sp_keyring/
sr25519.rs

1// This file is part of Substrate.
2
3// Copyright (C) Parity Technologies (UK) Ltd.
4// SPDX-License-Identifier: Apache-2.0
5
6// Licensed under the Apache License, Version 2.0 (the "License");
7// you may not use this file except in compliance with the License.
8// You may obtain a copy of the License at
9//
10// 	http://www.apache.org/licenses/LICENSE-2.0
11//
12// Unless required by applicable law or agreed to in writing, software
13// distributed under the License is distributed on an "AS IS" BASIS,
14// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15// See the License for the specific language governing permissions and
16// limitations under the License.
17
18//! Support code for the runtime. A set of test accounts.
19
20pub use sp_core::sr25519;
21
22use crate::ParseKeyringError;
23#[cfg(feature = "std")]
24use sp_core::sr25519::Signature;
25use sp_core::{
26	hex2array,
27	sr25519::{Pair, Public},
28	ByteArray, Pair as PairT, H256,
29};
30use sp_runtime::AccountId32;
31
32extern crate alloc;
33use alloc::{format, str::FromStr, string::String, vec::Vec};
34
35/// Set of test accounts.
36#[derive(
37	Debug, Clone, Copy, PartialEq, Eq, Hash, strum::Display, strum::EnumIter, Ord, PartialOrd,
38)]
39pub enum Keyring {
40	Alice,
41	Bob,
42	Charlie,
43	Dave,
44	Eve,
45	Ferdie,
46	AliceStash,
47	BobStash,
48	CharlieStash,
49	DaveStash,
50	EveStash,
51	FerdieStash,
52	One,
53	Two,
54}
55
56impl Keyring {
57	pub fn from_public(who: &Public) -> Option<Keyring> {
58		Self::iter().find(|&k| &Public::from(k) == who)
59	}
60
61	pub fn from_account_id(who: &AccountId32) -> Option<Keyring> {
62		Self::iter().find(|&k| &k.to_account_id() == who)
63	}
64
65	pub fn from_raw_public(who: [u8; 32]) -> Option<Keyring> {
66		Self::from_public(&Public::from_raw(who))
67	}
68
69	pub fn to_raw_public(self) -> [u8; 32] {
70		*Public::from(self).as_array_ref()
71	}
72
73	pub fn from_h256_public(who: H256) -> Option<Keyring> {
74		Self::from_public(&Public::from_raw(who.into()))
75	}
76
77	pub fn to_h256_public(self) -> H256 {
78		Public::from(self).as_array_ref().into()
79	}
80
81	pub fn to_raw_public_vec(self) -> Vec<u8> {
82		Public::from(self).to_raw_vec()
83	}
84
85	pub fn to_account_id(self) -> AccountId32 {
86		self.to_raw_public().into()
87	}
88
89	#[cfg(feature = "std")]
90	pub fn sign(self, msg: &[u8]) -> Signature {
91		Pair::from(self).sign(msg)
92	}
93
94	pub fn pair(self) -> Pair {
95		Pair::from_string(&format!("//{}", <&'static str>::from(self)), None)
96			.expect("static values are known good; qed")
97	}
98
99	/// Returns an iterator over all test accounts.
100	pub fn iter() -> impl Iterator<Item = Keyring> {
101		<Self as strum::IntoEnumIterator>::iter()
102	}
103
104	pub fn public(self) -> Public {
105		Public::from(self)
106	}
107
108	pub fn to_seed(self) -> String {
109		format!("//{}", self)
110	}
111
112	/// Create a crypto `Pair` from a numeric value.
113	pub fn numeric(idx: usize) -> Pair {
114		Pair::from_string(&format!("//{}", idx), None).expect("numeric values are known good; qed")
115	}
116
117	/// Get account id of a `numeric` account.
118	pub fn numeric_id(idx: usize) -> AccountId32 {
119		(*Self::numeric(idx).public().as_array_ref()).into()
120	}
121
122	pub fn well_known() -> impl Iterator<Item = Keyring> {
123		Self::iter().take(12)
124	}
125
126	pub fn invulnerable() -> impl Iterator<Item = Keyring> {
127		Self::iter().take(6)
128	}
129}
130
131impl From<Keyring> for &'static str {
132	fn from(k: Keyring) -> Self {
133		match k {
134			Keyring::Alice => "Alice",
135			Keyring::Bob => "Bob",
136			Keyring::Charlie => "Charlie",
137			Keyring::Dave => "Dave",
138			Keyring::Eve => "Eve",
139			Keyring::Ferdie => "Ferdie",
140			Keyring::AliceStash => "Alice//stash",
141			Keyring::BobStash => "Bob//stash",
142			Keyring::CharlieStash => "Charlie//stash",
143			Keyring::DaveStash => "Dave//stash",
144			Keyring::EveStash => "Eve//stash",
145			Keyring::FerdieStash => "Ferdie//stash",
146			Keyring::One => "One",
147			Keyring::Two => "Two",
148		}
149	}
150}
151
152impl From<Keyring> for sp_runtime::MultiSigner {
153	fn from(x: Keyring) -> Self {
154		sp_runtime::MultiSigner::Sr25519(x.into())
155	}
156}
157
158impl FromStr for Keyring {
159	type Err = ParseKeyringError;
160
161	fn from_str(s: &str) -> Result<Self, <Self as FromStr>::Err> {
162		match s {
163			"Alice" | "alice" => Ok(Keyring::Alice),
164			"Bob" | "bob" => Ok(Keyring::Bob),
165			"Charlie" | "charlie" => Ok(Keyring::Charlie),
166			"Dave" | "dave" => Ok(Keyring::Dave),
167			"Eve" | "eve" => Ok(Keyring::Eve),
168			"Ferdie" | "ferdie" => Ok(Keyring::Ferdie),
169			"Alice//stash" | "alice//stash" => Ok(Keyring::AliceStash),
170			"Bob//stash" | "bob//stash" => Ok(Keyring::BobStash),
171			"Charlie//stash" | "charlie//stash" => Ok(Keyring::CharlieStash),
172			"Dave//stash" | "dave//stash" => Ok(Keyring::DaveStash),
173			"Eve//stash" | "eve//stash" => Ok(Keyring::EveStash),
174			"Ferdie//stash" | "ferdie//stash" => Ok(Keyring::FerdieStash),
175			"One" | "one" => Ok(Keyring::One),
176			"Two" | "two" => Ok(Keyring::Two),
177			_ => Err(ParseKeyringError),
178		}
179	}
180}
181
182impl From<Keyring> for AccountId32 {
183	fn from(k: Keyring) -> Self {
184		k.to_account_id()
185	}
186}
187
188impl From<Keyring> for Public {
189	fn from(k: Keyring) -> Self {
190		Public::from_raw(k.into())
191	}
192}
193
194impl From<Keyring> for Pair {
195	fn from(k: Keyring) -> Self {
196		k.pair()
197	}
198}
199
200impl From<Keyring> for [u8; 32] {
201	fn from(k: Keyring) -> Self {
202		match k {
203			Keyring::Alice =>
204				hex2array!("d43593c715fdd31c61141abd04a99fd6822c8558854ccde39a5684e7a56da27d"),
205			Keyring::Bob =>
206				hex2array!("8eaf04151687736326c9fea17e25fc5287613693c912909cb226aa4794f26a48"),
207			Keyring::Charlie =>
208				hex2array!("90b5ab205c6974c9ea841be688864633dc9ca8a357843eeacf2314649965fe22"),
209			Keyring::Dave =>
210				hex2array!("306721211d5404bd9da88e0204360a1a9ab8b87c66c1bc2fcdd37f3c2222cc20"),
211			Keyring::Eve =>
212				hex2array!("e659a7a1628cdd93febc04a4e0646ea20e9f5f0ce097d9a05290d4a9e054df4e"),
213			Keyring::Ferdie =>
214				hex2array!("1cbd2d43530a44705ad088af313e18f80b53ef16b36177cd4b77b846f2a5f07c"),
215			Keyring::AliceStash =>
216				hex2array!("be5ddb1579b72e84524fc29e78609e3caf42e85aa118ebfe0b0ad404b5bdd25f"),
217			Keyring::BobStash =>
218				hex2array!("fe65717dad0447d715f660a0a58411de509b42e6efb8375f562f58a554d5860e"),
219			Keyring::CharlieStash =>
220				hex2array!("1e07379407fecc4b89eb7dbd287c2c781cfb1907a96947a3eb18e4f8e7198625"),
221			Keyring::DaveStash =>
222				hex2array!("e860f1b1c7227f7c22602f53f15af80747814dffd839719731ee3bba6edc126c"),
223			Keyring::EveStash =>
224				hex2array!("8ac59e11963af19174d0b94d5d78041c233f55d2e19324665bafdfb62925af2d"),
225			Keyring::FerdieStash =>
226				hex2array!("101191192fc877c24d725b337120fa3edc63d227bbc92705db1e2cb65f56981a"),
227			Keyring::One =>
228				hex2array!("ac859f8a216eeb1b320b4c76d118da3d7407fa523484d0a980126d3b4d0d220a"),
229			Keyring::Two =>
230				hex2array!("1254f7017f0b8347ce7ab14f96d818802e7e9e0c0d1b7c9acb3c726b080e7a03"),
231		}
232	}
233}
234
235impl From<Keyring> for H256 {
236	fn from(k: Keyring) -> Self {
237		k.into()
238	}
239}
240
241#[cfg(test)]
242mod tests {
243	use super::*;
244	use sp_core::{sr25519::Pair, Pair as PairT};
245
246	#[test]
247	fn should_work() {
248		assert!(Pair::verify(
249			&Keyring::Alice.sign(b"I am Alice!"),
250			b"I am Alice!",
251			&Keyring::Alice.public(),
252		));
253		assert!(!Pair::verify(
254			&Keyring::Alice.sign(b"I am Alice!"),
255			b"I am Bob!",
256			&Keyring::Alice.public(),
257		));
258		assert!(!Pair::verify(
259			&Keyring::Alice.sign(b"I am Alice!"),
260			b"I am Alice!",
261			&Keyring::Bob.public(),
262		));
263	}
264
265	#[test]
266	fn verify_static_public_keys() {
267		assert!(Keyring::iter().all(|k| { k.pair().public().as_ref() == <[u8; 32]>::from(k) }));
268	}
269
270	#[test]
271	fn verify_well_known() {
272		assert_eq!(
273			Keyring::well_known().collect::<Vec<Keyring>>(),
274			vec![
275				Keyring::Alice,
276				Keyring::Bob,
277				Keyring::Charlie,
278				Keyring::Dave,
279				Keyring::Eve,
280				Keyring::Ferdie,
281				Keyring::AliceStash,
282				Keyring::BobStash,
283				Keyring::CharlieStash,
284				Keyring::DaveStash,
285				Keyring::EveStash,
286				Keyring::FerdieStash
287			]
288		);
289	}
290
291	#[test]
292	fn verify_invulnerable() {
293		assert_eq!(
294			Keyring::invulnerable().collect::<Vec<Keyring>>(),
295			vec![
296				Keyring::Alice,
297				Keyring::Bob,
298				Keyring::Charlie,
299				Keyring::Dave,
300				Keyring::Eve,
301				Keyring::Ferdie
302			]
303		);
304	}
305}