|
| 1 | +import assert from 'assert'; |
| 2 | + |
1 | 3 | import should = require('should'); |
2 | 4 | import * as sinon from 'sinon'; |
3 | 5 | import { Wallet } from '@bitgo/sdk-core'; |
@@ -133,4 +135,66 @@ describe('Custom Change Wallets', () => { |
133 | 135 | (coin.wallets as any).restore(); |
134 | 136 | (coin.keychains as any).restore(); |
135 | 137 | }); |
| 138 | + |
| 139 | + it('should reject invalid custom change key signatures before calling explainTransaction', async () => { |
| 140 | + const wrongKey = coin.keychains().create(); |
| 141 | + // eslint-disable-next-line @typescript-eslint/no-non-null-assertion |
| 142 | + const sign = async ({ key }) => (await coin.signMessage({ prv: wrongKey.prv }, key.pub!)).toString('hex'); |
| 143 | + const invalidSignatures = { |
| 144 | + user: await sign(keys.change.user), |
| 145 | + backup: await sign(keys.change.backup), |
| 146 | + bitgo: await sign(keys.change.bitgo), |
| 147 | + }; |
| 148 | + |
| 149 | + const signedSendingWallet = sinon.createStubInstance(Wallet, stubData.signedSendingWallet as any); |
| 150 | + const changeWallet = sinon.createStubInstance(Wallet, stubData.changeWallet as any); |
| 151 | + |
| 152 | + sinon.stub(coin, 'keychains').returns({ |
| 153 | + get: sinon.stub().callsFake(({ id }) => { |
| 154 | + switch (id) { |
| 155 | + case keys.send.user.id: |
| 156 | + return Promise.resolve({ id, ...keys.send.user.key }); |
| 157 | + case keys.send.backup.id: |
| 158 | + return Promise.resolve({ id, ...keys.send.backup.key }); |
| 159 | + case keys.send.bitgo.id: |
| 160 | + return Promise.resolve({ id, ...keys.send.bitgo.key }); |
| 161 | + case keys.change.user.id: |
| 162 | + return Promise.resolve({ id, ...keys.change.user.key }); |
| 163 | + case keys.change.backup.id: |
| 164 | + return Promise.resolve({ id, ...keys.change.backup.key }); |
| 165 | + case keys.change.bitgo.id: |
| 166 | + return Promise.resolve({ id, ...keys.change.bitgo.key }); |
| 167 | + } |
| 168 | + }), |
| 169 | + } as any); |
| 170 | + |
| 171 | + sinon.stub(coin, 'wallets').returns({ |
| 172 | + get: sinon.stub().callsFake(() => Promise.resolve(changeWallet)), |
| 173 | + } as any); |
| 174 | + |
| 175 | + const explainStub = sinon.stub(coin, 'explainTransaction'); |
| 176 | + |
| 177 | + signedSendingWallet._wallet = signedSendingWallet._wallet || { |
| 178 | + customChangeKeySignatures: invalidSignatures, |
| 179 | + }; |
| 180 | + |
| 181 | + try { |
| 182 | + await coin.parseTransaction({ |
| 183 | + txParams: { recipients: [] }, |
| 184 | + txPrebuild: { txHex: '' }, |
| 185 | + wallet: signedSendingWallet as any, |
| 186 | + verification: {}, |
| 187 | + }); |
| 188 | + assert.fail('parseTransaction should have thrown for invalid custom change key signatures'); |
| 189 | + } catch (e) { |
| 190 | + assert.ok(e instanceof Error); |
| 191 | + assert.match(e.message, /failed to verify custom change .* key signature/); |
| 192 | + } |
| 193 | + |
| 194 | + assert.strictEqual(explainStub.called, false, 'explainTransaction should not have been called'); |
| 195 | + |
| 196 | + explainStub.restore(); |
| 197 | + (coin.wallets as any).restore(); |
| 198 | + (coin.keychains as any).restore(); |
| 199 | + }); |
136 | 200 | }); |
0 commit comments