aboutsummaryrefslogtreecommitdiffstats
path: root/accounts/accounts_test.go
blob: 4b94b78fd4e03c6f02b33158337821b978191530 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
package accounts

import (
    "io/ioutil"
    "os"
    "testing"
    "time"

    "github.com/ethereum/go-ethereum/crypto"
    "github.com/ethereum/go-ethereum/crypto/randentropy"
)

func TestSign(t *testing.T) {
    dir, ks := tmpKeyStore(t, crypto.NewKeyStorePlain)
    defer os.RemoveAll(dir)

    am := NewManager(ks)
    pass := "" // not used but required by API
    a1, err := am.NewAccount(pass)
    toSign := randentropy.GetEntropyCSPRNG(32)
    am.Unlock(a1.Address, "")

    _, err = am.Sign(a1, toSign)
    if err != nil {
        t.Fatal(err)
    }
}

func TestTimedUnlock(t *testing.T) {
    dir, ks := tmpKeyStore(t, crypto.NewKeyStorePassphrase)
    defer os.RemoveAll(dir)

    am := NewManager(ks)
    pass := "foo"
    a1, err := am.NewAccount(pass)
    toSign := randentropy.GetEntropyCSPRNG(32)

    // Signing without passphrase fails because account is locked
    _, err = am.Sign(a1, toSign)
    if err != ErrLocked {
        t.Fatal("Signing should've failed with ErrLocked before unlocking, got ", err)
    }

    // Signing with passphrase works
    if err = am.TimedUnlock(a1.Address, pass, 100*time.Millisecond); err != nil {
        t.Fatal(err)
    }

    // Signing without passphrase works because account is temp unlocked
    _, err = am.Sign(a1, toSign)
    if err != nil {
        t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
    }

    // Signing fails again after automatic locking
    time.Sleep(150 * time.Millisecond)
    _, err = am.Sign(a1, toSign)
    if err != ErrLocked {
        t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
    }

}

func TestOverrideUnlock(t *testing.T) {
    dir, ks := tmpKeyStore(t, crypto.NewKeyStorePassphrase)
    defer os.RemoveAll(dir)

    am := NewManager(ks)
    pass := "foo"
    a1, err := am.NewAccount(pass)
    toSign := randentropy.GetEntropyCSPRNG(32)

    // Unlock indefinitely
    if err = am.Unlock(a1.Address, pass); err != nil {
        t.Fatal(err)
    }

    // Signing without passphrase works because account is temp unlocked
    _, err = am.Sign(a1, toSign)
    if err != nil {
        t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
    }

    // reset unlock to a shorter period, invalidates the previous unlock
    if err = am.TimedUnlock(a1.Address, pass, 100*time.Millisecond); err != nil {
        t.Fatal(err)
    }

    // Signing without passphrase still works because account is temp unlocked
    _, err = am.Sign(a1, toSign)
    if err != nil {
        t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
    }

    // Signing fails again after automatic locking
    time.Sleep(150 * time.Millisecond)
    _, err = am.Sign(a1, toSign)
    if err != ErrLocked {
        t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
    }
}

//

func tmpKeyStore(t *testing.T, new func(string) crypto.KeyStore) (string, crypto.KeyStore) {
    d, err := ioutil.TempDir("", "eth-keystore-test")
    if err != nil {
        t.Fatal(err)
    }
    return d, new(d)
}