nucypher/tests/integration/blockchain/test_keystore_signer_filesy...

211 lines
7.3 KiB
Python

import json
import shutil
import pytest
from cytoolz.dicttoolz import assoc
from eth_account import Account
from eth_account._utils.legacy_transactions import Transaction
from eth_utils.address import to_checksum_address
from hexbytes.main import HexBytes
from nucypher.blockchain.eth.constants import LENGTH_ECDSA_SIGNATURE_WITH_RECOVERY
from nucypher.blockchain.eth.signers import KeystoreSigner, Signer
from tests.constants import INSECURE_DEVELOPMENT_PASSWORD
# Example keystore filename
MOCK_KEYFILE_NAME = 'UTC--2019-12-04T05-39-04.006429310Z--0xdeadbeef'
MOCK_KEYFILE = {'address': '0x13978aee95f38490e9769C39B2773Ed763d9cd5F', 'version': 3}
TRANSACTION_DICT = {
"chainId": None,
"nonce": 0,
"gasPrice": 1000000000000,
"gas": 10000,
"to": "0x13978aee95f38490e9769C39B2773Ed763d9cd5F",
"value": 10000000000000000,
"data": ""
}
@pytest.fixture(scope='module')
def mock_key():
test_key = Account.create(extra_entropy='M*A*S*H* DIWOKNECNECENOE#@!')
return test_key
@pytest.fixture(scope='module')
def mock_account(mock_key):
account = Account.from_key(private_key=mock_key.key)
return account
@pytest.fixture(scope='module')
def mock_keystore(mock_account, tmp_path_factory):
keystore = tmp_path_factory.mktemp('keystore')
json.dump(
mock_account.encrypt(INSECURE_DEVELOPMENT_PASSWORD),
open(keystore / MOCK_KEYFILE_NAME, 'x+t')
)
return keystore
@pytest.fixture(scope='function')
def good_signer(mock_account, mock_keystore):
# Return a "real" account address from the keyfile
mock_keystore_uri = f'keystore:{mock_keystore}'
signer = Signer.from_signer_uri(uri=mock_keystore_uri) # type: KeystoreSigner
# unlock
signer.unlock_account(account=mock_account.address, password=INSECURE_DEVELOPMENT_PASSWORD)
return signer
@pytest.fixture(scope='module')
def unknown_address():
address = Account.create().address
return address
def test_invalid_keystore(tmp_path):
with pytest.raises(Signer.InvalidSignerURI) as e:
Signer.from_signer_uri(uri=f'keystore:{tmp_path.absolute()/"nonexistent"}', testnet=True)
empty_path = tmp_path / 'empty_file'
open(empty_path, 'x+t').close()
with pytest.raises(KeystoreSigner.InvalidKeyfile, match=
'Invalid JSON in keyfile at') as e:
Signer.from_signer_uri(uri=f'keystore:{empty_path}', testnet=True)
empty_json = tmp_path / 'empty_json'
json.dump({}, open(empty_json, 'x+t'))
with pytest.raises(KeystoreSigner.InvalidKeyfile, match=
'Keyfile does not contain address field at') as e:
Signer.from_signer_uri(uri=f'keystore:{empty_json}', testnet=True)
bad_address = tmp_path / 'bad_address'
json.dump({'address':''}, open(bad_address, 'x+t'))
with pytest.raises(KeystoreSigner.InvalidKeyfile, match=
'does not contain a valid ethereum address') as e:
Signer.from_signer_uri(uri=f'keystore:{bad_address}', testnet=True)
def test_signer_reads_keystore_from_disk(mock_account, mock_key, temp_dir_path):
# Test reading a keyfile from the disk via KeystoreSigner since
# it is mocked for the rest of this test module
fake_ethereum = temp_dir_path / '.fake-ethereum'
try:
fake_ethereum.mkdir()
tmp_keystore = temp_dir_path / '.fake-ethereum' / 'keystore'
tmp_keystore.mkdir()
mock_keyfile_path = tmp_keystore / MOCK_KEYFILE_NAME
mock_keyfile_path.touch(exist_ok=True)
with open(mock_keyfile_path, 'w') as fake_keyfile:
fake_keyfile.write(json.dumps(MOCK_KEYFILE))
mock_keystore_uri = f'keystore://{tmp_keystore}'
signer = Signer.from_signer_uri(uri=mock_keystore_uri, testnet=True)
assert signer.path == tmp_keystore
assert len(signer.accounts) == 1
assert MOCK_KEYFILE['address'] in signer.accounts
finally:
if fake_ethereum.exists():
shutil.rmtree(fake_ethereum, ignore_errors=True)
def test_create_signer_from_keystore_directory(mock_account, mock_keystore):
mock_keystore_path = mock_keystore
mock_keystore_uri = f'keystore:{mock_keystore_path}'
# Return a "real" account address from the keyfile
signer = Signer.from_signer_uri(uri=mock_keystore_uri, testnet=True) # type: KeystoreSigner
assert signer.path == mock_keystore_path
assert len(signer.accounts) == 1
assert mock_account.address in signer.accounts
def test_create_signer_from_keystore_file(mock_account, mock_keystore):
mock_keystore_path = mock_keystore / MOCK_KEYFILE_NAME
mock_keystore_uri = f'keystore:{mock_keystore_path}'
# Return a "real" account address from the keyfile
signer = Signer.from_signer_uri(uri=mock_keystore_uri, testnet=True) # type: KeystoreSigner
assert signer.path == mock_keystore_path
assert len(signer.accounts) == 1
assert mock_account.address in signer.accounts
def test_keystore_locking(mock_account, good_signer, unknown_address, mocker):
#
# Unlock
#
# Unknown account
with pytest.raises(Signer.UnknownAccount):
good_signer.unlock_account(account=unknown_address, password=INSECURE_DEVELOPMENT_PASSWORD)
mocker.patch.dict(good_signer._KeystoreSigner__signers, {}, clear=True)
# Missing password
with pytest.raises(Signer.AuthenticationFailed, match='No password supplied to unlock account.'):
good_signer.unlock_account(account=mock_account.address, password=None)
# Wrong password
mocker.patch.dict(good_signer._KeystoreSigner__signers, {}, clear=True)
with pytest.raises(Signer.AuthenticationFailed, match="Invalid or incorrect ethereum account password."):
good_signer.unlock_account(account=mock_account.address, password='imadeupthispassworditisverygood')
# Correct account and password
successful_unlock = good_signer.unlock_account(account=mock_account.address, password=INSECURE_DEVELOPMENT_PASSWORD)
assert successful_unlock
#
# Lock
#
with pytest.raises(Signer.UnknownAccount):
good_signer.lock_account(account=unknown_address)
successful_lock = good_signer.lock_account(account=mock_account.address)
assert successful_lock
def test_list_keystore_accounts(good_signer, mock_account):
tracked_accounts = good_signer.accounts
assert mock_account.address in tracked_accounts
assert len(tracked_accounts) == 1
def test_keystore_sign_message(mocker, good_signer, mock_account, mock_key):
# unlock
mock_decrypt = mocker.patch.object(Account, 'decrypt', autospec=True)
mock_decrypt.return_value = mock_key.key
successful_unlock = good_signer.unlock_account(account=mock_account.address, password=INSECURE_DEVELOPMENT_PASSWORD)
assert successful_unlock
# sign message
message = b'A million tiny bubbles exploding'
signature = good_signer.sign_message(account=mock_account.address, message=message)
assert len(signature) == LENGTH_ECDSA_SIGNATURE_WITH_RECOVERY
def test_keystore_sign_transaction(good_signer, mock_account):
transaction_dict = assoc(TRANSACTION_DICT, 'from', value=mock_account.address)
signed_transaction = good_signer.sign_transaction(transaction_dict=transaction_dict)
assert isinstance(signed_transaction, HexBytes)
# assert valid transaction
transaction = Transaction.from_bytes(signed_transaction)
assert to_checksum_address(transaction.to) == transaction_dict['to']