rippled
Loading...
Searching...
No Matches
ValidatorKeys_test.cpp
1//------------------------------------------------------------------------------
2/*
3 This file is part of rippled: https://github.com/ripple/rippled
4 Copyright 2017 Ripple Labs Inc.
5
6 Permission to use, copy, modify, and/or distribute this software for any
7 purpose with or without fee is hereby granted, provided that the above
8 copyright notice and this permission notice appear in all copies.
9
10 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17*/
18//==============================================================================
19
20#include <test/jtx/Env.h>
21#include <xrpld/app/misc/Manifest.h>
22#include <xrpld/app/misc/ValidatorKeys.h>
23#include <xrpld/core/Config.h>
24#include <xrpld/core/ConfigSections.h>
25#include <xrpl/basics/base64.h>
26#include <xrpl/beast/unit_test.h>
27
28#include <string>
29
30namespace ripple {
31namespace test {
32
34{
35 // Used with [validation_seed]
36 const std::string seed = "shUwVw52ofnCUX5m7kPTKzJdr4HEH";
37
38 // Used with [validation_token]
40 "paQmjZ37pKKPMrgadBLsuf9ab7Y7EUNzh27LQrZqoexpAs31nJi";
41
43 " "
44 "eyJ2YWxpZGF0aW9uX3NlY3JldF9rZXkiOiI5ZWQ0NWY4NjYyNDFjYzE4YTI3NDdiNT\n",
45 " \tQzODdjMDYyNTkwNzk3MmY0ZTcxOTAyMzFmYWE5Mzc0NTdmYTlkYWY2IiwibWFuaWZl "
46 " \n",
47 "\tc3QiOiJKQUFBQUFGeEllMUZ0d21pbXZHdEgyaUNjTUpxQzlnVkZLaWxHZncxL3ZDeE"
48 "\n",
49 "\t "
50 "hYWExwbGMyR25NaEFrRTFhZ3FYeEJ3RHdEYklENk9NU1l1TTBGREFscEFnTms4U0tG\t "
51 "\t\n",
52 "bjdNTzJmZGtjd1JRSWhBT25ndTlzQUtxWFlvdUorbDJWMFcrc0FPa1ZCK1pSUzZQU2\n",
53 "hsSkFmVXNYZkFpQnNWSkdlc2FhZE9KYy9hQVpva1MxdnltR21WcmxIUEtXWDNZeXd1\n",
54 "NmluOEhBU1FLUHVnQkQ2N2tNYVJGR3ZtcEFUSGxHS0pkdkRGbFdQWXk1QXFEZWRGdj\n",
55 "VUSmEydzBpMjFlcTNNWXl3TFZKWm5GT3I3QzBrdzJBaVR6U0NqSXpkaXRROD0ifQ==\n"};
56
58 "JAAAAAFxIe1FtwmimvGtH2iCcMJqC9gVFKilGfw1/vCxHXXLplc2GnMhAkE1agqXxBwD"
59 "wDbID6OMSYuM0FDAlpAgNk8SKFn7MO2fdkcwRQIhAOngu9sAKqXYouJ+l2V0W+sAOkVB"
60 "+ZRS6PShlJAfUsXfAiBsVJGesaadOJc/aAZokS1vymGmVrlHPKWX3Yywu6in8HASQKPu"
61 "gBD67kMaRFGvmpATHlGKJdvDFlWPYy5AqDedFv5TJa2w0i21eq3MYywLVJZnFOr7C0kw"
62 "2AiTzSCjIzditQ8=";
63
64 // Manifest does not match private key
66 "eyJtYW5pZmVzdCI6IkpBQUFBQVZ4SWUyOVVBdzViZFJudHJ1elVkREk4aDNGV1JWZl\n",
67 "k3SXVIaUlKQUhJd3MxdzZzM01oQWtsa1VXQWR2RnFRVGRlSEpvS1pNY0hlS0RzOExo\n",
68 "b3d3bDlHOEdkVGNJbmFka1l3UkFJZ0h2Q01lQU1aSzlqQnV2aFhlaFRLRzVDQ3BBR1\n",
69 "k0bGtvZHRXYW84UGhzR3NDSUREVTA1d1c3bWNiMjlVNkMvTHBpZmgvakZPRGhFR21i\n",
70 "NWF6dTJMVHlqL1pjQkpBbitmNGhtQTQ0U0tYbGtTTUFqak1rSWRyR1Rxa21SNjBzVG\n",
71 "JaTjZOOUYwdk9UV3VYcUZ6eDFoSGIyL0RqWElVZXhDVGlITEcxTG9UdUp1eXdXbk55\n",
72 "RFE9PSIsInZhbGlkYXRpb25fc2VjcmV0X2tleSI6IjkyRDhCNDBGMzYwMTc5MTkwMU\n",
73 "MzQTUzMzI3NzBDMkUwMTA4MDI0NTZFOEM2QkI0NEQ0N0FFREQ0NzJGMDQ2RkYifQ==\n"};
74
75public:
76 void
77 run() override
78 {
79 // We're only using Env for its Journal. That Journal gives better
80 // coverage in unit tests.
82 *this,
84 nullptr,
86 beast::Journal journal{env.app().journal("ValidatorKeys_test")};
87
88 // Keys/ID when using [validation_seed]
89 SecretKey const seedSecretKey =
90 generateSecretKey(KeyType::secp256k1, *parseBase58<Seed>(seed));
91 PublicKey const seedPublicKey =
92 derivePublicKey(KeyType::secp256k1, seedSecretKey);
93 NodeID const seedNodeID = calcNodeID(seedPublicKey);
94
95 // Keys when using [validation_token]
96 auto const tokenSecretKey =
97 *parseBase58<SecretKey>(TokenType::NodePrivate, tokenSecretStr);
98
99 auto const tokenPublicKey =
100 derivePublicKey(KeyType::secp256k1, tokenSecretKey);
101
103 BEAST_EXPECT(m);
104 NodeID const tokenNodeID = calcNodeID(m->masterKey);
105
106 {
107 // No config -> no key but valid
108 Config c;
109 ValidatorKeys k{c, journal};
110 BEAST_EXPECT(!k.keys);
111 BEAST_EXPECT(k.manifest.empty());
112 BEAST_EXPECT(!k.configInvalid());
113 }
114 {
115 // validation seed section -> empty manifest and valid seeds
116 Config c;
117 c.section(SECTION_VALIDATION_SEED).append(seed);
118
119 ValidatorKeys k{c, journal};
120 if (BEAST_EXPECT(k.keys))
121 {
122 BEAST_EXPECT(k.keys->publicKey == seedPublicKey);
123 BEAST_EXPECT(k.keys->secretKey == seedSecretKey);
124 }
125 BEAST_EXPECT(k.nodeID == seedNodeID);
126 BEAST_EXPECT(k.manifest.empty());
127 BEAST_EXPECT(!k.configInvalid());
128 }
129
130 {
131 // validation seed bad seed -> invalid
132 Config c;
133 c.section(SECTION_VALIDATION_SEED).append("badseed");
134
135 ValidatorKeys k{c, journal};
136 BEAST_EXPECT(k.configInvalid());
137 BEAST_EXPECT(!k.keys);
138 BEAST_EXPECT(k.manifest.empty());
139 }
140
141 {
142 // validator token
143 Config c;
144 c.section(SECTION_VALIDATOR_TOKEN).append(tokenBlob);
145 ValidatorKeys k{c, journal};
146
147 if (BEAST_EXPECT(k.keys))
148 {
149 BEAST_EXPECT(k.keys->publicKey == tokenPublicKey);
150 BEAST_EXPECT(k.keys->secretKey == tokenSecretKey);
151 }
152 BEAST_EXPECT(k.nodeID == tokenNodeID);
153 BEAST_EXPECT(k.manifest == tokenManifest);
154 BEAST_EXPECT(!k.configInvalid());
155 }
156 {
157 // invalid validator token
158 Config c;
159 c.section(SECTION_VALIDATOR_TOKEN).append("badtoken");
160 ValidatorKeys k{c, journal};
161 BEAST_EXPECT(k.configInvalid());
162 BEAST_EXPECT(!k.keys);
163 BEAST_EXPECT(k.manifest.empty());
164 }
165
166 {
167 // Cannot specify both
168 Config c;
169 c.section(SECTION_VALIDATION_SEED).append(seed);
170 c.section(SECTION_VALIDATOR_TOKEN).append(tokenBlob);
171 ValidatorKeys k{c, journal};
172
173 BEAST_EXPECT(k.configInvalid());
174 BEAST_EXPECT(!k.keys);
175 BEAST_EXPECT(k.manifest.empty());
176 }
177
178 {
179 // Token manifest and private key must match
180 Config c;
181 c.section(SECTION_VALIDATOR_TOKEN).append(invalidTokenBlob);
182 ValidatorKeys k{c, journal};
183
184 BEAST_EXPECT(k.configInvalid());
185 BEAST_EXPECT(!k.keys);
186 BEAST_EXPECT(k.manifest.empty());
187 }
188 }
189}; // namespace test
190
191BEAST_DEFINE_TESTSUITE(ValidatorKeys, app, ripple);
192
193} // namespace test
194} // namespace ripple
A generic endpoint for log messages.
Definition: Journal.h:59
A testsuite class.
Definition: suite.h:53
Section & section(std::string const &name)
Returns the section with the given name.
A public key.
Definition: PublicKey.h:62
A secret key.
Definition: SecretKey.h:37
void append(std::vector< std::string > const &lines)
Append a set of lines to this section.
Definition: BasicConfig.cpp:38
Validator keys and manifest as set in configuration file.
Definition: ValidatorKeys.h:37
void run() override
Runs the suite.
const std::vector< std::string > invalidTokenBlob
const std::vector< std::string > tokenBlob
A transaction testing environment.
Definition: Env.h:117
std::unique_ptr< Config > envconfig()
creates and initializes a default configuration for jtx::Env
Definition: envconfig.h:54
Use hash_* containers for keys that do not need a cryptographically secure hashing algorithm.
Definition: algorithm.h:26
std::optional< Manifest > deserializeManifest(Slice s, beast::Journal journal)
Constructs Manifest from serialized string.
std::string base64_decode(std::string_view data)
Definition: base64.cpp:245
PublicKey derivePublicKey(KeyType type, SecretKey const &sk)
Derive the public key from a secret key.
Definition: SecretKey.cpp:313
SecretKey generateSecretKey(KeyType type, Seed const &seed)
Generate a new secret key deterministically.
Definition: SecretKey.cpp:291
NodeID calcNodeID(PublicKey const &)
Calculate the 160-bit node ID from a node public key.
Definition: PublicKey.cpp:303