def test_verify_challenge_transaction_signers_raise_no_signers(self): server_kp = Keypair.random() client_kp_a = Keypair.random() client_kp_b = Keypair.random() client_kp_c = Keypair.random() timeout = 600 network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction( server_secret=server_kp.secret, client_account_id=client_kp_a.public_key, anchor_name=anchor_name, network_passphrase=network_passphrase, timeout=timeout, ) transaction = TransactionEnvelope.from_xdr(challenge, network_passphrase) transaction.sign(client_kp_a) transaction.sign(client_kp_b) transaction.sign(client_kp_c) challenge_tx = transaction.to_xdr() signers = [] with pytest.raises(InvalidSep10ChallengeError, match="No signers provided."): verify_challenge_transaction_signers(challenge_tx, server_kp.public_key, network_passphrase, signers)
def test_verify_challenge_tx_sequence_not_zero(self): server_kp = Keypair.random() client_kp = Keypair.random() network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" now = int(time.time()) nonce = os.urandom(48) nonce_encoded = base64.b64encode(nonce) server_account = Account(server_kp.public_key, 10086) challenge_te = (TransactionBuilder( server_account, network_passphrase, 100).append_manage_data_op( data_name="{} auth".format(anchor_name), data_value=nonce_encoded, source=client_kp.public_key, ).add_time_bounds(now, now + 900).build()) challenge_te.sign(server_kp) challenge_te.sign(client_kp) challenge_tx_signed = challenge_te.to_xdr() with pytest.raises( InvalidSep10ChallengeError, match="The transaction sequence number should be zero.", ): verify_challenge_transaction(challenge_tx_signed, server_kp.public_key, network_passphrase)
def test_verify_challenge_transaction_signed_by_client_raise_not_signed( self): server_kp = Keypair.random() client_kp = Keypair.random() timeout = 600 network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction( server_secret=server_kp.secret, client_account_id=client_kp.public_key, anchor_name=anchor_name, network_passphrase=network_passphrase, timeout=timeout, ) transaction = TransactionEnvelope.from_xdr(challenge, network_passphrase) challenge_tx = transaction.to_xdr() with pytest.raises( InvalidSep10ChallengeError, match="Transaction not signed by client: {}.".format( client_kp.public_key), ): verify_challenge_transaction_signed_by_client_master_key( challenge_tx, server_kp.public_key, network_passphrase)
def test_verify_transaction_signatures(self): server_kp = Keypair.random() client_kp_a = Keypair.random() client_kp_b = Keypair.random() client_kp_c = Keypair.random() timeout = 600 network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction( server_secret=server_kp.secret, client_account_id=client_kp_a.public_key, anchor_name=anchor_name, network_passphrase=network_passphrase, timeout=timeout, ) transaction = TransactionEnvelope.from_xdr(challenge, network_passphrase) transaction.sign(client_kp_a) transaction.sign(client_kp_b) transaction.sign(client_kp_c) signers = [ Ed25519PublicKeySigner(client_kp_a.public_key, 1), Ed25519PublicKeySigner(client_kp_b.public_key, 2), Ed25519PublicKeySigner(client_kp_c.public_key, 3), Ed25519PublicKeySigner(Keypair.random().public_key, 4), ] signers_found = _verify_transaction_signatures(transaction, signers) assert signers_found == [ Ed25519PublicKeySigner(client_kp_a.public_key, 1), Ed25519PublicKeySigner(client_kp_b.public_key, 2), Ed25519PublicKeySigner(client_kp_c.public_key, 3), ]
def test_verify_challenge_tx_transaction_is_not_signed_by_the_server(self): server_kp = Keypair.random() client_kp = Keypair.random() network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" timeout = 900 now = int(time.time()) server_keypair = Keypair.from_secret(server_kp.secret) server_account = Account(account_id=server_keypair.public_key, sequence=-1) transaction_builder = TransactionBuilder(server_account, network_passphrase, 100) transaction_builder.add_time_bounds(min_time=now, max_time=now + timeout) nonce = os.urandom(48) nonce_encoded = base64.b64encode(nonce) transaction_builder.append_manage_data_op( data_name="{} auth".format(anchor_name), data_value=nonce_encoded, source=client_kp.public_key, ) challenge = transaction_builder.build().to_xdr() transaction = TransactionEnvelope.from_xdr(challenge, network_passphrase) transaction.sign(client_kp) challenge_tx = transaction.to_xdr() with pytest.raises( InvalidSep10ChallengeError, match="Transaction not signed by server: {}".format( server_kp.public_key), ): verify_challenge_transaction(challenge_tx, server_kp.public_key, network_passphrase)
def test_verify_challenge_tx_not_within_range_of_the_specified_timebounds( self): server_kp = Keypair.random() client_kp = Keypair.random() network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" now = int(time.time()) nonce = os.urandom(48) nonce_encoded = base64.b64encode(nonce) server_account = Account(server_kp.public_key, -1) challenge_te = (TransactionBuilder( server_account, network_passphrase, 100).append_manage_data_op( data_name="{} auth".format(anchor_name), data_value=nonce_encoded, source=client_kp.public_key, ).add_time_bounds(now - 100, now - 50).build()) challenge_te.sign(server_kp) challenge_te.sign(client_kp) challenge_tx_signed = challenge_te.to_xdr() with pytest.raises( InvalidSep10ChallengeError, match= "Transaction is not within range of the specified timebounds.", ): verify_challenge_transaction(challenge_tx_signed, server_kp.public_key, network_passphrase)
def test_verify_challenge_tx_source_is_different_to_server_account_id( self): server_kp = Keypair.random() client_kp = Keypair.random() network_passphrase = Network.TESTNET_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction(server_kp.secret, client_kp.public_key, anchor_name, network_passphrase) transaction = TransactionEnvelope.from_xdr(challenge, network_passphrase) transaction.sign(client_kp) challenge_tx = transaction.to_xdr() with pytest.raises( InvalidSep10ChallengeError, match= "Transaction source account is not equal to server's account.", ): verify_challenge_transaction(challenge_tx, Keypair.random().public_key, network_passphrase)
def test_challenge_transaction(self): server_kp = Keypair.random() client_account_id = "GBDIT5GUJ7R5BXO3GJHFXJ6AZ5UQK6MNOIDMPQUSMXLIHTUNR2Q5CFNF" timeout = 600 network_passphrase = Network.TESTNET_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction( server_secret=server_kp.secret, client_account_id=client_account_id, anchor_name=anchor_name, network_passphrase=network_passphrase, timeout=timeout, ) transaction = TransactionEnvelope.from_xdr( challenge, network_passphrase).transaction assert len(transaction.operations) == 1 op = transaction.operations[0] assert isinstance(op, ManageData) assert op.data_name == "SDF auth" assert len(op.data_value) == 64 assert len(base64.b64decode(op.data_value)) == 48 assert op.source == client_account_id now = int(time.time()) assert now - 3 < transaction.time_bounds.min_time < now + 3 assert (transaction.time_bounds.max_time - transaction.time_bounds.min_time == timeout) assert transaction.source.public_key == server_kp.public_key assert transaction.sequence == 0
def test_verify_challenge_transaction_threshold_raise_not_meet_threshold( self): server_kp = Keypair.random() client_kp_a = Keypair.random() client_kp_b = Keypair.random() client_kp_c = Keypair.random() timeout = 600 network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction( server_secret=server_kp.secret, client_account_id=client_kp_a.public_key, anchor_name=anchor_name, network_passphrase=network_passphrase, timeout=timeout, ) transaction = TransactionEnvelope.from_xdr(challenge, network_passphrase) transaction.sign(client_kp_a) transaction.sign(client_kp_b) transaction.sign(client_kp_c) challenge_tx = transaction.to_xdr() signers = [ Ed25519PublicKeySigner(client_kp_a.public_key, 1), Ed25519PublicKeySigner(client_kp_b.public_key, 2), Ed25519PublicKeySigner(client_kp_c.public_key, 4), Ed25519PublicKeySigner(Keypair.random().public_key, 255), ] med_threshold = 10 with pytest.raises( InvalidSep10ChallengeError, match="signers with weight 7 do not meet threshold 10.", ): verify_challenge_transaction_threshold( challenge_tx, server_kp.public_key, network_passphrase, med_threshold, signers, )
def test_verify_transaction_signatures_raise_no_signature(self): server_kp = Keypair.random() client_kp = Keypair.random() network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" now = int(time.time()) nonce = os.urandom(48) nonce_encoded = base64.b64encode(nonce) server_account = Account(server_kp.public_key, -1) challenge_te = (TransactionBuilder( server_account, network_passphrase, 100).append_manage_data_op( data_name="{} auth".format(anchor_name), data_value=nonce_encoded, source=client_kp.public_key, ).add_time_bounds(now, now + 900).build()) signers = [] with pytest.raises(InvalidSep10ChallengeError, match="Transaction has no signatures."): _verify_transaction_signatures(challenge_te, signers)
def test_verify_challenge_tx_donot_contain_managedata_operation(self): server_kp = Keypair.random() client_kp = Keypair.random() network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE now = int(time.time()) server_account = Account(server_kp.public_key, -1) challenge_te = (TransactionBuilder( server_account, network_passphrase, 100).append_set_options_op().add_time_bounds(now, now + 900).build()) challenge_te.sign(server_kp) challenge_te.sign(client_kp) challenge_tx_signed = challenge_te.to_xdr() with pytest.raises(InvalidSep10ChallengeError, match="Operation type should be ManageData."): verify_challenge_transaction(challenge_tx_signed, server_kp.public_key, network_passphrase)
def test_verify_challenge_transaction(self): server_kp = Keypair.random() client_kp = Keypair.random() timeout = 600 network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction( server_secret=server_kp.secret, client_account_id=client_kp.public_key, anchor_name=anchor_name, network_passphrase=network_passphrase, timeout=timeout, ) transaction = TransactionEnvelope.from_xdr(challenge, network_passphrase) transaction.sign(client_kp) challenge_tx = transaction.to_xdr() verify_challenge_transaction(challenge_tx, server_kp.public_key, network_passphrase)
def test_verify_challenge_transaction_signers_raise_no_server_signature( self): server_kp = Keypair.random() client_kp_a = Keypair.random() client_kp_b = Keypair.random() client_kp_c = Keypair.random() timeout = 600 network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction( server_secret=server_kp.secret, client_account_id=client_kp_a.public_key, anchor_name=anchor_name, network_passphrase=network_passphrase, timeout=timeout, ) transaction = TransactionEnvelope.from_xdr(challenge, network_passphrase) transaction.signatures = [] transaction.sign(client_kp_a) transaction.sign(client_kp_b) transaction.sign(client_kp_c) challenge_tx = transaction.to_xdr() signers = [ Ed25519PublicKeySigner(client_kp_a.public_key, 1), Ed25519PublicKeySigner(client_kp_b.public_key, 2), Ed25519PublicKeySigner(client_kp_c.public_key, 4), Ed25519PublicKeySigner(Keypair.random().public_key, 255), ] with pytest.raises( InvalidSep10ChallengeError, match="Transaction not signed by server: {}.".format( server_kp.public_key), ): verify_challenge_transaction_signers(challenge_tx, server_kp.public_key, network_passphrase, signers)
def test_verify_challenge_tx_dont_contains_timebound(self): server_kp = Keypair.random() client_kp = Keypair.random() network_passphrase = Network.PUBLIC_NETWORK_PASSPHRASE anchor_name = "SDF" nonce = os.urandom(48) nonce_encoded = base64.b64encode(nonce) server_account = Account(server_kp.public_key, -1) challenge_te = (TransactionBuilder( server_account, network_passphrase, 100).append_manage_data_op( data_name="{} auth".format(anchor_name), data_value=nonce_encoded, source=client_kp.public_key, ).build()) challenge_te.sign(server_kp) challenge_te.sign(client_kp) challenge_tx_signed = challenge_te.to_xdr() with pytest.raises(InvalidSep10ChallengeError, match="Transaction requires timebounds."): verify_challenge_transaction(challenge_tx_signed, server_kp.public_key, network_passphrase)
def test_verify_challenge_tx_transaction_is_not_signed_by_the_client(self): server_kp = Keypair.random() client_account_id = "GBDIT5GUJ7R5BXO3GJHFXJ6AZ5UQK6MNOIDMPQUSMXLIHTUNR2Q5CFNF" timeout = 600 network_passphrase = Network.TESTNET_NETWORK_PASSPHRASE anchor_name = "SDF" challenge = build_challenge_transaction( server_secret=server_kp.secret, client_account_id=client_account_id, anchor_name=anchor_name, network_passphrase=network_passphrase, timeout=timeout, ) with pytest.raises( InvalidSep10ChallengeError, match="Transaction not signed by client: {}".format( client_account_id), ): verify_challenge_transaction(challenge, server_kp.public_key, network_passphrase)