164 lines
5.2 KiB
Go
164 lines
5.2 KiB
Go
package auth
|
|
|
|
import (
|
|
"testing"
|
|
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
"github.com/stretchr/testify/assert"
|
|
abci "github.com/tendermint/abci/types"
|
|
crypto "github.com/tendermint/go-crypto"
|
|
)
|
|
|
|
// msg type for testing
|
|
type testMsg struct {
|
|
signBytes []byte
|
|
signers []sdk.Address
|
|
}
|
|
|
|
func newTestMsg(addrs ...sdk.Address) *testMsg {
|
|
return &testMsg{
|
|
signBytes: []byte("some sign bytes"),
|
|
signers: addrs,
|
|
}
|
|
}
|
|
|
|
func (msg *testMsg) Type() string { return "testMsg" }
|
|
func (msg *testMsg) Get(key interface{}) (value interface{}) { return nil }
|
|
func (msg *testMsg) GetSignBytes() []byte {
|
|
return msg.signBytes
|
|
}
|
|
func (msg *testMsg) ValidateBasic() sdk.Error { return nil }
|
|
func (msg *testMsg) GetSigners() []sdk.Address {
|
|
return msg.signers
|
|
}
|
|
|
|
// generate a priv key and return it with its address
|
|
func privAndAddr() (crypto.PrivKey, sdk.Address) {
|
|
priv := crypto.GenPrivKeyEd25519()
|
|
addr := priv.PubKey().Address()
|
|
return priv.Wrap(), addr
|
|
}
|
|
|
|
// run the tx through the anteHandler and ensure its valid
|
|
func checkValidTx(t *testing.T, anteHandler sdk.AnteHandler, ctx sdk.Context, tx sdk.Tx) {
|
|
_, result, abort := anteHandler(ctx, tx)
|
|
assert.False(t, abort)
|
|
assert.Equal(t, sdk.CodeOK, result.Code)
|
|
assert.True(t, result.IsOK())
|
|
}
|
|
|
|
// run the tx through the anteHandler and ensure it fails with the given code
|
|
func checkInvalidTx(t *testing.T, anteHandler sdk.AnteHandler, ctx sdk.Context, tx sdk.Tx, code sdk.CodeType) {
|
|
_, result, abort := anteHandler(ctx, tx)
|
|
assert.True(t, abort)
|
|
assert.Equal(t, code, result.Code)
|
|
}
|
|
|
|
func newTestTx(ctx sdk.Context, msg sdk.Msg, privs []crypto.PrivKey, seqs []int64) sdk.Tx {
|
|
signBytes := sdk.StdSignBytes(ctx.ChainID(), seqs, msg)
|
|
sigs := make([]sdk.StdSignature, len(privs))
|
|
for i, priv := range privs {
|
|
sigs[i] = sdk.StdSignature{PubKey: priv.PubKey(), Signature: priv.Sign(signBytes), Sequence: seqs[i]}
|
|
}
|
|
return sdk.NewStdTx(msg, sigs)
|
|
}
|
|
|
|
// Test various error cases in the AnteHandler control flow.
|
|
func TestAnteHandlerSigErrors(t *testing.T) {
|
|
// setup
|
|
ms, capKey := setupMultiStore()
|
|
mapper := NewAccountMapper(capKey, &BaseAccount{})
|
|
anteHandler := NewAnteHandler(mapper)
|
|
ctx := sdk.NewContext(ms, abci.Header{ChainID: "mychainid"}, false, nil)
|
|
|
|
// keys and addresses
|
|
priv1, addr1 := privAndAddr()
|
|
priv2, addr2 := privAndAddr()
|
|
|
|
// msg and signatures
|
|
var tx sdk.Tx
|
|
msg := newTestMsg(addr1, addr2)
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv1, priv2}, []int64{0, 0})
|
|
|
|
// test no signatures
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{}, []int64{})
|
|
checkInvalidTx(t, anteHandler, ctx, tx, sdk.CodeUnauthorized)
|
|
|
|
// test num sigs dont match GetSigners
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv1}, []int64{0})
|
|
checkInvalidTx(t, anteHandler, ctx, tx, sdk.CodeUnauthorized)
|
|
|
|
// test an unrecognized account
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv1, priv2}, []int64{0, 0})
|
|
checkInvalidTx(t, anteHandler, ctx, tx, sdk.CodeUnrecognizedAddress)
|
|
|
|
// save the first account, but second is still unrecognized
|
|
acc1 := mapper.NewAccountWithAddress(ctx, addr1)
|
|
mapper.SetAccount(ctx, acc1)
|
|
checkInvalidTx(t, anteHandler, ctx, tx, sdk.CodeUnrecognizedAddress)
|
|
}
|
|
|
|
// Test logic around sequence checking with one signer and many signers.
|
|
func TestAnteHandlerSequences(t *testing.T) {
|
|
// setup
|
|
ms, capKey := setupMultiStore()
|
|
mapper := NewAccountMapper(capKey, &BaseAccount{})
|
|
anteHandler := NewAnteHandler(mapper)
|
|
ctx := sdk.NewContext(ms, abci.Header{ChainID: "mychainid"}, false, nil)
|
|
|
|
// keys and addresses
|
|
priv1, addr1 := privAndAddr()
|
|
priv2, addr2 := privAndAddr()
|
|
|
|
// set the accounts
|
|
acc1 := mapper.NewAccountWithAddress(ctx, addr1)
|
|
mapper.SetAccount(ctx, acc1)
|
|
acc2 := mapper.NewAccountWithAddress(ctx, addr2)
|
|
mapper.SetAccount(ctx, acc2)
|
|
|
|
// msg and signatures
|
|
var tx sdk.Tx
|
|
msg := newTestMsg(addr1)
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv1}, []int64{0})
|
|
|
|
// test good tx from one signer
|
|
checkValidTx(t, anteHandler, ctx, tx)
|
|
|
|
// test sending it again fails (replay protection)
|
|
checkInvalidTx(t, anteHandler, ctx, tx, sdk.CodeInvalidSequence)
|
|
|
|
// fix sequence, should pass
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv1}, []int64{1})
|
|
checkValidTx(t, anteHandler, ctx, tx)
|
|
|
|
// new tx with another signer and correct sequences
|
|
msg = newTestMsg(addr1, addr2)
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv1, priv2}, []int64{2, 0})
|
|
checkValidTx(t, anteHandler, ctx, tx)
|
|
|
|
// replay fails
|
|
checkInvalidTx(t, anteHandler, ctx, tx, sdk.CodeInvalidSequence)
|
|
|
|
// tx from just second signer with incorrect sequence fails
|
|
msg = newTestMsg(addr2)
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv2}, []int64{0})
|
|
checkInvalidTx(t, anteHandler, ctx, tx, sdk.CodeInvalidSequence)
|
|
|
|
// fix the sequence and it passes
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv2}, []int64{1})
|
|
checkValidTx(t, anteHandler, ctx, tx)
|
|
|
|
// another tx from both of them that passes
|
|
msg = newTestMsg(addr1, addr2)
|
|
tx = newTestTx(ctx, msg, []crypto.PrivKey{priv1, priv2}, []int64{3, 2})
|
|
checkValidTx(t, anteHandler, ctx, tx)
|
|
}
|
|
|
|
func TestAnteHandlerBadSignBytes(t *testing.T) {
|
|
// TODO: test various cases of bad sign bytes
|
|
}
|
|
|
|
func TestAnteHandlerSetPubKey(t *testing.T) {
|
|
// TODO: test cases where pubkey is already set on the account
|
|
}
|