mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 13:07:09 +00:00
* feat: enable DID auth middleware * feat: implement passkey creation flow * feat: persist user address in cookie and retrieve user profile using address cookie * feat: implement human verification challenge during session initialization * refactor: remove unnecessary random number generation in profile creation * refactor: rename credential validation handler and update related routes * feat: improve profile validation and user experience * feat: add page rendering for profile and passkey creation * refactor: remove unused register handler and update routes * refactor: remove unused imports and simplify credential validation * fix: Correct insecure gRPC client connection * refactor: rename models files for better organization * refactor: refactor grpc client creation and management * refactor: refactor common clients package * <no value> * feat: add CapAccount, CapInterchain, CapVault enums * feat: add ChainId to ResAccount and ResInterchain * feat: add asset code to resource account enumeration * refactor: rename services package to providers * feat: implement gateway database interactions * refactor: move gateway repository to internal/gateway * refactor: Migrate database provider to use sqlx * refactor: Rename Vaults to VaultProvider in HTTPContext struct * refactor: Migrate from GORM to sqlc Queries in database context methods * refactor: Replace GORM with standard SQL and simplify database initialization * refactor: Migrate session management from GORM to sqlc with type conversion * refactor: Update import paths and model references in context package * fix: Resolve session type conversion and middleware issues * refactor: Migrate database from GORM to sqlx * refactor: Move models to pkg/common, improve code structure * refactor: move repository package to internal directory * refactor: move gateway internal packages to context directory * refactor: migrate database provider to use sqlx queries * feat: add session ID to HTTP context and use it to load session data * feat: implement vault creation API endpoint * feat: add DIDKey generation from PubKey * refactor: remove unused DIDAuth components * refactor: move DID auth controller to vault context * chore: remove unused DIDAuth package * refactor: improve clarity of enclave refresh function * feat: implement nonce-based key encryption for improved security * feat: Add Export and Import methods with comprehensive tests for Enclave * fix: Validate AES key length in keyshare encryption and decryption * fix: Resolve key length validation by hashing input keys * refactor: Update keyshare import to use protocol decoding * feat: Refactor enclave encryption to support full enclave export/import * refactor: Simplify Enclave interface methods by removing role parameter * refactor: remove unnecessary serialization from enclave interface * refactor: rename models package in gateway context * refactor: rename keystore vault constants * refactor: remove context parameter from Resolver methods * feat: add CurrentBlock context function and update related components * refactor: rename resolver.go to resolvers.go * feat: Add SQLite random() generation for session and profile initialization * refactor: Update SQL queries to use SQLite-style parameter placeholders * refactor: Replace '?' placeholders with '$n' PostgreSQL parameter syntax * <no value> * refactor: refactor gateway to use middleware for database interactions and improve modularity * feat: implement gateway for Sonr highway * refactor: Remove unused gateway context and refactor cookie/header handling * refactor: improve server initialization and middleware handling * feat: implement human verification for profile creation * feat: implement session management middleware * refactor: refactor common models and config to internal package * refactor: move env config to internal/config * refactor: move database-related code to directory * refactor: move IPFS client to common package and improve code structure * refactor: move querier to common package and rename to chain_query * refactor: move webworker model to internal/models * feat: add initial view template for Sonr.ID * docs(concepts): Add documentation for cosmos-proto * docs: move IBC transfer documentation to tools section * refactor: rename initpkl.go to pkl_init.go for better naming consistency * docs(theme): update dark mode toggle icons * refactor: update sqlite3 driver to ncruces/go-sqlite3 * feat: add Vault model and database interactions * refactor: Improve SQLite schema with better constraints and indexes * chore: update project dependencies * fix: use grpc.WithInsecure() for gRPC connection * config: set localhost as default Sonr gRPC URL * refactor: improve gateway middleware and refactor server initialization * refactor: Remove foreign key pragma from schema SQL * refactor: Remove foreign key constraints from database schema * refactor: Convert primary key columns from INTEGER to TEXT * refactor: Remove unnecessary redirect in error handling
161 lines
3.8 KiB
Go
161 lines
3.8 KiB
Go
package mpc
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func randNonce() []byte {
|
|
nonce := make([]byte, 12)
|
|
rand.Read(nonce)
|
|
return nonce
|
|
}
|
|
|
|
func TestKeyShareGeneration(t *testing.T) {
|
|
t.Run("Generate Valid Enclave", func(t *testing.T) {
|
|
nonce := randNonce()
|
|
// Generate enclave
|
|
enclave, err := GenEnclave(nonce)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, enclave)
|
|
|
|
// Validate enclave contents
|
|
assert.True(t, enclave.IsValid())
|
|
})
|
|
|
|
t.Run("Export and Import", func(t *testing.T) {
|
|
nonce := randNonce()
|
|
// Generate original enclave
|
|
original, err := GenEnclave(nonce)
|
|
require.NoError(t, err)
|
|
|
|
// Test key for encryption/decryption (32 bytes)
|
|
testKey := []byte("test-key-12345678-test-key-123456")
|
|
|
|
// Test Export/Import
|
|
t.Run("Full Enclave", func(t *testing.T) {
|
|
// Export enclave
|
|
data, err := original.Export(testKey)
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, data)
|
|
|
|
// Create new empty enclave
|
|
newEnclave, err := GenEnclave(nonce)
|
|
require.NoError(t, err)
|
|
|
|
// Import enclave
|
|
err = newEnclave.Import(data, testKey)
|
|
require.NoError(t, err)
|
|
|
|
// Verify the imported enclave works by signing
|
|
testData := []byte("test message")
|
|
sig, err := newEnclave.Sign(testData)
|
|
require.NoError(t, err)
|
|
valid, err := newEnclave.Verify(testData, sig)
|
|
require.NoError(t, err)
|
|
assert.True(t, valid)
|
|
})
|
|
|
|
// Test Invalid Key
|
|
t.Run("Invalid Key", func(t *testing.T) {
|
|
data, err := original.Export(testKey)
|
|
require.NoError(t, err)
|
|
|
|
wrongKey := []byte("wrong-key-12345678")
|
|
err = original.Import(data, wrongKey)
|
|
assert.Error(t, err)
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestEnclaveOperations(t *testing.T) {
|
|
t.Run("Signing and Verification", func(t *testing.T) {
|
|
nonce := randNonce()
|
|
// Generate valid enclave
|
|
enclave, err := GenEnclave(nonce)
|
|
require.NoError(t, err)
|
|
|
|
// Test signing
|
|
testData := []byte("test message")
|
|
signature, err := enclave.Sign(testData)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, signature)
|
|
|
|
// Verify the signature
|
|
valid, err := enclave.Verify(testData, signature)
|
|
require.NoError(t, err)
|
|
assert.True(t, valid)
|
|
|
|
// Test invalid data verification
|
|
invalidData := []byte("wrong message")
|
|
valid, err = enclave.Verify(invalidData, signature)
|
|
require.NoError(t, err)
|
|
assert.False(t, valid)
|
|
})
|
|
|
|
t.Run("Address and Public Key", func(t *testing.T) {
|
|
nonce := randNonce()
|
|
enclave, err := GenEnclave(nonce)
|
|
require.NoError(t, err)
|
|
|
|
// Test Address
|
|
addr := enclave.Address()
|
|
assert.NotEmpty(t, addr)
|
|
assert.True(t, strings.HasPrefix(addr, "idx"))
|
|
|
|
// Test Public Key
|
|
pubKey := enclave.PubKey()
|
|
assert.NotNil(t, pubKey)
|
|
assert.NotEmpty(t, pubKey.Bytes())
|
|
})
|
|
|
|
t.Run("Refresh Operation", func(t *testing.T) {
|
|
nonce := randNonce()
|
|
enclave, err := GenEnclave(nonce)
|
|
require.NoError(t, err)
|
|
|
|
// Test refresh
|
|
refreshedEnclave, err := enclave.Refresh()
|
|
require.NoError(t, err)
|
|
require.NotNil(t, refreshedEnclave)
|
|
|
|
// Verify refreshed enclave is valid
|
|
assert.True(t, refreshedEnclave.IsValid())
|
|
|
|
// Verify it maintains the same address
|
|
assert.Equal(t, enclave.Address(), refreshedEnclave.Address())
|
|
})
|
|
}
|
|
|
|
func TestEnclaveSerialization(t *testing.T) {
|
|
t.Run("Marshal and Unmarshal", func(t *testing.T) {
|
|
nonce := randNonce()
|
|
// Generate original enclave
|
|
original, err := GenEnclave(nonce)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, original)
|
|
|
|
// Marshal
|
|
keyclave, ok := original.(*keyEnclave)
|
|
require.True(t, ok)
|
|
|
|
data, err := keyclave.Serialize()
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, data)
|
|
|
|
// Unmarshal
|
|
restored := &keyEnclave{}
|
|
err = restored.Unmarshal(data)
|
|
require.NoError(t, err)
|
|
|
|
// Verify restored enclave
|
|
assert.Equal(t, keyclave.Addr, restored.Addr)
|
|
assert.True(t, keyclave.PubPoint.Equal(restored.PubPoint))
|
|
assert.True(t, restored.IsValid())
|
|
})
|
|
}
|