string(hd.Secp256k1Type)),
|
|
fmt.Sprintf("--%s=%s", flags.FlagKeyringBackend, keyring.BackendFile),
|
|
fmt.Sprintf("--%s", flagRecover),
|
|
})
|
|
|
|
keyringPassword := "12345678"
|
|
|
|
entropySeed, err := bip39.NewEntropy(mnemonicEntropySize)
|
|
require.NoError(t, err)
|
|
|
|
mnemonic, err := bip39.NewMnemonic(entropySeed)
|
|
require.NoError(t, err)
|
|
|
|
mockIn.Reset(fmt.Sprintf("%s\n%s\n%s\n", mnemonic, keyringPassword, keyringPassword))
|
|
require.NoError(t, cmd.ExecuteContext(ctx))
|
|
|
|
kb, err := keyring.New(sdk.KeyringServiceName(), keyring.BackendFile, kbHome, mockIn, cdc)
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(func() {
|
|
mockIn.Reset(fmt.Sprintf("%s\n%s\n", keyringPassword, keyringPassword))
|
|
_ = kb.Delete("keyname1")
|
|
})
|
|
|
|
mockIn.Reset(fmt.Sprintf("%s\n%s\n", keyringPassword, keyringPassword))
|
|
k, err := kb.Key("keyname1")
|
|
require.NoError(t, err)
|
|
require.Equal(t, "keyname1", k.Name)
|
|
}
|