accounts_test.go 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. package accounts
  2. import (
  3. "io/ioutil"
  4. "os"
  5. "testing"
  6. "time"
  7. "github.com/ethereum/go-ethereum/crypto"
  8. "github.com/ethereum/go-ethereum/crypto/randentropy"
  9. )
  10. func TestSign(t *testing.T) {
  11. dir, ks := tmpKeyStore(t, crypto.NewKeyStorePlain)
  12. defer os.RemoveAll(dir)
  13. am := NewManager(ks)
  14. pass := "" // not used but required by API
  15. a1, err := am.NewAccount(pass)
  16. toSign := randentropy.GetEntropyCSPRNG(32)
  17. am.Unlock(a1.Address, "")
  18. _, err = am.Sign(a1, toSign)
  19. if err != nil {
  20. t.Fatal(err)
  21. }
  22. }
  23. func TestTimedUnlock(t *testing.T) {
  24. dir, ks := tmpKeyStore(t, crypto.NewKeyStorePassphrase)
  25. defer os.RemoveAll(dir)
  26. am := NewManager(ks)
  27. pass := "foo"
  28. a1, err := am.NewAccount(pass)
  29. toSign := randentropy.GetEntropyCSPRNG(32)
  30. // Signing without passphrase fails because account is locked
  31. _, err = am.Sign(a1, toSign)
  32. if err != ErrLocked {
  33. t.Fatal("Signing should've failed with ErrLocked before unlocking, got ", err)
  34. }
  35. // Signing with passphrase works
  36. if err = am.TimedUnlock(a1.Address, pass, 100*time.Millisecond); err != nil {
  37. t.Fatal(err)
  38. }
  39. // Signing without passphrase works because account is temp unlocked
  40. _, err = am.Sign(a1, toSign)
  41. if err != nil {
  42. t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
  43. }
  44. // Signing fails again after automatic locking
  45. time.Sleep(150 * time.Millisecond)
  46. _, err = am.Sign(a1, toSign)
  47. if err != ErrLocked {
  48. t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
  49. }
  50. }
  51. func TestOverrideUnlock(t *testing.T) {
  52. dir, ks := tmpKeyStore(t, crypto.NewKeyStorePassphrase)
  53. defer os.RemoveAll(dir)
  54. am := NewManager(ks)
  55. pass := "foo"
  56. a1, err := am.NewAccount(pass)
  57. toSign := randentropy.GetEntropyCSPRNG(32)
  58. // Unlock indefinitely
  59. if err = am.Unlock(a1.Address, pass); err != nil {
  60. t.Fatal(err)
  61. }
  62. // Signing without passphrase works because account is temp unlocked
  63. _, err = am.Sign(a1, toSign)
  64. if err != nil {
  65. t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
  66. }
  67. // reset unlock to a shorter period, invalidates the previous unlock
  68. if err = am.TimedUnlock(a1.Address, pass, 100*time.Millisecond); err != nil {
  69. t.Fatal(err)
  70. }
  71. // Signing without passphrase still works because account is temp unlocked
  72. _, err = am.Sign(a1, toSign)
  73. if err != nil {
  74. t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
  75. }
  76. // Signing fails again after automatic locking
  77. time.Sleep(150 * time.Millisecond)
  78. _, err = am.Sign(a1, toSign)
  79. if err != ErrLocked {
  80. t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
  81. }
  82. }
  83. func tmpKeyStore(t *testing.T, new func(string) crypto.KeyStore2) (string, crypto.KeyStore2) {
  84. d, err := ioutil.TempDir("", "eth-keystore-test")
  85. if err != nil {
  86. t.Fatal(err)
  87. }
  88. return d, new(d)
  89. }