mirror of
https://github.com/nspcc-dev/neo-go.git
synced 2024-11-30 09:33:36 +00:00
d6bd6b6888
It can be used to attack the network (amplifying DOS), so it's broken
beyond repair. This reverts ac601601c1
.
See also neo-project/neo#2560 and neo-project/neo#2561.
308 lines
12 KiB
Go
308 lines
12 KiB
Go
package compiler_test
|
|
|
|
import (
|
|
"fmt"
|
|
"math/big"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/config"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/interop"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/interop/interopnames"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/native"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/native/noderoles"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/transaction"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/crypto"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/gas"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/ledger"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/management"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/neo"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/notary"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/oracle"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/policy"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/roles"
|
|
"github.com/nspcc-dev/neo-go/pkg/interop/native/std"
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract"
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract/callflag"
|
|
"github.com/nspcc-dev/neo-go/pkg/util"
|
|
"github.com/nspcc-dev/neo-go/pkg/vm"
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/stackitem"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestContractHashes(t *testing.T) {
|
|
cfg := config.ProtocolConfiguration{P2PSigExtensions: true}
|
|
cs := native.NewContracts(cfg)
|
|
require.Equalf(t, []byte(neo.Hash), cs.NEO.Hash.BytesBE(), "%q", string(cs.NEO.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(gas.Hash), cs.GAS.Hash.BytesBE(), "%q", string(cs.GAS.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(oracle.Hash), cs.Oracle.Hash.BytesBE(), "%q", string(cs.Oracle.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(roles.Hash), cs.Designate.Hash.BytesBE(), "%q", string(cs.Designate.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(policy.Hash), cs.Policy.Hash.BytesBE(), "%q", string(cs.Policy.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(ledger.Hash), cs.Ledger.Hash.BytesBE(), "%q", string(cs.Ledger.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(management.Hash), cs.Management.Hash.BytesBE(), "%q", string(cs.Management.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(notary.Hash), cs.Notary.Hash.BytesBE(), "%q", string(cs.Notary.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(crypto.Hash), cs.Crypto.Hash.BytesBE(), "%q", string(cs.Crypto.Hash.BytesBE()))
|
|
require.Equalf(t, []byte(std.Hash), cs.Std.Hash.BytesBE(), "%q", string(cs.Std.Hash.BytesBE()))
|
|
}
|
|
|
|
func TestContractParameterTypes(t *testing.T) {
|
|
require.EqualValues(t, management.AnyType, smartcontract.AnyType)
|
|
require.EqualValues(t, management.BoolType, smartcontract.BoolType)
|
|
require.EqualValues(t, management.IntegerType, smartcontract.IntegerType)
|
|
require.EqualValues(t, management.ByteArrayType, smartcontract.ByteArrayType)
|
|
require.EqualValues(t, management.StringType, smartcontract.StringType)
|
|
require.EqualValues(t, management.Hash160Type, smartcontract.Hash160Type)
|
|
require.EqualValues(t, management.Hash256Type, smartcontract.Hash256Type)
|
|
require.EqualValues(t, management.PublicKeyType, smartcontract.PublicKeyType)
|
|
require.EqualValues(t, management.SignatureType, smartcontract.SignatureType)
|
|
require.EqualValues(t, management.ArrayType, smartcontract.ArrayType)
|
|
require.EqualValues(t, management.MapType, smartcontract.MapType)
|
|
require.EqualValues(t, management.InteropInterfaceType, smartcontract.InteropInterfaceType)
|
|
require.EqualValues(t, management.VoidType, smartcontract.VoidType)
|
|
}
|
|
|
|
func TestRoleManagementRole(t *testing.T) {
|
|
require.EqualValues(t, noderoles.Oracle, roles.Oracle)
|
|
require.EqualValues(t, noderoles.StateValidator, roles.StateValidator)
|
|
require.EqualValues(t, noderoles.NeoFSAlphabet, roles.NeoFSAlphabet)
|
|
require.EqualValues(t, noderoles.P2PNotary, roles.P2PNotary)
|
|
}
|
|
|
|
func TestCryptoLibNamedCurve(t *testing.T) {
|
|
require.EqualValues(t, native.Secp256k1, crypto.Secp256k1)
|
|
require.EqualValues(t, native.Secp256r1, crypto.Secp256r1)
|
|
}
|
|
|
|
func TestOracleContractValues(t *testing.T) {
|
|
require.EqualValues(t, oracle.Success, transaction.Success)
|
|
require.EqualValues(t, oracle.ProtocolNotSupported, transaction.ProtocolNotSupported)
|
|
require.EqualValues(t, oracle.ConsensusUnreachable, transaction.ConsensusUnreachable)
|
|
require.EqualValues(t, oracle.NotFound, transaction.NotFound)
|
|
require.EqualValues(t, oracle.Timeout, transaction.Timeout)
|
|
require.EqualValues(t, oracle.Forbidden, transaction.Forbidden)
|
|
require.EqualValues(t, oracle.ResponseTooLarge, transaction.ResponseTooLarge)
|
|
require.EqualValues(t, oracle.InsufficientFunds, transaction.InsufficientFunds)
|
|
require.EqualValues(t, oracle.Error, transaction.Error)
|
|
|
|
require.EqualValues(t, oracle.MinimumResponseGas, native.MinimumResponseGas)
|
|
}
|
|
|
|
type nativeTestCase struct {
|
|
method string
|
|
params []string
|
|
}
|
|
|
|
// Here we test that corresponding method does exist, is invoked and correct value is returned.
|
|
func TestNativeHelpersCompile(t *testing.T) {
|
|
cfg := config.ProtocolConfiguration{P2PSigExtensions: true}
|
|
cs := native.NewContracts(cfg)
|
|
u160 := `interop.Hash160("aaaaaaaaaaaaaaaaaaaa")`
|
|
u256 := `interop.Hash256("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")`
|
|
pub := `interop.PublicKey("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")`
|
|
sig := `interop.Signature("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")`
|
|
nep17TestCases := []nativeTestCase{
|
|
{"balanceOf", []string{u160}},
|
|
{"decimals", nil},
|
|
{"symbol", nil},
|
|
{"totalSupply", nil},
|
|
{"transfer", []string{u160, u160, "123", "nil"}},
|
|
}
|
|
runNativeTestCases(t, cs.NEO.ContractMD, "neo", append([]nativeTestCase{
|
|
{"getCandidates", nil},
|
|
{"getCommittee", nil},
|
|
{"getGasPerBlock", nil},
|
|
{"getNextBlockValidators", nil},
|
|
{"getRegisterPrice", nil},
|
|
{"registerCandidate", []string{pub}},
|
|
{"setGasPerBlock", []string{"1"}},
|
|
{"setRegisterPrice", []string{"10"}},
|
|
{"vote", []string{u160, pub}},
|
|
{"unclaimedGas", []string{u160, "123"}},
|
|
{"unregisterCandidate", []string{pub}},
|
|
{"getAccountState", []string{u160}},
|
|
}, nep17TestCases...))
|
|
runNativeTestCases(t, cs.GAS.ContractMD, "gas", nep17TestCases)
|
|
runNativeTestCases(t, cs.Oracle.ContractMD, "oracle", []nativeTestCase{
|
|
{"getPrice", nil},
|
|
{"request", []string{`"url"`, "nil", `"callback"`, "nil", "123"}},
|
|
{"setPrice", []string{"10"}},
|
|
})
|
|
runNativeTestCases(t, cs.Designate.ContractMD, "roles", []nativeTestCase{
|
|
{"designateAsRole", []string{"1", "[]interop.PublicKey{}"}},
|
|
{"getDesignatedByRole", []string{"1", "1000"}},
|
|
})
|
|
runNativeTestCases(t, cs.Policy.ContractMD, "policy", []nativeTestCase{
|
|
{"blockAccount", []string{u160}},
|
|
{"getExecFeeFactor", nil},
|
|
{"getFeePerByte", nil},
|
|
{"getStoragePrice", nil},
|
|
{"isBlocked", []string{u160}},
|
|
{"setExecFeeFactor", []string{"42"}},
|
|
{"setFeePerByte", []string{"42"}},
|
|
{"setStoragePrice", []string{"42"}},
|
|
{"unblockAccount", []string{u160}},
|
|
})
|
|
runNativeTestCases(t, cs.Ledger.ContractMD, "ledger", []nativeTestCase{
|
|
{"currentHash", nil},
|
|
{"currentIndex", nil},
|
|
{"getBlock", []string{"1"}},
|
|
{"getTransaction", []string{u256}},
|
|
{"getTransactionFromBlock", []string{u256, "1"}},
|
|
{"getTransactionHeight", []string{u256}},
|
|
})
|
|
runNativeTestCases(t, cs.Notary.ContractMD, "notary", []nativeTestCase{
|
|
{"lockDepositUntil", []string{u160, "123"}},
|
|
{"withdraw", []string{u160, u160}},
|
|
{"balanceOf", []string{u160}},
|
|
{"expirationOf", []string{u160}},
|
|
{"getMaxNotValidBeforeDelta", nil},
|
|
{"setMaxNotValidBeforeDelta", []string{"42"}},
|
|
})
|
|
runNativeTestCases(t, cs.Management.ContractMD, "management", []nativeTestCase{
|
|
{"deploy", []string{"nil", "nil"}},
|
|
{"deployWithData", []string{"nil", "nil", "123"}},
|
|
{"destroy", nil},
|
|
{"getContract", []string{u160}},
|
|
{"getMinimumDeploymentFee", nil},
|
|
{"setMinimumDeploymentFee", []string{"42"}},
|
|
{"update", []string{"nil", "nil"}},
|
|
{"updateWithData", []string{"nil", "nil", "123"}},
|
|
})
|
|
runNativeTestCases(t, cs.Crypto.ContractMD, "crypto", []nativeTestCase{
|
|
{"sha256", []string{"[]byte{1, 2, 3}"}},
|
|
{"ripemd160", []string{"[]byte{1, 2, 3}"}},
|
|
{"verifyWithECDsa", []string{"[]byte{1, 2, 3}", pub, sig, "crypto.Secp256k1"}},
|
|
})
|
|
runNativeTestCases(t, cs.Std.ContractMD, "std", []nativeTestCase{
|
|
{"serialize", []string{"[]byte{1, 2, 3}"}},
|
|
{"deserialize", []string{"[]byte{1, 2, 3}"}},
|
|
{"jsonSerialize", []string{"[]byte{1, 2, 3}"}},
|
|
{"jsonDeserialize", []string{"[]byte{1, 2, 3}"}},
|
|
{"base64Encode", []string{"[]byte{1, 2, 3}"}},
|
|
{"base64Decode", []string{"[]byte{1, 2, 3}"}},
|
|
{"base58Encode", []string{"[]byte{1, 2, 3}"}},
|
|
{"base58Decode", []string{"[]byte{1, 2, 3}"}},
|
|
{"base58CheckEncode", []string{"[]byte{1, 2, 3}"}},
|
|
{"base58CheckDecode", []string{"[]byte{1, 2, 3}"}},
|
|
{"itoa", []string{"4", "10"}},
|
|
{"itoa10", []string{"4"}},
|
|
{"atoi", []string{`"4"`, "10"}},
|
|
{"atoi10", []string{`"4"`}},
|
|
{"memoryCompare", []string{"[]byte{1}", "[]byte{2}"}},
|
|
{"memorySearch", []string{"[]byte{1}", "[]byte{2}"}},
|
|
{"memorySearchIndex", []string{"[]byte{1}", "[]byte{2}", "3"}},
|
|
{"memorySearchLastIndex", []string{"[]byte{1}", "[]byte{2}", "3"}},
|
|
{"stringSplit", []string{`"a,b"`, `","`}},
|
|
{"stringSplitNonEmpty", []string{`"a,b"`, `","`}},
|
|
})
|
|
}
|
|
|
|
func runNativeTestCases(t *testing.T, ctr interop.ContractMD, name string, testCases []nativeTestCase) {
|
|
t.Run(ctr.Name, func(t *testing.T) {
|
|
for _, tc := range testCases {
|
|
t.Run(tc.method, func(t *testing.T) {
|
|
runNativeTestCase(t, ctr, name, tc.method, tc.params...)
|
|
})
|
|
}
|
|
})
|
|
}
|
|
|
|
func getMethod(t *testing.T, ctr interop.ContractMD, name string, params []string) interop.MethodAndPrice {
|
|
paramLen := len(params)
|
|
|
|
switch {
|
|
case name == "itoa10" || name == "atoi10":
|
|
name = name[:4]
|
|
case strings.HasPrefix(name, "memorySearch"):
|
|
if strings.HasSuffix(name, "LastIndex") {
|
|
paramLen++ // true should be appended inside of an interop
|
|
}
|
|
name = "memorySearch"
|
|
case strings.HasPrefix(name, "stringSplit"):
|
|
if strings.HasSuffix(name, "NonEmpty") {
|
|
paramLen++ // true should be appended inside of an interop
|
|
}
|
|
name = "stringSplit"
|
|
default:
|
|
name = strings.TrimSuffix(name, "WithData")
|
|
}
|
|
|
|
md, ok := ctr.GetMethod(name, paramLen)
|
|
require.True(t, ok)
|
|
return md
|
|
}
|
|
|
|
func runNativeTestCase(t *testing.T, ctr interop.ContractMD, name, method string, params ...string) {
|
|
md := getMethod(t, ctr, method, params)
|
|
isVoid := md.MD.ReturnType == smartcontract.VoidType
|
|
srcTmpl := `package foo
|
|
import "github.com/nspcc-dev/neo-go/pkg/interop/native/%s"
|
|
import "github.com/nspcc-dev/neo-go/pkg/interop"
|
|
var _ interop.Hash160
|
|
`
|
|
if isVoid {
|
|
srcTmpl += `func Main() { %s.%s(%s) }`
|
|
} else {
|
|
srcTmpl += `func Main() interface{} { return %s.%s(%s) }`
|
|
}
|
|
methodUpper := strings.ToUpper(method[:1]) + method[1:] // ASCII only
|
|
methodUpper = strings.ReplaceAll(methodUpper, "Gas", "GAS")
|
|
methodUpper = strings.ReplaceAll(methodUpper, "Json", "JSON")
|
|
src := fmt.Sprintf(srcTmpl, name, name, methodUpper, strings.Join(params, ","))
|
|
|
|
v, s := vmAndCompileInterop(t, src)
|
|
id := interopnames.ToID([]byte(interopnames.SystemContractCall))
|
|
result := getTestStackItem(md.MD.ReturnType)
|
|
s.interops[id] = testContractCall(t, ctr.Hash, md, result)
|
|
require.NoError(t, v.Run())
|
|
if isVoid {
|
|
require.Equal(t, 0, v.Estack().Len())
|
|
return
|
|
}
|
|
require.Equal(t, 1, v.Estack().Len(), "stack contains unexpected items")
|
|
require.Equal(t, result.Value(), v.Estack().Pop().Item().Value())
|
|
}
|
|
|
|
func getTestStackItem(typ smartcontract.ParamType) stackitem.Item {
|
|
switch typ {
|
|
case smartcontract.AnyType, smartcontract.VoidType:
|
|
return stackitem.Null{}
|
|
case smartcontract.BoolType:
|
|
return stackitem.NewBool(true)
|
|
case smartcontract.IntegerType:
|
|
return stackitem.NewBigInteger(big.NewInt(42))
|
|
case smartcontract.ByteArrayType, smartcontract.StringType, smartcontract.Hash160Type,
|
|
smartcontract.Hash256Type, smartcontract.PublicKeyType, smartcontract.SignatureType:
|
|
return stackitem.NewByteArray([]byte("result"))
|
|
case smartcontract.ArrayType:
|
|
return stackitem.NewArray([]stackitem.Item{stackitem.NewBool(true), stackitem.Null{}})
|
|
case smartcontract.MapType:
|
|
return stackitem.NewMapWithValue([]stackitem.MapElement{{
|
|
Key: stackitem.NewByteArray([]byte{1, 2, 3}),
|
|
Value: stackitem.NewByteArray([]byte{5, 6, 7}),
|
|
}})
|
|
case smartcontract.InteropInterfaceType:
|
|
return stackitem.NewInterop(42)
|
|
default:
|
|
panic("unexpected type")
|
|
}
|
|
}
|
|
|
|
func testContractCall(t *testing.T, hash util.Uint160, md interop.MethodAndPrice, result stackitem.Item) func(*vm.VM) error {
|
|
return func(v *vm.VM) error {
|
|
h := v.Estack().Pop().Bytes()
|
|
require.Equal(t, hash.BytesBE(), h)
|
|
|
|
method := v.Estack().Pop().String()
|
|
require.Equal(t, md.MD.Name, method)
|
|
|
|
fs := callflag.CallFlag(int32(v.Estack().Pop().BigInt().Int64()))
|
|
require.Equal(t, fs, md.RequiredFlags)
|
|
|
|
args := v.Estack().Pop().Array()
|
|
require.Equal(t, len(md.MD.Parameters), len(args))
|
|
|
|
v.Estack().PushVal(result)
|
|
return nil
|
|
}
|
|
}
|