mukan-sdk/crypto/keyring/migration_test.go
Mukan Erkin Törük abb1ff956e
Some checks are pending
Build SimApp / build (amd64) (push) Waiting to run
Build SimApp / build (arm64) (push) Waiting to run
CodeQL / Analyze (push) Waiting to run
Build & Push / build (push) Waiting to run
Run Gosec / Gosec (push) Waiting to run
Lint / golangci-lint (push) Waiting to run
Checks dependencies and mocks generation / Check go mod tidy (push) Waiting to run
Checks dependencies and mocks generation / Check up to date mocks (push) Waiting to run
System Tests / setup (push) Waiting to run
System Tests / test-system (push) Blocked by required conditions
System Tests / test-system-legacy (push) Blocked by required conditions
Tests / Code Coverage / split-test-files (push) Waiting to run
Tests / Code Coverage / tests (00) (push) Blocked by required conditions
Tests / Code Coverage / tests (01) (push) Blocked by required conditions
Tests / Code Coverage / tests (02) (push) Blocked by required conditions
Tests / Code Coverage / tests (03) (push) Blocked by required conditions
Tests / Code Coverage / test-integration (push) Waiting to run
Tests / Code Coverage / test-e2e (push) Waiting to run
Tests / Code Coverage / repo-analysis (push) Blocked by required conditions
Tests / Code Coverage / test-sim-nondeterminism (push) Waiting to run
Tests / Code Coverage / test-clientv2 (push) Waiting to run
Tests / Code Coverage / test-core (push) Waiting to run
Tests / Code Coverage / test-depinject (push) Waiting to run
Tests / Code Coverage / test-errors (push) Waiting to run
Tests / Code Coverage / test-math (push) Waiting to run
Tests / Code Coverage / test-schema (push) Waiting to run
Tests / Code Coverage / test-collections (push) Waiting to run
Tests / Code Coverage / test-cosmovisor (push) Waiting to run
Tests / Code Coverage / test-confix (push) Waiting to run
Tests / Code Coverage / test-store (push) Waiting to run
Tests / Code Coverage / test-log (push) Waiting to run
Tests / Code Coverage / test-x-tx (push) Waiting to run
Tests / Code Coverage / test-x-nft (push) Waiting to run
Tests / Code Coverage / test-x-circuit (push) Waiting to run
Tests / Code Coverage / test-x-feegrant (push) Waiting to run
Tests / Code Coverage / test-x-evidence (push) Waiting to run
Tests / Code Coverage / test-x-upgrade (push) Waiting to run
Tests / Code Coverage / test-tools-benchmark (push) Waiting to run
refactor: complete sovereign stack cleanup — all github.com upstream refs purged
2026-05-11 03:46:06 +03:00

266 lines
6.5 KiB
Go

package keyring
import (
"strings"
"testing"
"github.com/99designs/keyring"
"github.com/stretchr/testify/suite"
errorsmod "cosmossdk.io/errors"
"git.cw.tr/mukan-network/mukan-sdk/codec/legacy"
"git.cw.tr/mukan-network/mukan-sdk/crypto/hd"
"git.cw.tr/mukan-network/mukan-sdk/crypto/keys/multisig"
"git.cw.tr/mukan-network/mukan-sdk/crypto/keys/secp256k1"
cryptotypes "git.cw.tr/mukan-network/mukan-sdk/crypto/types"
sdkerrors "git.cw.tr/mukan-network/mukan-sdk/types/errors"
)
const n1 = "cosmos.info"
type MigrationTestSuite struct {
suite.Suite
kb Keyring
priv cryptotypes.PrivKey
pub cryptotypes.PubKey
ks keystore
}
func (s *MigrationTestSuite) SetupSuite() {
dir := s.T().TempDir()
mockIn := strings.NewReader("")
cdc := getCodec()
kb, err := New(n1, BackendTest, dir, mockIn, cdc)
s.Require().NoError(err)
ks, ok := kb.(keystore)
s.Require().True(ok)
s.kb = kb
s.ks = ks
s.priv = cryptotypes.PrivKey(secp256k1.GenPrivKey())
s.pub = s.priv.PubKey()
}
func (s *MigrationTestSuite) TestMigrateLegacyLocalKey() {
legacyLocalInfo := newLegacyLocalInfo(n1, s.pub, string(legacy.Cdc.MustMarshal(s.priv)), hd.Secp256k1.Name())
serializedLegacyLocalInfo := MarshalInfo(legacyLocalInfo)
item := keyring.Item{
Key: n1,
Data: serializedLegacyLocalInfo,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
_, err := s.ks.migrate(n1)
s.Require().NoError(err)
}
func (s *MigrationTestSuite) TestMigrateLegacyLedgerKey() {
account, coinType, index := uint32(118), uint32(0), uint32(0)
hdPath := hd.NewFundraiserParams(account, coinType, index)
legacyLedgerInfo := newLegacyLedgerInfo(n1, s.pub, *hdPath, hd.Secp256k1.Name())
serializedLegacyLedgerInfo := MarshalInfo(legacyLedgerInfo)
item := keyring.Item{
Key: n1,
Data: serializedLegacyLedgerInfo,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
_, err := s.ks.migrate(n1)
s.Require().NoError(err)
}
func (s *MigrationTestSuite) TestMigrateLegacyOfflineKey() {
legacyOfflineInfo := newLegacyOfflineInfo(n1, s.pub, hd.Secp256k1.Name())
serializedLegacyOfflineInfo := MarshalInfo(legacyOfflineInfo)
item := keyring.Item{
Key: n1,
Data: serializedLegacyOfflineInfo,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
_, err := s.ks.migrate(n1)
s.Require().NoError(err)
}
func (s *MigrationTestSuite) TestMigrateLegacyMultiKey() {
multi := multisig.NewLegacyAminoPubKey(
1, []cryptotypes.PubKey{
s.pub,
},
)
LegacyMultiInfo, err := NewLegacyMultiInfo(n1, multi)
s.Require().NoError(err)
serializedLegacyMultiInfo := MarshalInfo(LegacyMultiInfo)
item := keyring.Item{
Key: n1,
Data: serializedLegacyMultiInfo,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
_, err = s.ks.migrate(n1)
s.Require().NoError(err)
}
func (s *MigrationTestSuite) TestMigrateLocalRecord() {
k1, err := NewLocalRecord("test record", s.priv, s.pub)
s.Require().NoError(err)
serializedRecord, err := s.ks.cdc.Marshal(k1)
s.Require().NoError(err)
item := keyring.Item{
Key: n1,
Data: serializedRecord,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
k2, err := s.ks.migrate(n1)
s.Require().NoError(err)
s.Require().Equal(k2.Name, k1.Name)
pub, err := k2.GetPubKey()
s.Require().NoError(err)
s.Require().Equal(pub, s.pub)
priv, err := extractPrivKeyFromRecord(k2)
s.Require().NoError(err)
s.Require().Equal(priv, s.priv)
s.Require().NoError(err)
}
func (s *MigrationTestSuite) TestMigrateOneRandomItemError() {
randomBytes := []byte("abckd0s03l")
errItem := keyring.Item{
Key: n1,
Data: randomBytes,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(errItem))
_, err := s.ks.migrate(n1)
s.Require().Error(err)
}
func (s *MigrationTestSuite) TestMigrateAllLegacyMultiOffline() {
multi := multisig.NewLegacyAminoPubKey(
1, []cryptotypes.PubKey{
s.pub,
},
)
LegacyMultiInfo, err := NewLegacyMultiInfo(n1, multi)
s.Require().NoError(err)
serializedLegacyMultiInfo := MarshalInfo(LegacyMultiInfo)
item := keyring.Item{
Key: n1,
Data: serializedLegacyMultiInfo,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
legacyOfflineInfo := newLegacyOfflineInfo(n1, s.pub, hd.Secp256k1.Name())
serializedLegacyOfflineInfo := MarshalInfo(legacyOfflineInfo)
item = keyring.Item{
Key: n1,
Data: serializedLegacyOfflineInfo,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
_, err = s.kb.MigrateAll()
s.Require().NoError(err)
}
func (s *MigrationTestSuite) TestMigrateAllNoItem() {
_, err := s.kb.MigrateAll()
s.Require().NoError(err)
}
func (s *MigrationTestSuite) TestMigrateErrUnknownItemKey() {
legacyOfflineInfo := newLegacyOfflineInfo(n1, s.pub, hd.Secp256k1.Name())
serializedLegacyOfflineInfo := MarshalInfo(legacyOfflineInfo)
item := keyring.Item{
Key: n1,
Data: serializedLegacyOfflineInfo,
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
incorrectItemKey := n1 + "1"
_, err := s.ks.migrate(incorrectItemKey)
s.Require().EqualError(err, errorsmod.Wrap(sdkerrors.ErrKeyNotFound, infoKey(incorrectItemKey)).Error())
}
func (s *MigrationTestSuite) TestMigrateErrEmptyItemData() {
item := keyring.Item{
Key: n1,
Data: []byte{},
Description: "SDK kerying version",
}
s.Require().NoError(s.ks.SetItem(item))
_, err := s.ks.migrate(n1)
s.Require().EqualError(err, errorsmod.Wrap(sdkerrors.ErrKeyNotFound, n1).Error())
}
func TestMigrationTestSuite(t *testing.T) {
suite.Run(t, new(MigrationTestSuite))
}
// newLegacyLocalInfo creates a new legacyLocalInfo instance
func newLegacyLocalInfo(name string, pub cryptotypes.PubKey, privArmor string, algo hd.PubKeyType) LegacyInfo {
return &legacyLocalInfo{
Name: name,
PubKey: pub,
PrivKeyArmor: privArmor,
Algo: algo,
}
}
// newLegacyOfflineInfo creates a new legacyLedgerInfo instance
func newLegacyLedgerInfo(name string, pub cryptotypes.PubKey, path hd.BIP44Params, algo hd.PubKeyType) LegacyInfo {
return &legacyLedgerInfo{
Name: name,
PubKey: pub,
Path: path,
Algo: algo,
}
}
// newLegacyOfflineInfo creates a new legacyOfflineInfo instance
func newLegacyOfflineInfo(name string, pub cryptotypes.PubKey, algo hd.PubKeyType) LegacyInfo {
return &legacyOfflineInfo{
Name: name,
PubKey: pub,
Algo: algo,
}
}