@@ -13,6 +13,7 @@ import (
13
13
"time"
14
14
15
15
"github.com/MixinNetwork/tip/crypto"
16
+ "github.com/MixinNetwork/tip/logger"
16
17
"github.com/MixinNetwork/tip/store"
17
18
"github.com/drand/kyber"
18
19
"github.com/drand/kyber/pairing/bn256"
@@ -56,19 +57,19 @@ func TestGuard(t *testing.T) {
56
57
}
57
58
58
59
// data should be base64 RawURLEncoding and none blank
59
- signature , data := makeTestRequest (user , node , ephmr , nil , 1024 , grace )
60
- res , err : = Guard (bs , signer , identity , signature , "" )
60
+ signature , _ := makeTestRequest (user , node , ephmr , nil , 1024 , grace )
61
+ _ , err = Guard (bs , signer , identity , signature , "" )
61
62
assert .NotNil (err )
62
63
63
64
// identity is not equal
64
- signature , data = makeTestRequestWithInvalidIdentity (user , node , ephmr , nil , 1039 , grace , "" , "" , "" )
65
- res , err = Guard (bs , signer , identity , signature , data )
65
+ signature , data : = makeTestRequestWithInvalidIdentity (user , node , ephmr , nil , 1039 , grace , "" , "" , "" )
66
+ _ , err = Guard (bs , signer , identity , signature , data )
66
67
assert .NotNil (err )
67
68
assert .Contains (err .Error (), "invalid identity " )
68
69
69
70
// invalid nonce
70
71
signature , data = makeTestRequest (user , node , ephmr , nil , 1024 , grace )
71
- res , err = Guard (bs , signer , identity , signature , data )
72
+ res , err : = Guard (bs , signer , identity , signature , data )
72
73
assert .Nil (err )
73
74
assert .Equal (EphemeralLimitQuota - 1 , res .Available )
74
75
assert .Nil (res .Watcher )
@@ -107,7 +108,7 @@ func TestGuard(t *testing.T) {
107
108
108
109
// invalid signature
109
110
for i := 1 ; i < 6 ; i ++ {
110
- signature , data = makeTestRequest (user , node , ephmr , nil , uint64 (1033 + i ), grace )
111
+ _ , data = makeTestRequest (user , node , ephmr , nil , uint64 (1033 + i ), grace )
111
112
res , err := Guard (bs , signer , identity , hex .EncodeToString (ephmr ), data )
112
113
assert .Nil (err )
113
114
assert .Equal (res .Available , SecretLimitQuota - i )
@@ -141,7 +142,7 @@ func TestGuard(t *testing.T) {
141
142
142
143
// invalid assignee
143
144
signature , data = makeTestRequestWithAssigneeAndRotation (user , node , ephmr , nil , 1039 , grace , identity , "" , "" )
144
- res , err = Guard (bs , signer , identity , signature , data )
145
+ _ , err = Guard (bs , signer , identity , signature , data )
145
146
assert .NotNil (err )
146
147
assert .Contains (err .Error (), "invalid assignee " )
147
148
// valid assignee
@@ -281,7 +282,7 @@ func TestGuard(t *testing.T) {
281
282
assert .NotNil (res )
282
283
// update li' pin with wrong assignee
283
284
signature , data = makeTestRequestWithAssigneeAndRotation (li , node , ephmr , nil , 105 , grace , hex .EncodeToString (assignee ), "" , hex .EncodeToString (liWatcher ))
284
- res , err = Guard (bs , signer , liIdentity , signature , data )
285
+ _ , err = Guard (bs , signer , liIdentity , signature , data )
285
286
assert .NotNil (err )
286
287
assert .Contains (err .Error (), "invalid assignor as is assignee" )
287
288
// update li pin
@@ -361,11 +362,15 @@ func TestAssigneeAndRotation(t *testing.T) {
361
362
362
363
func makeTestRequest (user kyber.Scalar , signer kyber.Point , ephmr , rtt []byte , nonce , grace uint64 ) (string , string ) {
363
364
seed := make ([]byte , 32 )
364
- rand .Read (seed )
365
+ _ , err := rand .Read (seed )
366
+ if err != nil {
367
+ panic (err )
368
+ }
365
369
return makeTestRequestWithAssigneeAndRotation (user , signer , ephmr , rtt , nonce , grace , "" , "" , hex .EncodeToString (seed ))
366
370
}
367
371
368
372
func makeTestRequestWithAssigneeAndRotation (user kyber.Scalar , signer kyber.Point , ephmr , rtt []byte , nonce , grace uint64 , assignee , rotation , watcher string ) (string , string ) {
373
+ logger .Debugf ("rotation not tested %s" , rotation )
369
374
pkey := crypto .PublicKey (user )
370
375
msg := crypto .PublicKeyBytes (pkey )
371
376
msg = append (msg , ephmr ... )
@@ -397,6 +402,7 @@ func makeTestRequestWithAssigneeAndRotation(user kyber.Scalar, signer kyber.Poin
397
402
}
398
403
399
404
func makeTestRequestWithInvalidIdentity (user kyber.Scalar , signer kyber.Point , ephmr , rtt []byte , nonce , grace uint64 , assignee , rotation , watcher string ) (string , string ) {
405
+ logger .Debugf ("rotation and assignee not tested %s %s" , rotation , assignee )
400
406
pkey := crypto .PublicKey (user )
401
407
msg := crypto .PublicKeyBytes (pkey )
402
408
msg = append (msg , ephmr ... )
0 commit comments