| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127 |
- // Copyright 2015 The go-ethereum Authors
- // This file is part of go-ethereum.
- //
- // go-ethereum is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Lesser General Public License as published by
- // the Free Software Foundation, either version 3 of the License, or
- // (at your option) any later version.
- //
- // go-ethereum is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Lesser General Public License for more details.
- //
- // You should have received a copy of the GNU Lesser General Public License
- // along with go-ethereum. If not, see <http://www.gnu.org/licenses/>.
- package accounts
- import (
- "io/ioutil"
- "os"
- "testing"
- "time"
- "github.com/ethereum/go-ethereum/crypto"
- "github.com/ethereum/go-ethereum/crypto/randentropy"
- )
- func TestSign(t *testing.T) {
- dir, ks := tmpKeyStore(t, crypto.NewKeyStorePlain)
- defer os.RemoveAll(dir)
- am := NewManager(ks)
- pass := "" // not used but required by API
- a1, err := am.NewAccount(pass)
- toSign := randentropy.GetEntropyCSPRNG(32)
- am.Unlock(a1.Address, "")
- _, err = am.Sign(a1, toSign)
- if err != nil {
- t.Fatal(err)
- }
- }
- func TestTimedUnlock(t *testing.T) {
- dir, ks := tmpKeyStore(t, crypto.NewKeyStorePassphrase)
- defer os.RemoveAll(dir)
- am := NewManager(ks)
- pass := "foo"
- a1, err := am.NewAccount(pass)
- toSign := randentropy.GetEntropyCSPRNG(32)
- // Signing without passphrase fails because account is locked
- _, err = am.Sign(a1, toSign)
- if err != ErrLocked {
- t.Fatal("Signing should've failed with ErrLocked before unlocking, got ", err)
- }
- // Signing with passphrase works
- if err = am.TimedUnlock(a1.Address, pass, 100*time.Millisecond); err != nil {
- t.Fatal(err)
- }
- // Signing without passphrase works because account is temp unlocked
- _, err = am.Sign(a1, toSign)
- if err != nil {
- t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
- }
- // Signing fails again after automatic locking
- time.Sleep(150 * time.Millisecond)
- _, err = am.Sign(a1, toSign)
- if err != ErrLocked {
- t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
- }
- }
- func TestOverrideUnlock(t *testing.T) {
- dir, ks := tmpKeyStore(t, crypto.NewKeyStorePassphrase)
- defer os.RemoveAll(dir)
- am := NewManager(ks)
- pass := "foo"
- a1, err := am.NewAccount(pass)
- toSign := randentropy.GetEntropyCSPRNG(32)
- // Unlock indefinitely
- if err = am.Unlock(a1.Address, pass); err != nil {
- t.Fatal(err)
- }
- // Signing without passphrase works because account is temp unlocked
- _, err = am.Sign(a1, toSign)
- if err != nil {
- t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
- }
- // reset unlock to a shorter period, invalidates the previous unlock
- if err = am.TimedUnlock(a1.Address, pass, 100*time.Millisecond); err != nil {
- t.Fatal(err)
- }
- // Signing without passphrase still works because account is temp unlocked
- _, err = am.Sign(a1, toSign)
- if err != nil {
- t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
- }
- // Signing fails again after automatic locking
- time.Sleep(150 * time.Millisecond)
- _, err = am.Sign(a1, toSign)
- if err != ErrLocked {
- t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
- }
- }
- //
- func tmpKeyStore(t *testing.T, new func(string) crypto.KeyStore) (string, crypto.KeyStore) {
- d, err := ioutil.TempDir("", "eth-keystore-test")
- if err != nil {
- t.Fatal(err)
- }
- return d, new(d)
- }
|