9d2ef775cf
They never return errors, so their interface should reflect that. This allows to remove quite a lot of useless and never tested code. Notice that Get still does return an error. It can be made not to do that, but usually we need to differentiate between successful/unsuccessful accesses anyway, so this doesn't help much.
1576 lines
52 KiB
Go
1576 lines
52 KiB
Go
package core
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"math"
|
|
"math/big"
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
"github.com/nspcc-dev/neo-go/internal/random"
|
|
"github.com/nspcc-dev/neo-go/internal/testchain"
|
|
"github.com/nspcc-dev/neo-go/pkg/config"
|
|
"github.com/nspcc-dev/neo-go/pkg/config/netmode"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/block"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/dao"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/interop"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/interop/contract"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/interop/interopnames"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/interop/iterator"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/interop/runtime"
|
|
istorage "github.com/nspcc-dev/neo-go/pkg/core/interop/storage"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/native"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/state"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/storage"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/transaction"
|
|
"github.com/nspcc-dev/neo-go/pkg/crypto/hash"
|
|
"github.com/nspcc-dev/neo-go/pkg/crypto/keys"
|
|
"github.com/nspcc-dev/neo-go/pkg/io"
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract"
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract/callflag"
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract/manifest"
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract/nef"
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract/trigger"
|
|
"github.com/nspcc-dev/neo-go/pkg/util"
|
|
"github.com/nspcc-dev/neo-go/pkg/vm"
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/emit"
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/opcode"
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/stackitem"
|
|
"github.com/nspcc-dev/neo-go/pkg/wallet"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
// Tests are taken from
|
|
// https://github.com/neo-project/neo/blob/master/tests/neo.UnitTests/SmartContract/UT_ApplicationEngine.Runtime.cs
|
|
func TestRuntimeGetRandomCompatibility(t *testing.T) {
|
|
bc := newTestChain(t)
|
|
|
|
b := getSharpTestGenesis(t)
|
|
tx := getSharpTestTx(util.Uint160{})
|
|
ic := bc.newInteropContext(trigger.Application, bc.dao.GetWrapped(), b, tx)
|
|
ic.Network = 5195086 // Old mainnet magic used by C# tests.
|
|
|
|
ic.VM = vm.New()
|
|
ic.VM.LoadScript([]byte{0x01})
|
|
|
|
require.NoError(t, runtime.GetRandom(ic))
|
|
require.Equal(t, "225932872514876835587448704843370203748", ic.VM.Estack().Pop().BigInt().String())
|
|
|
|
require.NoError(t, runtime.GetRandom(ic))
|
|
require.Equal(t, "190129535548110356450238097068474508661", ic.VM.Estack().Pop().BigInt().String())
|
|
|
|
require.NoError(t, runtime.GetRandom(ic))
|
|
require.Equal(t, "48930406787011198493485648810190184269", ic.VM.Estack().Pop().BigInt().String())
|
|
|
|
require.NoError(t, runtime.GetRandom(ic))
|
|
require.Equal(t, "66199389469641263539889463157823839112", ic.VM.Estack().Pop().BigInt().String())
|
|
|
|
require.NoError(t, runtime.GetRandom(ic))
|
|
require.Equal(t, "217172703763162599519098299724476526911", ic.VM.Estack().Pop().BigInt().String())
|
|
}
|
|
|
|
func TestRuntimeGetRandomDifferentTransactions(t *testing.T) {
|
|
bc := newTestChain(t)
|
|
b, _ := bc.GetBlock(bc.GetHeaderHash(0))
|
|
|
|
tx1 := transaction.New([]byte{byte(opcode.PUSH1)}, 0)
|
|
ic1 := bc.newInteropContext(trigger.Application, bc.dao.GetWrapped(), b, tx1)
|
|
ic1.VM = vm.New()
|
|
ic1.VM.LoadScript(tx1.Script)
|
|
|
|
tx2 := transaction.New([]byte{byte(opcode.PUSH2)}, 0)
|
|
ic2 := bc.newInteropContext(trigger.Application, bc.dao.GetWrapped(), b, tx2)
|
|
ic2.VM = vm.New()
|
|
ic2.VM.LoadScript(tx2.Script)
|
|
|
|
require.NoError(t, runtime.GetRandom(ic1))
|
|
require.NoError(t, runtime.GetRandom(ic2))
|
|
require.NotEqual(t, ic1.VM.Estack().Pop().BigInt(), ic2.VM.Estack().Pop().BigInt())
|
|
|
|
require.NoError(t, runtime.GetRandom(ic1))
|
|
require.NoError(t, runtime.GetRandom(ic2))
|
|
require.NotEqual(t, ic1.VM.Estack().Pop().BigInt(), ic2.VM.Estack().Pop().BigInt())
|
|
}
|
|
|
|
func getSharpTestTx(sender util.Uint160) *transaction.Transaction {
|
|
tx := transaction.New([]byte{byte(opcode.PUSH2)}, 0)
|
|
tx.Nonce = 0
|
|
tx.Signers = append(tx.Signers, transaction.Signer{
|
|
Account: sender,
|
|
Scopes: transaction.CalledByEntry,
|
|
})
|
|
tx.Scripts = append(tx.Scripts, transaction.Witness{})
|
|
return tx
|
|
}
|
|
|
|
func getSharpTestGenesis(t *testing.T) *block.Block {
|
|
const configPath = "../../config"
|
|
|
|
cfg, err := config.Load(configPath, netmode.MainNet)
|
|
require.NoError(t, err)
|
|
b, err := createGenesisBlock(cfg.ProtocolConfiguration)
|
|
require.NoError(t, err)
|
|
return b
|
|
}
|
|
|
|
func TestContractCreateAccount(t *testing.T) {
|
|
v, ic, _ := createVM(t)
|
|
t.Run("Good", func(t *testing.T) {
|
|
priv, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
pub := priv.PublicKey()
|
|
v.Estack().PushVal(pub.Bytes())
|
|
require.NoError(t, contractCreateStandardAccount(ic))
|
|
|
|
value := v.Estack().Pop().Bytes()
|
|
u, err := util.Uint160DecodeBytesBE(value)
|
|
require.NoError(t, err)
|
|
require.Equal(t, pub.GetScriptHash(), u)
|
|
})
|
|
t.Run("InvalidKey", func(t *testing.T) {
|
|
v.Estack().PushVal([]byte{1, 2, 3})
|
|
require.Error(t, contractCreateStandardAccount(ic))
|
|
})
|
|
}
|
|
|
|
func TestContractCreateMultisigAccount(t *testing.T) {
|
|
v, ic, _ := createVM(t)
|
|
t.Run("Good", func(t *testing.T) {
|
|
m, n := 3, 5
|
|
pubs := make(keys.PublicKeys, n)
|
|
arr := make([]stackitem.Item, n)
|
|
for i := range pubs {
|
|
pk, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
pubs[i] = pk.PublicKey()
|
|
arr[i] = stackitem.Make(pubs[i].Bytes())
|
|
}
|
|
v.Estack().PushVal(stackitem.Make(arr))
|
|
v.Estack().PushVal(m)
|
|
require.NoError(t, contractCreateMultisigAccount(ic))
|
|
|
|
expected, err := smartcontract.CreateMultiSigRedeemScript(m, pubs)
|
|
require.NoError(t, err)
|
|
value := v.Estack().Pop().Bytes()
|
|
u, err := util.Uint160DecodeBytesBE(value)
|
|
require.NoError(t, err)
|
|
require.Equal(t, hash.Hash160(expected), u)
|
|
})
|
|
t.Run("InvalidKey", func(t *testing.T) {
|
|
v.Estack().PushVal(stackitem.Make([]stackitem.Item{stackitem.Make([]byte{1, 2, 3})}))
|
|
v.Estack().PushVal(1)
|
|
require.Error(t, contractCreateMultisigAccount(ic))
|
|
})
|
|
t.Run("Invalid m", func(t *testing.T) {
|
|
pk, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
v.Estack().PushVal(stackitem.Make([]stackitem.Item{stackitem.Make(pk.PublicKey().Bytes())}))
|
|
v.Estack().PushVal(2)
|
|
require.Error(t, contractCreateMultisigAccount(ic))
|
|
})
|
|
t.Run("m overflows int64", func(t *testing.T) {
|
|
pk, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
v.Estack().PushVal(stackitem.Make([]stackitem.Item{stackitem.Make(pk.PublicKey().Bytes())}))
|
|
m := big.NewInt(math.MaxInt64)
|
|
m.Add(m, big.NewInt(1))
|
|
v.Estack().PushVal(stackitem.NewBigInteger(m))
|
|
require.Error(t, contractCreateMultisigAccount(ic))
|
|
})
|
|
}
|
|
|
|
func TestRuntimeGasLeft(t *testing.T) {
|
|
v, ic, _ := createVM(t)
|
|
|
|
v.GasLimit = 100
|
|
v.AddGas(58)
|
|
require.NoError(t, runtime.GasLeft(ic))
|
|
require.EqualValues(t, 42, v.Estack().Pop().BigInt().Int64())
|
|
}
|
|
|
|
func TestRuntimeGetNotifications(t *testing.T) {
|
|
v, ic, _ := createVM(t)
|
|
|
|
ic.Notifications = []state.NotificationEvent{
|
|
{ScriptHash: util.Uint160{1}, Name: "Event1", Item: stackitem.NewArray([]stackitem.Item{stackitem.NewByteArray([]byte{11})})},
|
|
{ScriptHash: util.Uint160{2}, Name: "Event2", Item: stackitem.NewArray([]stackitem.Item{stackitem.NewByteArray([]byte{22})})},
|
|
{ScriptHash: util.Uint160{1}, Name: "Event1", Item: stackitem.NewArray([]stackitem.Item{stackitem.NewByteArray([]byte{33})})},
|
|
}
|
|
|
|
t.Run("NoFilter", func(t *testing.T) {
|
|
v.Estack().PushVal(stackitem.Null{})
|
|
require.NoError(t, runtime.GetNotifications(ic))
|
|
|
|
arr := v.Estack().Pop().Array()
|
|
require.Equal(t, len(ic.Notifications), len(arr))
|
|
for i := range arr {
|
|
elem := arr[i].Value().([]stackitem.Item)
|
|
require.Equal(t, ic.Notifications[i].ScriptHash.BytesBE(), elem[0].Value())
|
|
name, err := stackitem.ToString(elem[1])
|
|
require.NoError(t, err)
|
|
require.Equal(t, ic.Notifications[i].Name, name)
|
|
require.Equal(t, ic.Notifications[i].Item, elem[2])
|
|
}
|
|
})
|
|
|
|
t.Run("WithFilter", func(t *testing.T) {
|
|
h := util.Uint160{2}.BytesBE()
|
|
v.Estack().PushVal(h)
|
|
require.NoError(t, runtime.GetNotifications(ic))
|
|
|
|
arr := v.Estack().Pop().Array()
|
|
require.Equal(t, 1, len(arr))
|
|
elem := arr[0].Value().([]stackitem.Item)
|
|
require.Equal(t, h, elem[0].Value())
|
|
name, err := stackitem.ToString(elem[1])
|
|
require.NoError(t, err)
|
|
require.Equal(t, ic.Notifications[1].Name, name)
|
|
require.Equal(t, ic.Notifications[1].Item, elem[2])
|
|
})
|
|
}
|
|
|
|
func TestRuntimeGetInvocationCounter(t *testing.T) {
|
|
v, ic, bc := createVM(t)
|
|
|
|
cs, _ := getTestContractState(t, 4, 5, random.Uint160()) // sender and IDs are not important for the test
|
|
require.NoError(t, bc.contracts.Management.PutContractState(ic.DAO, cs))
|
|
|
|
ic.Invocations[hash.Hash160([]byte{2})] = 42
|
|
|
|
t.Run("No invocations", func(t *testing.T) {
|
|
v.Load([]byte{1})
|
|
// do not return an error in this case.
|
|
require.NoError(t, runtime.GetInvocationCounter(ic))
|
|
require.EqualValues(t, 1, v.Estack().Pop().BigInt().Int64())
|
|
})
|
|
t.Run("NonZero", func(t *testing.T) {
|
|
v.Load([]byte{2})
|
|
require.NoError(t, runtime.GetInvocationCounter(ic))
|
|
require.EqualValues(t, 42, v.Estack().Pop().BigInt().Int64())
|
|
})
|
|
t.Run("Contract", func(t *testing.T) {
|
|
w := io.NewBufBinWriter()
|
|
emit.AppCall(w.BinWriter, cs.Hash, "invocCounter", callflag.All)
|
|
v.LoadWithFlags(w.Bytes(), callflag.All)
|
|
require.NoError(t, v.Run())
|
|
require.EqualValues(t, 1, v.Estack().Pop().BigInt().Int64())
|
|
})
|
|
}
|
|
|
|
func TestStoragePut(t *testing.T) {
|
|
_, cs, ic, bc := createVMAndContractState(t)
|
|
|
|
require.NoError(t, bc.contracts.Management.PutContractState(ic.DAO, cs))
|
|
|
|
initVM := func(t *testing.T, key, value []byte, gas int64) {
|
|
v := ic.SpawnVM()
|
|
v.LoadScript(cs.NEF.Script)
|
|
v.GasLimit = gas
|
|
v.Estack().PushVal(value)
|
|
v.Estack().PushVal(key)
|
|
require.NoError(t, storageGetContext(ic))
|
|
}
|
|
|
|
t.Run("create, not enough gas", func(t *testing.T) {
|
|
initVM(t, []byte{1}, []byte{2, 3}, 2*native.DefaultStoragePrice)
|
|
err := storagePut(ic)
|
|
require.True(t, errors.Is(err, errGasLimitExceeded), "got: %v", err)
|
|
})
|
|
|
|
initVM(t, []byte{4}, []byte{5, 6}, 3*native.DefaultStoragePrice)
|
|
require.NoError(t, storagePut(ic))
|
|
|
|
t.Run("update", func(t *testing.T) {
|
|
t.Run("not enough gas", func(t *testing.T) {
|
|
initVM(t, []byte{4}, []byte{5, 6, 7, 8}, native.DefaultStoragePrice)
|
|
err := storagePut(ic)
|
|
require.True(t, errors.Is(err, errGasLimitExceeded), "got: %v", err)
|
|
})
|
|
initVM(t, []byte{4}, []byte{5, 6, 7, 8}, 3*native.DefaultStoragePrice)
|
|
require.NoError(t, storagePut(ic))
|
|
initVM(t, []byte{4}, []byte{5, 6}, native.DefaultStoragePrice)
|
|
require.NoError(t, storagePut(ic))
|
|
})
|
|
|
|
t.Run("check limits", func(t *testing.T) {
|
|
initVM(t, make([]byte, storage.MaxStorageKeyLen), make([]byte, storage.MaxStorageValueLen), -1)
|
|
require.NoError(t, storagePut(ic))
|
|
})
|
|
|
|
t.Run("bad", func(t *testing.T) {
|
|
t.Run("readonly context", func(t *testing.T) {
|
|
initVM(t, []byte{1}, []byte{1}, -1)
|
|
require.NoError(t, storageContextAsReadOnly(ic))
|
|
require.Error(t, storagePut(ic))
|
|
})
|
|
t.Run("big key", func(t *testing.T) {
|
|
initVM(t, make([]byte, storage.MaxStorageKeyLen+1), []byte{1}, -1)
|
|
require.Error(t, storagePut(ic))
|
|
})
|
|
t.Run("big value", func(t *testing.T) {
|
|
initVM(t, []byte{1}, make([]byte, storage.MaxStorageValueLen+1), -1)
|
|
require.Error(t, storagePut(ic))
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestStorageDelete(t *testing.T) {
|
|
v, cs, ic, bc := createVMAndContractState(t)
|
|
|
|
require.NoError(t, bc.contracts.Management.PutContractState(ic.DAO, cs))
|
|
v.LoadScriptWithHash(cs.NEF.Script, cs.Hash, callflag.All)
|
|
put := func(key, value string, flag int) {
|
|
v.Estack().PushVal(value)
|
|
v.Estack().PushVal(key)
|
|
require.NoError(t, storageGetContext(ic))
|
|
require.NoError(t, storagePut(ic))
|
|
}
|
|
put("key1", "value1", 0)
|
|
put("key2", "value2", 0)
|
|
put("key3", "value3", 0)
|
|
|
|
t.Run("good", func(t *testing.T) {
|
|
v.Estack().PushVal("key1")
|
|
require.NoError(t, storageGetContext(ic))
|
|
require.NoError(t, storageDelete(ic))
|
|
})
|
|
t.Run("readonly context", func(t *testing.T) {
|
|
v.Estack().PushVal("key2")
|
|
require.NoError(t, storageGetReadOnlyContext(ic))
|
|
require.Error(t, storageDelete(ic))
|
|
})
|
|
t.Run("readonly context (from normal)", func(t *testing.T) {
|
|
v.Estack().PushVal("key3")
|
|
require.NoError(t, storageGetContext(ic))
|
|
require.NoError(t, storageContextAsReadOnly(ic))
|
|
require.Error(t, storageDelete(ic))
|
|
})
|
|
}
|
|
|
|
func BenchmarkStorageFind(b *testing.B) {
|
|
for count := 10; count <= 10000; count *= 10 {
|
|
b.Run(fmt.Sprintf("%dElements", count), func(b *testing.B) {
|
|
v, contractState, context, chain := createVMAndContractState(b)
|
|
require.NoError(b, chain.contracts.Management.PutContractState(chain.dao, contractState))
|
|
|
|
items := make(map[string]state.StorageItem)
|
|
for i := 0; i < count; i++ {
|
|
items["abc"+random.String(10)] = random.Bytes(10)
|
|
}
|
|
for k, v := range items {
|
|
context.DAO.PutStorageItem(contractState.ID, []byte(k), v)
|
|
context.DAO.PutStorageItem(contractState.ID+1, []byte(k), v)
|
|
}
|
|
changes, err := context.DAO.Persist()
|
|
require.NoError(b, err)
|
|
require.NotEqual(b, 0, changes)
|
|
|
|
b.ResetTimer()
|
|
b.ReportAllocs()
|
|
for i := 0; i < b.N; i++ {
|
|
b.StopTimer()
|
|
v.Estack().PushVal(istorage.FindDefault)
|
|
v.Estack().PushVal("abc")
|
|
v.Estack().PushVal(stackitem.NewInterop(&StorageContext{ID: contractState.ID}))
|
|
b.StartTimer()
|
|
err := storageFind(context)
|
|
if err != nil {
|
|
b.FailNow()
|
|
}
|
|
b.StopTimer()
|
|
context.Finalize()
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func BenchmarkStorageFindIteratorNext(b *testing.B) {
|
|
for count := 10; count <= 10000; count *= 10 {
|
|
cases := map[string]int{
|
|
"Pick1": 1,
|
|
"PickHalf": count / 2,
|
|
"PickAll": count,
|
|
}
|
|
b.Run(fmt.Sprintf("%dElements", count), func(b *testing.B) {
|
|
for name, last := range cases {
|
|
b.Run(name, func(b *testing.B) {
|
|
v, contractState, context, chain := createVMAndContractState(b)
|
|
require.NoError(b, chain.contracts.Management.PutContractState(chain.dao, contractState))
|
|
|
|
items := make(map[string]state.StorageItem)
|
|
for i := 0; i < count; i++ {
|
|
items["abc"+random.String(10)] = random.Bytes(10)
|
|
}
|
|
for k, v := range items {
|
|
context.DAO.PutStorageItem(contractState.ID, []byte(k), v)
|
|
context.DAO.PutStorageItem(contractState.ID+1, []byte(k), v)
|
|
}
|
|
changes, err := context.DAO.Persist()
|
|
require.NoError(b, err)
|
|
require.NotEqual(b, 0, changes)
|
|
b.ReportAllocs()
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
b.StopTimer()
|
|
v.Estack().PushVal(istorage.FindDefault)
|
|
v.Estack().PushVal("abc")
|
|
v.Estack().PushVal(stackitem.NewInterop(&StorageContext{ID: contractState.ID}))
|
|
b.StartTimer()
|
|
err := storageFind(context)
|
|
b.StopTimer()
|
|
if err != nil {
|
|
b.FailNow()
|
|
}
|
|
res := context.VM.Estack().Pop().Item()
|
|
for i := 0; i < last; i++ {
|
|
context.VM.Estack().PushVal(res)
|
|
b.StartTimer()
|
|
require.NoError(b, iterator.Next(context))
|
|
b.StopTimer()
|
|
require.True(b, context.VM.Estack().Pop().Bool())
|
|
}
|
|
|
|
context.VM.Estack().PushVal(res)
|
|
require.NoError(b, iterator.Next(context))
|
|
actual := context.VM.Estack().Pop().Bool()
|
|
if last == count {
|
|
require.False(b, actual)
|
|
} else {
|
|
require.True(b, actual)
|
|
}
|
|
context.Finalize()
|
|
}
|
|
})
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestStorageFind(t *testing.T) {
|
|
v, contractState, context, chain := createVMAndContractState(t)
|
|
|
|
arr := []stackitem.Item{
|
|
stackitem.NewBigInteger(big.NewInt(42)),
|
|
stackitem.NewByteArray([]byte("second")),
|
|
stackitem.Null{},
|
|
}
|
|
rawArr, err := stackitem.Serialize(stackitem.NewArray(arr))
|
|
require.NoError(t, err)
|
|
rawArr0, err := stackitem.Serialize(stackitem.NewArray(arr[:0]))
|
|
require.NoError(t, err)
|
|
rawArr1, err := stackitem.Serialize(stackitem.NewArray(arr[:1]))
|
|
require.NoError(t, err)
|
|
|
|
skeys := [][]byte{{0x01, 0x02}, {0x02, 0x01}, {0x01, 0x01},
|
|
{0x04, 0x00}, {0x05, 0x00}, {0x06}, {0x07}, {0x08},
|
|
{0x09, 0x12, 0x34}, {0x09, 0x12, 0x56},
|
|
}
|
|
items := []state.StorageItem{
|
|
[]byte{0x01, 0x02, 0x03, 0x04},
|
|
[]byte{0x04, 0x03, 0x02, 0x01},
|
|
[]byte{0x03, 0x04, 0x05, 0x06},
|
|
[]byte{byte(stackitem.ByteArrayT), 2, 0xCA, 0xFE},
|
|
[]byte{0xFF, 0xFF},
|
|
rawArr,
|
|
rawArr0,
|
|
rawArr1,
|
|
[]byte{111},
|
|
[]byte{222},
|
|
}
|
|
|
|
require.NoError(t, chain.contracts.Management.PutContractState(chain.dao, contractState))
|
|
|
|
id := contractState.ID
|
|
|
|
for i := range skeys {
|
|
context.DAO.PutStorageItem(id, skeys[i], items[i])
|
|
}
|
|
|
|
testFind := func(t *testing.T, prefix []byte, opts int64, expected []stackitem.Item) {
|
|
v.Estack().PushVal(opts)
|
|
v.Estack().PushVal(prefix)
|
|
v.Estack().PushVal(stackitem.NewInterop(&StorageContext{ID: id}))
|
|
|
|
err := storageFind(context)
|
|
require.NoError(t, err)
|
|
|
|
var iter *stackitem.Interop
|
|
require.NotPanics(t, func() { iter = v.Estack().Pop().Interop() })
|
|
|
|
for i := range expected { // sorted indices with mathing prefix
|
|
v.Estack().PushVal(iter)
|
|
require.NoError(t, iterator.Next(context))
|
|
require.True(t, v.Estack().Pop().Bool())
|
|
|
|
v.Estack().PushVal(iter)
|
|
if expected[i] == nil {
|
|
require.Panics(t, func() { _ = iterator.Value(context) })
|
|
return
|
|
}
|
|
require.NoError(t, iterator.Value(context))
|
|
require.Equal(t, expected[i], v.Estack().Pop().Item())
|
|
}
|
|
|
|
v.Estack().PushVal(iter)
|
|
require.NoError(t, iterator.Next(context))
|
|
require.False(t, v.Estack().Pop().Bool())
|
|
}
|
|
|
|
t.Run("normal invocation", func(t *testing.T) {
|
|
testFind(t, []byte{0x01}, istorage.FindDefault, []stackitem.Item{
|
|
stackitem.NewStruct([]stackitem.Item{
|
|
stackitem.NewByteArray(skeys[2]),
|
|
stackitem.NewByteArray(items[2]),
|
|
}),
|
|
stackitem.NewStruct([]stackitem.Item{
|
|
stackitem.NewByteArray(skeys[0]),
|
|
stackitem.NewByteArray(items[0]),
|
|
}),
|
|
})
|
|
})
|
|
|
|
t.Run("keys only", func(t *testing.T) {
|
|
testFind(t, []byte{0x01}, istorage.FindKeysOnly, []stackitem.Item{
|
|
stackitem.NewByteArray(skeys[2]),
|
|
stackitem.NewByteArray(skeys[0]),
|
|
})
|
|
})
|
|
t.Run("remove prefix", func(t *testing.T) {
|
|
testFind(t, []byte{0x01}, istorage.FindKeysOnly|istorage.FindRemovePrefix, []stackitem.Item{
|
|
stackitem.NewByteArray(skeys[2][1:]),
|
|
stackitem.NewByteArray(skeys[0][1:]),
|
|
})
|
|
testFind(t, []byte{0x09, 0x12}, istorage.FindKeysOnly|istorage.FindRemovePrefix, []stackitem.Item{
|
|
stackitem.NewByteArray(skeys[8][2:]),
|
|
stackitem.NewByteArray(skeys[9][2:]),
|
|
})
|
|
})
|
|
t.Run("values only", func(t *testing.T) {
|
|
testFind(t, []byte{0x01}, istorage.FindValuesOnly, []stackitem.Item{
|
|
stackitem.NewByteArray(items[2]),
|
|
stackitem.NewByteArray(items[0]),
|
|
})
|
|
})
|
|
t.Run("deserialize values", func(t *testing.T) {
|
|
testFind(t, []byte{0x04}, istorage.FindValuesOnly|istorage.FindDeserialize, []stackitem.Item{
|
|
stackitem.NewByteArray(items[3][2:]),
|
|
})
|
|
t.Run("invalid", func(t *testing.T) {
|
|
v.Estack().PushVal(istorage.FindDeserialize)
|
|
v.Estack().PushVal([]byte{0x05})
|
|
v.Estack().PushVal(stackitem.NewInterop(&StorageContext{ID: id}))
|
|
err := storageFind(context)
|
|
require.NoError(t, err)
|
|
|
|
var iter *stackitem.Interop
|
|
require.NotPanics(t, func() { iter = v.Estack().Pop().Interop() })
|
|
|
|
v.Estack().PushVal(iter)
|
|
require.NoError(t, iterator.Next(context))
|
|
|
|
v.Estack().PushVal(iter)
|
|
require.Panics(t, func() { _ = iterator.Value(context) })
|
|
})
|
|
})
|
|
t.Run("PickN", func(t *testing.T) {
|
|
testFind(t, []byte{0x06}, istorage.FindPick0|istorage.FindValuesOnly|istorage.FindDeserialize, arr[:1])
|
|
testFind(t, []byte{0x06}, istorage.FindPick1|istorage.FindValuesOnly|istorage.FindDeserialize, arr[1:2])
|
|
// Array with 0 elements.
|
|
testFind(t, []byte{0x07}, istorage.FindPick0|istorage.FindValuesOnly|istorage.FindDeserialize,
|
|
[]stackitem.Item{nil})
|
|
// Array with 1 element.
|
|
testFind(t, []byte{0x08}, istorage.FindPick1|istorage.FindValuesOnly|istorage.FindDeserialize,
|
|
[]stackitem.Item{nil})
|
|
// Not an array, but serialized ByteArray.
|
|
testFind(t, []byte{0x04}, istorage.FindPick1|istorage.FindValuesOnly|istorage.FindDeserialize,
|
|
[]stackitem.Item{nil})
|
|
})
|
|
|
|
t.Run("normal invocation, empty result", func(t *testing.T) {
|
|
testFind(t, []byte{0x03}, istorage.FindDefault, nil)
|
|
})
|
|
|
|
t.Run("invalid options", func(t *testing.T) {
|
|
invalid := []int64{
|
|
istorage.FindKeysOnly | istorage.FindValuesOnly,
|
|
^istorage.FindAll,
|
|
istorage.FindKeysOnly | istorage.FindDeserialize,
|
|
istorage.FindPick0,
|
|
istorage.FindPick0 | istorage.FindPick1 | istorage.FindDeserialize,
|
|
istorage.FindPick0 | istorage.FindPick1,
|
|
}
|
|
for _, opts := range invalid {
|
|
v.Estack().PushVal(opts)
|
|
v.Estack().PushVal([]byte{0x01})
|
|
v.Estack().PushVal(stackitem.NewInterop(&StorageContext{ID: id}))
|
|
require.Error(t, storageFind(context))
|
|
}
|
|
})
|
|
t.Run("invalid type for StorageContext", func(t *testing.T) {
|
|
v.Estack().PushVal(istorage.FindDefault)
|
|
v.Estack().PushVal([]byte{0x01})
|
|
v.Estack().PushVal(stackitem.NewInterop(nil))
|
|
|
|
require.Error(t, storageFind(context))
|
|
})
|
|
|
|
t.Run("invalid id", func(t *testing.T) {
|
|
invalidID := id + 1
|
|
|
|
v.Estack().PushVal(istorage.FindDefault)
|
|
v.Estack().PushVal([]byte{0x01})
|
|
v.Estack().PushVal(stackitem.NewInterop(&StorageContext{ID: invalidID}))
|
|
|
|
require.NoError(t, storageFind(context))
|
|
require.NoError(t, iterator.Next(context))
|
|
require.False(t, v.Estack().Pop().Bool())
|
|
})
|
|
}
|
|
|
|
// Helper functions to create VM, InteropContext, TX, Account, Contract.
|
|
|
|
func createVM(t *testing.T) (*vm.VM, *interop.Context, *Blockchain) {
|
|
chain := newTestChain(t)
|
|
context := chain.newInteropContext(trigger.Application,
|
|
dao.NewSimple(storage.NewMemoryStore(), chain.config.StateRootInHeader, chain.config.P2PSigExtensions), nil, nil)
|
|
v := context.SpawnVM()
|
|
return v, context, chain
|
|
}
|
|
|
|
func createVMAndContractState(t testing.TB) (*vm.VM, *state.Contract, *interop.Context, *Blockchain) {
|
|
script := []byte("testscript")
|
|
m := manifest.NewManifest("Test")
|
|
ne, err := nef.NewFile(script)
|
|
require.NoError(t, err)
|
|
contractState := &state.Contract{
|
|
ContractBase: state.ContractBase{
|
|
NEF: *ne,
|
|
Hash: hash.Hash160(script),
|
|
Manifest: *m,
|
|
ID: 123,
|
|
},
|
|
}
|
|
|
|
chain := newTestChain(t)
|
|
d := dao.NewSimple(storage.NewMemoryStore(), chain.config.StateRootInHeader, chain.config.P2PSigExtensions)
|
|
context := chain.newInteropContext(trigger.Application, d, nil, nil)
|
|
v := context.SpawnVM()
|
|
return v, contractState, context, chain
|
|
}
|
|
|
|
var (
|
|
helper1ContractNEFPath = filepath.Join("test_data", "management_helper", "management_helper1.nef")
|
|
helper1ContractManifestPath = filepath.Join("test_data", "management_helper", "management_helper1.manifest.json")
|
|
helper2ContractNEFPath = filepath.Join("test_data", "management_helper", "management_helper2.nef")
|
|
helper2ContractManifestPath = filepath.Join("test_data", "management_helper", "management_helper2.manifest.json")
|
|
)
|
|
|
|
// TestGenerateManagementHelperContracts generates 2 helper contracts second of which is
|
|
// allowed to call the first. It uses test chain to define Management and StdLib
|
|
// native hashes and saves generated NEF and manifest to ../test_data/management_contract folder.
|
|
// Set `saveState` flag to true and run the test to rewrite NEF and manifest files.
|
|
func TestGenerateManagementHelperContracts(t *testing.T) {
|
|
const saveState = false
|
|
|
|
bc := newTestChain(t)
|
|
mgmtHash := bc.contracts.Management.Hash
|
|
stdHash := bc.contracts.Std.Hash
|
|
neoHash := bc.contracts.NEO.Hash
|
|
singleChainValidator := testchain.PrivateKey(testchain.IDToOrder(0))
|
|
acc := wallet.NewAccountFromPrivateKey(singleChainValidator)
|
|
require.NoError(t, acc.ConvertMultisig(1, keys.PublicKeys{singleChainValidator.PublicKey()}))
|
|
singleChainValidatorHash := acc.Contract.ScriptHash()
|
|
|
|
w := io.NewBufBinWriter()
|
|
emit.Opcodes(w.BinWriter, opcode.ABORT)
|
|
addOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.ADD, opcode.RET)
|
|
addMultiOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.ADD, opcode.ADD, opcode.RET)
|
|
ret7Off := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.PUSH7, opcode.RET)
|
|
dropOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.DROP, opcode.RET)
|
|
initOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.INITSSLOT, 1, opcode.PUSH3, opcode.STSFLD0, opcode.RET)
|
|
add3Off := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.LDSFLD0, opcode.ADD, opcode.RET)
|
|
invalidRetOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.PUSH1, opcode.PUSH2, opcode.RET)
|
|
justRetOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
verifyOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.LDSFLD0, opcode.SUB,
|
|
opcode.CONVERT, opcode.Opcode(stackitem.BooleanT), opcode.RET)
|
|
deployOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.SWAP, opcode.JMPIF, 2+8+1+1+1+1+39+3)
|
|
emit.String(w.BinWriter, "create") // 8 bytes
|
|
emit.Int(w.BinWriter, 2) // 1 byte
|
|
emit.Opcodes(w.BinWriter, opcode.PACK) // 1 byte
|
|
emit.Int(w.BinWriter, 1) // 1 byte (args count for `serialize`)
|
|
emit.Opcodes(w.BinWriter, opcode.PACK) // 1 byte (pack args into array for `serialize`)
|
|
emit.AppCallNoArgs(w.BinWriter, stdHash, "serialize", callflag.All) // 39 bytes
|
|
emit.Opcodes(w.BinWriter, opcode.CALL, 3+8+1+1+1+1+39+3, opcode.RET)
|
|
emit.String(w.BinWriter, "update") // 8 bytes
|
|
emit.Int(w.BinWriter, 2) // 1 byte
|
|
emit.Opcodes(w.BinWriter, opcode.PACK) // 1 byte
|
|
emit.Int(w.BinWriter, 1) // 1 byte (args count for `serialize`)
|
|
emit.Opcodes(w.BinWriter, opcode.PACK) // 1 byte (pack args into array for `serialize`)
|
|
emit.AppCallNoArgs(w.BinWriter, stdHash, "serialize", callflag.All) // 39 bytes
|
|
emit.Opcodes(w.BinWriter, opcode.CALL, 3, opcode.RET)
|
|
putValOff := w.Len()
|
|
emit.String(w.BinWriter, "initial")
|
|
emit.Syscall(w.BinWriter, interopnames.SystemStorageGetContext)
|
|
emit.Syscall(w.BinWriter, interopnames.SystemStoragePut)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
getValOff := w.Len()
|
|
emit.String(w.BinWriter, "initial")
|
|
emit.Syscall(w.BinWriter, interopnames.SystemStorageGetContext)
|
|
emit.Syscall(w.BinWriter, interopnames.SystemStorageGet)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
delValOff := w.Len()
|
|
emit.Syscall(w.BinWriter, interopnames.SystemStorageGetContext)
|
|
emit.Syscall(w.BinWriter, interopnames.SystemStorageDelete)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
onNEP17PaymentOff := w.Len()
|
|
emit.Syscall(w.BinWriter, interopnames.SystemRuntimeGetCallingScriptHash)
|
|
emit.Int(w.BinWriter, 4)
|
|
emit.Opcodes(w.BinWriter, opcode.PACK)
|
|
emit.String(w.BinWriter, "LastPayment")
|
|
emit.Syscall(w.BinWriter, interopnames.SystemRuntimeNotify)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
onNEP11PaymentOff := w.Len()
|
|
emit.Syscall(w.BinWriter, interopnames.SystemRuntimeGetCallingScriptHash)
|
|
emit.Int(w.BinWriter, 5)
|
|
emit.Opcodes(w.BinWriter, opcode.PACK)
|
|
emit.String(w.BinWriter, "LostPayment")
|
|
emit.Syscall(w.BinWriter, interopnames.SystemRuntimeNotify)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
update3Off := w.Len()
|
|
emit.Int(w.BinWriter, 3)
|
|
emit.Opcodes(w.BinWriter, opcode.JMP, 2+1)
|
|
updateOff := w.Len()
|
|
emit.Int(w.BinWriter, 2)
|
|
emit.Opcodes(w.BinWriter, opcode.PACK)
|
|
emit.AppCallNoArgs(w.BinWriter, mgmtHash, "update", callflag.All)
|
|
emit.Opcodes(w.BinWriter, opcode.DROP)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
destroyOff := w.Len()
|
|
emit.AppCall(w.BinWriter, mgmtHash, "destroy", callflag.All)
|
|
emit.Opcodes(w.BinWriter, opcode.DROP)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
invalidStackOff := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.NEWARRAY0, opcode.DUP, opcode.DUP, opcode.APPEND) // recursive array
|
|
emit.Syscall(w.BinWriter, interopnames.SystemStorageGetReadOnlyContext) // interop item
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
callT0Off := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.CALLT, 0, 0, opcode.PUSH1, opcode.ADD, opcode.RET)
|
|
callT1Off := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.CALLT, 1, 0, opcode.RET)
|
|
callT2Off := w.Len()
|
|
emit.Opcodes(w.BinWriter, opcode.CALLT, 0, 0, opcode.RET)
|
|
burnGasOff := w.Len()
|
|
emit.Syscall(w.BinWriter, interopnames.SystemRuntimeBurnGas)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
invocCounterOff := w.Len()
|
|
emit.Syscall(w.BinWriter, interopnames.SystemRuntimeGetInvocationCounter)
|
|
emit.Opcodes(w.BinWriter, opcode.RET)
|
|
|
|
script := w.Bytes()
|
|
m := manifest.NewManifest("TestMain")
|
|
m.ABI.Methods = []manifest.Method{
|
|
{
|
|
Name: "add",
|
|
Offset: addOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("addend1", smartcontract.IntegerType),
|
|
manifest.NewParameter("addend2", smartcontract.IntegerType),
|
|
},
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
{
|
|
Name: "add",
|
|
Offset: addMultiOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("addend1", smartcontract.IntegerType),
|
|
manifest.NewParameter("addend2", smartcontract.IntegerType),
|
|
manifest.NewParameter("addend3", smartcontract.IntegerType),
|
|
},
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
{
|
|
Name: "ret7",
|
|
Offset: ret7Off,
|
|
Parameters: []manifest.Parameter{},
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
{
|
|
Name: "drop",
|
|
Offset: dropOff,
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: manifest.MethodInit,
|
|
Offset: initOff,
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "add3",
|
|
Offset: add3Off,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("addend", smartcontract.IntegerType),
|
|
},
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
{
|
|
Name: "invalidReturn",
|
|
Offset: invalidRetOff,
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
{
|
|
Name: "justReturn",
|
|
Offset: justRetOff,
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: manifest.MethodVerify,
|
|
Offset: verifyOff,
|
|
ReturnType: smartcontract.BoolType,
|
|
},
|
|
{
|
|
Name: manifest.MethodDeploy,
|
|
Offset: deployOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("data", smartcontract.AnyType),
|
|
manifest.NewParameter("isUpdate", smartcontract.BoolType),
|
|
},
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "getValue",
|
|
Offset: getValOff,
|
|
ReturnType: smartcontract.StringType,
|
|
},
|
|
{
|
|
Name: "putValue",
|
|
Offset: putValOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("value", smartcontract.StringType),
|
|
},
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "delValue",
|
|
Offset: delValOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("key", smartcontract.StringType),
|
|
},
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: manifest.MethodOnNEP11Payment,
|
|
Offset: onNEP11PaymentOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("from", smartcontract.Hash160Type),
|
|
manifest.NewParameter("amount", smartcontract.IntegerType),
|
|
manifest.NewParameter("tokenid", smartcontract.ByteArrayType),
|
|
manifest.NewParameter("data", smartcontract.AnyType),
|
|
},
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: manifest.MethodOnNEP17Payment,
|
|
Offset: onNEP17PaymentOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("from", smartcontract.Hash160Type),
|
|
manifest.NewParameter("amount", smartcontract.IntegerType),
|
|
manifest.NewParameter("data", smartcontract.AnyType),
|
|
},
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "update",
|
|
Offset: updateOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("nef", smartcontract.ByteArrayType),
|
|
manifest.NewParameter("manifest", smartcontract.ByteArrayType),
|
|
},
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "update",
|
|
Offset: update3Off,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("nef", smartcontract.ByteArrayType),
|
|
manifest.NewParameter("manifest", smartcontract.ByteArrayType),
|
|
manifest.NewParameter("data", smartcontract.AnyType),
|
|
},
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "destroy",
|
|
Offset: destroyOff,
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "invalidStack",
|
|
Offset: invalidStackOff,
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "callT0",
|
|
Offset: callT0Off,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("address", smartcontract.Hash160Type),
|
|
},
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
{
|
|
Name: "callT1",
|
|
Offset: callT1Off,
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
{
|
|
Name: "callT2",
|
|
Offset: callT2Off,
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
{
|
|
Name: "burnGas",
|
|
Offset: burnGasOff,
|
|
Parameters: []manifest.Parameter{
|
|
manifest.NewParameter("amount", smartcontract.IntegerType),
|
|
},
|
|
ReturnType: smartcontract.VoidType,
|
|
},
|
|
{
|
|
Name: "invocCounter",
|
|
Offset: invocCounterOff,
|
|
ReturnType: smartcontract.IntegerType,
|
|
},
|
|
}
|
|
m.Permissions = make([]manifest.Permission, 2)
|
|
m.Permissions[0].Contract.Type = manifest.PermissionHash
|
|
m.Permissions[0].Contract.Value = bc.contracts.NEO.Hash
|
|
m.Permissions[0].Methods.Add("balanceOf")
|
|
|
|
m.Permissions[1].Contract.Type = manifest.PermissionHash
|
|
m.Permissions[1].Contract.Value = util.Uint160{}
|
|
m.Permissions[1].Methods.Add("method")
|
|
|
|
// Generate NEF file.
|
|
ne, err := nef.NewFile(script)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
ne.Tokens = []nef.MethodToken{
|
|
{
|
|
Hash: neoHash,
|
|
Method: "balanceOf",
|
|
ParamCount: 1,
|
|
HasReturn: true,
|
|
CallFlag: callflag.ReadStates,
|
|
},
|
|
{
|
|
Hash: util.Uint160{},
|
|
Method: "method",
|
|
HasReturn: true,
|
|
CallFlag: callflag.ReadStates,
|
|
},
|
|
}
|
|
ne.Checksum = ne.CalculateChecksum()
|
|
|
|
// Write first NEF file.
|
|
bytes, err := ne.Bytes()
|
|
require.NoError(t, err)
|
|
if saveState {
|
|
err = ioutil.WriteFile(helper1ContractNEFPath, bytes, os.ModePerm)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// Write first manifest file.
|
|
mData, err := json.Marshal(m)
|
|
require.NoError(t, err)
|
|
if saveState {
|
|
err = ioutil.WriteFile(helper1ContractManifestPath, mData, os.ModePerm)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// Create hash of the first contract assuming that sender is single-chain validator.
|
|
h := state.CreateContractHash(singleChainValidatorHash, ne.Checksum, m.Name)
|
|
|
|
currScript := []byte{byte(opcode.RET)}
|
|
m = manifest.NewManifest("TestAux")
|
|
perm := manifest.NewPermission(manifest.PermissionHash, h)
|
|
perm.Methods.Add("add")
|
|
perm.Methods.Add("drop")
|
|
perm.Methods.Add("add3")
|
|
perm.Methods.Add("invalidReturn")
|
|
perm.Methods.Add("justReturn")
|
|
perm.Methods.Add("getValue")
|
|
m.Permissions = append(m.Permissions, *perm)
|
|
ne, err = nef.NewFile(currScript)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
// Write second NEF file.
|
|
bytes, err = ne.Bytes()
|
|
require.NoError(t, err)
|
|
if saveState {
|
|
err = ioutil.WriteFile(helper2ContractNEFPath, bytes, os.ModePerm)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// Write second manifest file.
|
|
mData, err = json.Marshal(m)
|
|
require.NoError(t, err)
|
|
if saveState {
|
|
err = ioutil.WriteFile(helper2ContractManifestPath, mData, os.ModePerm)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
require.False(t, saveState)
|
|
}
|
|
|
|
// getTestContractState returns 2 contracts second of which is allowed to call the first.
|
|
func getTestContractState(t *testing.T, id1, id2 int32, sender2 util.Uint160) (*state.Contract, *state.Contract) {
|
|
errNotFound := errors.New("auto-generated oracle contract is not found, use TestGenerateOracleContract to regenerate")
|
|
|
|
neBytes, err := ioutil.ReadFile(helper1ContractNEFPath)
|
|
require.NoError(t, err, fmt.Errorf("nef1: %w", errNotFound))
|
|
ne, err := nef.FileFromBytes(neBytes)
|
|
require.NoError(t, err)
|
|
|
|
mBytes, err := ioutil.ReadFile(helper1ContractManifestPath)
|
|
require.NoError(t, err, fmt.Errorf("manifest1: %w", errNotFound))
|
|
m := &manifest.Manifest{}
|
|
err = json.Unmarshal(mBytes, m)
|
|
require.NoError(t, err)
|
|
|
|
cs1 := &state.Contract{
|
|
ContractBase: state.ContractBase{
|
|
NEF: ne,
|
|
Manifest: *m,
|
|
ID: id1,
|
|
},
|
|
}
|
|
|
|
neBytes, err = ioutil.ReadFile(helper2ContractNEFPath)
|
|
require.NoError(t, err, fmt.Errorf("nef2: %w", errNotFound))
|
|
ne, err = nef.FileFromBytes(neBytes)
|
|
require.NoError(t, err)
|
|
|
|
mBytes, err = ioutil.ReadFile(helper2ContractManifestPath)
|
|
require.NoError(t, err, fmt.Errorf("manifest2: %w", errNotFound))
|
|
m = &manifest.Manifest{}
|
|
err = json.Unmarshal(mBytes, m)
|
|
require.NoError(t, err)
|
|
|
|
// Retrieve hash of the first contract from the permissions of the second contract.
|
|
require.Equal(t, 1, len(m.Permissions))
|
|
require.Equal(t, manifest.PermissionHash, m.Permissions[0].Contract.Type)
|
|
cs1.Hash = m.Permissions[0].Contract.Hash()
|
|
|
|
cs2 := &state.Contract{
|
|
ContractBase: state.ContractBase{
|
|
NEF: ne,
|
|
Manifest: *m,
|
|
ID: id2,
|
|
Hash: state.CreateContractHash(sender2, ne.Checksum, m.Name),
|
|
},
|
|
}
|
|
|
|
return cs1, cs2
|
|
}
|
|
|
|
func loadScript(ic *interop.Context, script []byte, args ...interface{}) {
|
|
ic.SpawnVM()
|
|
ic.VM.LoadScriptWithFlags(script, callflag.AllowCall)
|
|
for i := range args {
|
|
ic.VM.Estack().PushVal(args[i])
|
|
}
|
|
ic.VM.GasLimit = -1
|
|
}
|
|
|
|
func loadScriptWithHashAndFlags(ic *interop.Context, script []byte, hash util.Uint160, f callflag.CallFlag, args ...interface{}) {
|
|
ic.SpawnVM()
|
|
ic.VM.LoadScriptWithHash(script, hash, f)
|
|
for i := range args {
|
|
ic.VM.Estack().PushVal(args[i])
|
|
}
|
|
ic.VM.GasLimit = -1
|
|
}
|
|
|
|
func TestContractCall(t *testing.T) {
|
|
_, ic, bc := createVM(t)
|
|
|
|
cs, currCs := getTestContractState(t, 4, 5, random.Uint160()) // sender and IDs are not important for the test
|
|
require.NoError(t, bc.contracts.Management.PutContractState(ic.DAO, cs))
|
|
require.NoError(t, bc.contracts.Management.PutContractState(ic.DAO, currCs))
|
|
|
|
currScript := currCs.NEF.Script
|
|
h := cs.Hash
|
|
|
|
addArgs := stackitem.NewArray([]stackitem.Item{stackitem.Make(1), stackitem.Make(2)})
|
|
t.Run("Good", func(t *testing.T) {
|
|
t.Run("2 arguments", func(t *testing.T) {
|
|
loadScript(ic, currScript, 42)
|
|
ic.VM.Estack().PushVal(addArgs)
|
|
ic.VM.Estack().PushVal(callflag.All)
|
|
ic.VM.Estack().PushVal("add")
|
|
ic.VM.Estack().PushVal(h.BytesBE())
|
|
require.NoError(t, contract.Call(ic))
|
|
require.NoError(t, ic.VM.Run())
|
|
require.Equal(t, 2, ic.VM.Estack().Len())
|
|
require.Equal(t, big.NewInt(3), ic.VM.Estack().Pop().Value())
|
|
require.Equal(t, big.NewInt(42), ic.VM.Estack().Pop().Value())
|
|
})
|
|
t.Run("3 arguments", func(t *testing.T) {
|
|
loadScript(ic, currScript, 42)
|
|
ic.VM.Estack().PushVal(stackitem.NewArray(
|
|
append(addArgs.Value().([]stackitem.Item), stackitem.Make(3))))
|
|
ic.VM.Estack().PushVal(callflag.All)
|
|
ic.VM.Estack().PushVal("add")
|
|
ic.VM.Estack().PushVal(h.BytesBE())
|
|
require.NoError(t, contract.Call(ic))
|
|
require.NoError(t, ic.VM.Run())
|
|
require.Equal(t, 2, ic.VM.Estack().Len())
|
|
require.Equal(t, big.NewInt(6), ic.VM.Estack().Pop().Value())
|
|
require.Equal(t, big.NewInt(42), ic.VM.Estack().Pop().Value())
|
|
})
|
|
})
|
|
|
|
t.Run("CallExInvalidFlag", func(t *testing.T) {
|
|
loadScript(ic, currScript, 42)
|
|
ic.VM.Estack().PushVal(addArgs)
|
|
ic.VM.Estack().PushVal(byte(0xFF))
|
|
ic.VM.Estack().PushVal("add")
|
|
ic.VM.Estack().PushVal(h.BytesBE())
|
|
require.Error(t, contract.Call(ic))
|
|
})
|
|
|
|
runInvalid := func(args ...interface{}) func(t *testing.T) {
|
|
return func(t *testing.T) {
|
|
loadScriptWithHashAndFlags(ic, currScript, h, callflag.All, 42)
|
|
for i := range args {
|
|
ic.VM.Estack().PushVal(args[i])
|
|
}
|
|
// interops can both return error and panic,
|
|
// we don't care which kind of error has occurred
|
|
require.Panics(t, func() {
|
|
err := contract.Call(ic)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
t.Run("Invalid", func(t *testing.T) {
|
|
t.Run("Hash", runInvalid(addArgs, "add", h.BytesBE()[1:]))
|
|
t.Run("MissingHash", runInvalid(addArgs, "add", util.Uint160{}.BytesBE()))
|
|
t.Run("Method", runInvalid(addArgs, stackitem.NewInterop("add"), h.BytesBE()))
|
|
t.Run("MissingMethod", runInvalid(addArgs, "sub", h.BytesBE()))
|
|
t.Run("DisallowedMethod", runInvalid(stackitem.NewArray(nil), "ret7", h.BytesBE()))
|
|
t.Run("Arguments", runInvalid(1, "add", h.BytesBE()))
|
|
t.Run("NotEnoughArguments", runInvalid(
|
|
stackitem.NewArray([]stackitem.Item{stackitem.Make(1)}), "add", h.BytesBE()))
|
|
t.Run("TooMuchArguments", runInvalid(
|
|
stackitem.NewArray([]stackitem.Item{
|
|
stackitem.Make(1), stackitem.Make(2), stackitem.Make(3), stackitem.Make(4)}),
|
|
"add", h.BytesBE()))
|
|
})
|
|
|
|
t.Run("ReturnValues", func(t *testing.T) {
|
|
t.Run("Many", func(t *testing.T) {
|
|
loadScript(ic, currScript, 42)
|
|
ic.VM.Estack().PushVal(stackitem.NewArray(nil))
|
|
ic.VM.Estack().PushVal(callflag.All)
|
|
ic.VM.Estack().PushVal("invalidReturn")
|
|
ic.VM.Estack().PushVal(h.BytesBE())
|
|
require.NoError(t, contract.Call(ic))
|
|
require.Error(t, ic.VM.Run())
|
|
})
|
|
t.Run("Void", func(t *testing.T) {
|
|
loadScript(ic, currScript, 42)
|
|
ic.VM.Estack().PushVal(stackitem.NewArray(nil))
|
|
ic.VM.Estack().PushVal(callflag.All)
|
|
ic.VM.Estack().PushVal("justReturn")
|
|
ic.VM.Estack().PushVal(h.BytesBE())
|
|
require.NoError(t, contract.Call(ic))
|
|
require.NoError(t, ic.VM.Run())
|
|
require.Equal(t, 2, ic.VM.Estack().Len())
|
|
require.Equal(t, stackitem.Null{}, ic.VM.Estack().Pop().Item())
|
|
require.Equal(t, big.NewInt(42), ic.VM.Estack().Pop().Value())
|
|
})
|
|
})
|
|
|
|
t.Run("IsolatedStack", func(t *testing.T) {
|
|
loadScript(ic, currScript, 42)
|
|
ic.VM.Estack().PushVal(stackitem.NewArray(nil))
|
|
ic.VM.Estack().PushVal(callflag.All)
|
|
ic.VM.Estack().PushVal("drop")
|
|
ic.VM.Estack().PushVal(h.BytesBE())
|
|
require.NoError(t, contract.Call(ic))
|
|
require.Error(t, ic.VM.Run())
|
|
})
|
|
|
|
t.Run("CallInitialize", func(t *testing.T) {
|
|
t.Run("Directly", runInvalid(stackitem.NewArray([]stackitem.Item{}), "_initialize", h.BytesBE()))
|
|
|
|
loadScript(ic, currScript, 42)
|
|
ic.VM.Estack().PushVal(stackitem.NewArray([]stackitem.Item{stackitem.Make(5)}))
|
|
ic.VM.Estack().PushVal(callflag.All)
|
|
ic.VM.Estack().PushVal("add3")
|
|
ic.VM.Estack().PushVal(h.BytesBE())
|
|
require.NoError(t, contract.Call(ic))
|
|
require.NoError(t, ic.VM.Run())
|
|
require.Equal(t, 2, ic.VM.Estack().Len())
|
|
require.Equal(t, big.NewInt(8), ic.VM.Estack().Pop().Value())
|
|
require.Equal(t, big.NewInt(42), ic.VM.Estack().Pop().Value())
|
|
})
|
|
}
|
|
|
|
func TestContractGetCallFlags(t *testing.T) {
|
|
v, ic, _ := createVM(t)
|
|
|
|
v.LoadScriptWithHash([]byte{byte(opcode.RET)}, util.Uint160{1, 2, 3}, callflag.All)
|
|
require.NoError(t, contractGetCallFlags(ic))
|
|
require.Equal(t, int64(callflag.All), v.Estack().Pop().Value().(*big.Int).Int64())
|
|
}
|
|
|
|
func TestRuntimeCheckWitness(t *testing.T) {
|
|
_, ic, bc := createVM(t)
|
|
|
|
script := []byte{byte(opcode.RET)}
|
|
scriptHash := hash.Hash160(script)
|
|
check := func(t *testing.T, ic *interop.Context, arg interface{}, shouldFail bool, expected ...bool) {
|
|
ic.VM.Estack().PushVal(arg)
|
|
err := runtime.CheckWitness(ic)
|
|
if shouldFail {
|
|
require.Error(t, err)
|
|
} else {
|
|
require.NoError(t, err)
|
|
require.NotNil(t, expected)
|
|
actual, ok := ic.VM.Estack().Pop().Value().(bool)
|
|
require.True(t, ok)
|
|
require.Equal(t, expected[0], actual)
|
|
}
|
|
}
|
|
t.Run("error", func(t *testing.T) {
|
|
t.Run("not a hash or key", func(t *testing.T) {
|
|
check(t, ic, []byte{1, 2, 3}, true)
|
|
})
|
|
t.Run("script container is not a transaction", func(t *testing.T) {
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
check(t, ic, random.Uint160().BytesBE(), true)
|
|
})
|
|
t.Run("check scope", func(t *testing.T) {
|
|
t.Run("CustomGroups, missing ReadStates flag", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.CustomGroups,
|
|
AllowedGroups: []*keys.PublicKey{},
|
|
},
|
|
},
|
|
}
|
|
ic.Tx = tx
|
|
callingScriptHash := scriptHash
|
|
loadScriptWithHashAndFlags(ic, script, callingScriptHash, callflag.All)
|
|
ic.VM.LoadScriptWithHash([]byte{0x1}, random.Uint160(), callflag.AllowCall)
|
|
check(t, ic, hash.BytesBE(), true)
|
|
})
|
|
t.Run("Rules, missing ReadStates flag", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
pk, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.Rules,
|
|
Rules: []transaction.WitnessRule{{
|
|
Action: transaction.WitnessAllow,
|
|
Condition: (*transaction.ConditionGroup)(pk.PublicKey()),
|
|
}},
|
|
},
|
|
},
|
|
}
|
|
ic.Tx = tx
|
|
callingScriptHash := scriptHash
|
|
loadScriptWithHashAndFlags(ic, script, callingScriptHash, callflag.All)
|
|
ic.VM.LoadScriptWithHash([]byte{0x1}, random.Uint160(), callflag.AllowCall)
|
|
check(t, ic, hash.BytesBE(), true)
|
|
})
|
|
})
|
|
})
|
|
t.Run("positive", func(t *testing.T) {
|
|
t.Run("calling scripthash", func(t *testing.T) {
|
|
t.Run("hashed witness", func(t *testing.T) {
|
|
callingScriptHash := scriptHash
|
|
loadScriptWithHashAndFlags(ic, script, callingScriptHash, callflag.All)
|
|
ic.VM.LoadScriptWithHash([]byte{0x1}, random.Uint160(), callflag.All)
|
|
check(t, ic, callingScriptHash.BytesBE(), false, true)
|
|
})
|
|
t.Run("keyed witness", func(t *testing.T) {
|
|
pk, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
callingScriptHash := pk.PublicKey().GetScriptHash()
|
|
loadScriptWithHashAndFlags(ic, script, callingScriptHash, callflag.All)
|
|
ic.VM.LoadScriptWithHash([]byte{0x1}, random.Uint160(), callflag.All)
|
|
check(t, ic, pk.PublicKey().Bytes(), false, true)
|
|
})
|
|
})
|
|
t.Run("check scope", func(t *testing.T) {
|
|
t.Run("Global", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.Global,
|
|
},
|
|
},
|
|
}
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
ic.Tx = tx
|
|
check(t, ic, hash.BytesBE(), false, true)
|
|
})
|
|
t.Run("CalledByEntry", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.CalledByEntry,
|
|
},
|
|
},
|
|
}
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
ic.Tx = tx
|
|
check(t, ic, hash.BytesBE(), false, true)
|
|
})
|
|
t.Run("CustomContracts", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.CustomContracts,
|
|
AllowedContracts: []util.Uint160{scriptHash},
|
|
},
|
|
},
|
|
}
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
ic.Tx = tx
|
|
check(t, ic, hash.BytesBE(), false, true)
|
|
})
|
|
t.Run("CustomGroups", func(t *testing.T) {
|
|
t.Run("unknown scripthash", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.CustomGroups,
|
|
AllowedGroups: []*keys.PublicKey{},
|
|
},
|
|
},
|
|
}
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
ic.Tx = tx
|
|
check(t, ic, hash.BytesBE(), false, false)
|
|
})
|
|
t.Run("positive", func(t *testing.T) {
|
|
targetHash := random.Uint160()
|
|
pk, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: targetHash,
|
|
Scopes: transaction.CustomGroups,
|
|
AllowedGroups: []*keys.PublicKey{pk.PublicKey()},
|
|
},
|
|
},
|
|
}
|
|
contractScript := []byte{byte(opcode.PUSH1), byte(opcode.RET)}
|
|
contractScriptHash := hash.Hash160(contractScript)
|
|
ne, err := nef.NewFile(contractScript)
|
|
require.NoError(t, err)
|
|
contractState := &state.Contract{
|
|
ContractBase: state.ContractBase{
|
|
ID: 15,
|
|
Hash: contractScriptHash,
|
|
NEF: *ne,
|
|
Manifest: manifest.Manifest{
|
|
Groups: []manifest.Group{{PublicKey: pk.PublicKey(), Signature: make([]byte, keys.SignatureLen)}},
|
|
},
|
|
},
|
|
}
|
|
require.NoError(t, bc.contracts.Management.PutContractState(ic.DAO, contractState))
|
|
loadScriptWithHashAndFlags(ic, contractScript, contractScriptHash, callflag.All)
|
|
ic.Tx = tx
|
|
check(t, ic, targetHash.BytesBE(), false, true)
|
|
})
|
|
})
|
|
t.Run("Rules", func(t *testing.T) {
|
|
t.Run("no match", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.Rules,
|
|
Rules: []transaction.WitnessRule{{
|
|
Action: transaction.WitnessAllow,
|
|
Condition: (*transaction.ConditionScriptHash)(&hash),
|
|
}},
|
|
},
|
|
},
|
|
}
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
ic.Tx = tx
|
|
check(t, ic, hash.BytesBE(), false, false)
|
|
})
|
|
t.Run("allow", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
var cond = true
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.Rules,
|
|
Rules: []transaction.WitnessRule{{
|
|
Action: transaction.WitnessAllow,
|
|
Condition: (*transaction.ConditionBoolean)(&cond),
|
|
}},
|
|
},
|
|
},
|
|
}
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
ic.Tx = tx
|
|
check(t, ic, hash.BytesBE(), false, true)
|
|
})
|
|
t.Run("deny", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
var cond = true
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.Rules,
|
|
Rules: []transaction.WitnessRule{{
|
|
Action: transaction.WitnessDeny,
|
|
Condition: (*transaction.ConditionBoolean)(&cond),
|
|
}},
|
|
},
|
|
},
|
|
}
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
ic.Tx = tx
|
|
check(t, ic, hash.BytesBE(), false, false)
|
|
})
|
|
})
|
|
t.Run("bad scope", func(t *testing.T) {
|
|
hash := random.Uint160()
|
|
tx := &transaction.Transaction{
|
|
Signers: []transaction.Signer{
|
|
{
|
|
Account: hash,
|
|
Scopes: transaction.None,
|
|
},
|
|
},
|
|
}
|
|
loadScriptWithHashAndFlags(ic, script, scriptHash, callflag.ReadStates)
|
|
ic.Tx = tx
|
|
check(t, ic, hash.BytesBE(), false, false)
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestLoadToken(t *testing.T) {
|
|
bc := newTestChain(t)
|
|
|
|
cs, _ := getTestContractState(t, 4, 5, random.Uint160()) // sender and IDs are not important for the test
|
|
require.NoError(t, bc.contracts.Management.PutContractState(bc.dao, cs))
|
|
|
|
t.Run("good", func(t *testing.T) {
|
|
aer, err := invokeContractMethod(bc, 1_00000000, cs.Hash, "callT0", neoOwner.BytesBE())
|
|
require.NoError(t, err)
|
|
realBalance, _ := bc.GetGoverningTokenBalance(neoOwner)
|
|
checkResult(t, aer, stackitem.Make(realBalance.Int64()+1))
|
|
})
|
|
t.Run("invalid param count", func(t *testing.T) {
|
|
aer, err := invokeContractMethod(bc, 1_00000000, cs.Hash, "callT2")
|
|
require.NoError(t, err)
|
|
checkFAULTState(t, aer)
|
|
})
|
|
t.Run("invalid contract", func(t *testing.T) {
|
|
aer, err := invokeContractMethod(bc, 1_00000000, cs.Hash, "callT1")
|
|
require.NoError(t, err)
|
|
checkFAULTState(t, aer)
|
|
})
|
|
}
|
|
|
|
func TestRuntimeGetNetwork(t *testing.T) {
|
|
bc := newTestChain(t)
|
|
|
|
w := io.NewBufBinWriter()
|
|
emit.Syscall(w.BinWriter, interopnames.SystemRuntimeGetNetwork)
|
|
require.NoError(t, w.Err)
|
|
|
|
tx := transaction.New(w.Bytes(), 10_000)
|
|
tx.ValidUntilBlock = bc.BlockHeight() + 1
|
|
addSigners(neoOwner, tx)
|
|
require.NoError(t, testchain.SignTx(bc, tx))
|
|
|
|
require.NoError(t, bc.AddBlock(bc.newBlock(tx)))
|
|
|
|
aer, err := bc.GetAppExecResults(tx.Hash(), trigger.Application)
|
|
require.NoError(t, err)
|
|
checkResult(t, &aer[0], stackitem.Make(uint32(bc.config.Magic)))
|
|
}
|
|
|
|
func TestRuntimeBurnGas(t *testing.T) {
|
|
bc := newTestChain(t)
|
|
|
|
cs, _ := getTestContractState(t, 4, 5, random.Uint160()) // sender and IDs are not important for the test
|
|
require.NoError(t, bc.contracts.Management.PutContractState(bc.dao, cs))
|
|
|
|
const sysFee = 2_000000
|
|
|
|
t.Run("good", func(t *testing.T) {
|
|
aer, err := invokeContractMethod(bc, sysFee, cs.Hash, "burnGas", int64(1))
|
|
require.NoError(t, err)
|
|
require.Equal(t, vm.HaltState, aer.VMState)
|
|
|
|
t.Run("gas limit exceeded", func(t *testing.T) {
|
|
aer, err = invokeContractMethod(bc, aer.GasConsumed, cs.Hash, "burnGas", int64(2))
|
|
require.NoError(t, err)
|
|
require.Equal(t, vm.FaultState, aer.VMState)
|
|
})
|
|
})
|
|
t.Run("too big integer", func(t *testing.T) {
|
|
gas := big.NewInt(math.MaxInt64)
|
|
gas.Add(gas, big.NewInt(1))
|
|
|
|
aer, err := invokeContractMethod(bc, sysFee, cs.Hash, "burnGas", gas)
|
|
require.NoError(t, err)
|
|
checkFAULTState(t, aer)
|
|
})
|
|
t.Run("zero GAS", func(t *testing.T) {
|
|
aer, err := invokeContractMethod(bc, sysFee, cs.Hash, "burnGas", int64(0))
|
|
require.NoError(t, err)
|
|
checkFAULTState(t, aer)
|
|
})
|
|
}
|