forked from TrueCloudLab/frostfs-node
Evgenii Stratonikov
c1ec6e33b4
Committee should be able to authorize everything, there are no other usecases for the frostfs-adm currently. Also, it somewhat eases configuration, because committee hash depends on the protocol configuration. Signed-off-by: Evgenii Stratonikov <e.stratonikov@yadro.com>
49 lines
1.3 KiB
Go
49 lines
1.3 KiB
Go
package morph
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"testing"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/crypto/keys"
|
|
"github.com/nspcc-dev/neo-go/pkg/encoding/address"
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract"
|
|
"github.com/nspcc-dev/neo-go/pkg/util"
|
|
"github.com/spf13/viper"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestFrostfsIDConfig(t *testing.T) {
|
|
pks := make([]*keys.PrivateKey, 4)
|
|
for i := range pks {
|
|
pk, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
pks[i] = pk
|
|
}
|
|
|
|
v := viper.New()
|
|
v.Set("frostfsid.authorized_keys", []string{
|
|
pks[0].GetScriptHash().StringLE(),
|
|
address.Uint160ToString(pks[1].GetScriptHash()),
|
|
hex.EncodeToString(pks[2].PublicKey().UncompressedBytes()),
|
|
hex.EncodeToString(pks[3].PublicKey().Bytes()),
|
|
})
|
|
|
|
comm := util.Uint160{1, 2, 3}
|
|
actual, err := getFrostfsIDAuthorizedKeys(v, comm)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(pks)+1, len(actual))
|
|
require.Equal(t, smartcontract.Hash160Type, actual[0].Type)
|
|
require.Equal(t, comm, actual[0].Value)
|
|
for i := range pks {
|
|
require.Equal(t, smartcontract.Hash160Type, actual[i+1].Type)
|
|
require.Equal(t, pks[i].GetScriptHash(), actual[i+1].Value)
|
|
}
|
|
|
|
t.Run("bad key", func(t *testing.T) {
|
|
v := viper.New()
|
|
v.Set("frostfsid.authorized_keys", []string{"abc"})
|
|
|
|
_, err := getFrostfsIDAuthorizedKeys(v, comm)
|
|
require.Error(t, err)
|
|
})
|
|
}
|