2018-02-04 19:54:51 +00:00
|
|
|
package core
|
|
|
|
|
|
|
|
import (
|
2020-08-13 10:42:21 +00:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2020-07-09 09:57:24 +00:00
|
|
|
"math/big"
|
2020-08-13 10:42:21 +00:00
|
|
|
"math/rand"
|
2018-02-04 19:54:51 +00:00
|
|
|
"testing"
|
2020-05-12 14:20:41 +00:00
|
|
|
"time"
|
2018-02-06 06:43:32 +00:00
|
|
|
|
2020-06-18 09:00:51 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/config/netmode"
|
2020-03-03 14:21:42 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/core/block"
|
2020-05-12 14:20:41 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/core/state"
|
2020-03-03 14:21:42 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/core/storage"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/core/transaction"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/crypto/hash"
|
2020-08-13 10:42:21 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/internal/testchain"
|
2020-05-12 14:20:41 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/io"
|
2020-08-13 15:42:53 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/smartcontract/trigger"
|
2020-03-03 14:21:42 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/util"
|
2020-07-27 14:57:53 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/vm"
|
2020-05-12 14:20:41 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/emit"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/opcode"
|
2020-08-13 10:42:21 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/stackitem"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/wallet"
|
2018-03-09 15:55:25 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2019-02-20 17:39:32 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2018-02-04 19:54:51 +00:00
|
|
|
)
|
|
|
|
|
2020-08-13 10:57:30 +00:00
|
|
|
func TestVerifyHeader(t *testing.T) {
|
|
|
|
bc := newTestChain(t)
|
|
|
|
defer bc.Close()
|
|
|
|
prev := bc.topBlock.Load().(*block.Block).Header()
|
|
|
|
t.Run("Invalid", func(t *testing.T) {
|
|
|
|
t.Run("Hash", func(t *testing.T) {
|
|
|
|
h := prev.Hash()
|
|
|
|
h[0] = ^h[0]
|
|
|
|
hdr := newBlock(bc.config, 1, h).Header()
|
|
|
|
require.True(t, errors.Is(bc.verifyHeader(hdr, prev), ErrHdrHashMismatch))
|
|
|
|
})
|
|
|
|
t.Run("Index", func(t *testing.T) {
|
|
|
|
hdr := newBlock(bc.config, 3, prev.Hash()).Header()
|
|
|
|
require.True(t, errors.Is(bc.verifyHeader(hdr, prev), ErrHdrIndexMismatch))
|
|
|
|
})
|
|
|
|
t.Run("Timestamp", func(t *testing.T) {
|
|
|
|
hdr := newBlock(bc.config, 1, prev.Hash()).Header()
|
|
|
|
hdr.Timestamp = 0
|
|
|
|
require.True(t, errors.Is(bc.verifyHeader(hdr, prev), ErrHdrInvalidTimestamp))
|
|
|
|
})
|
|
|
|
})
|
|
|
|
t.Run("Valid", func(t *testing.T) {
|
|
|
|
hdr := newBlock(bc.config, 1, prev.Hash()).Header()
|
|
|
|
require.NoError(t, bc.verifyHeader(hdr, prev))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-02-06 06:43:32 +00:00
|
|
|
func TestAddHeaders(t *testing.T) {
|
2018-03-17 11:53:21 +00:00
|
|
|
bc := newTestChain(t)
|
2020-02-29 14:53:28 +00:00
|
|
|
defer bc.Close()
|
2020-02-29 14:24:37 +00:00
|
|
|
lastBlock := bc.topBlock.Load().(*block.Block)
|
|
|
|
h1 := newBlock(bc.config, 1, lastBlock.Hash()).Header()
|
|
|
|
h2 := newBlock(bc.config, 2, h1.Hash()).Header()
|
|
|
|
h3 := newBlock(bc.config, 3, h2.Hash()).Header()
|
2018-02-04 19:54:51 +00:00
|
|
|
|
2020-02-29 14:52:09 +00:00
|
|
|
require.NoError(t, bc.AddHeaders())
|
|
|
|
require.NoError(t, bc.AddHeaders(h1, h2))
|
|
|
|
require.NoError(t, bc.AddHeaders(h2, h3))
|
2018-03-09 15:55:25 +00:00
|
|
|
|
|
|
|
assert.Equal(t, h3.Index, bc.HeaderHeight())
|
|
|
|
assert.Equal(t, uint32(0), bc.BlockHeight())
|
|
|
|
assert.Equal(t, h3.Hash(), bc.CurrentHeaderHash())
|
2018-03-10 12:04:06 +00:00
|
|
|
|
|
|
|
// Add them again, they should not be added.
|
2020-03-03 12:34:03 +00:00
|
|
|
require.NoError(t, bc.AddHeaders(h3, h2, h1))
|
2020-02-29 14:52:09 +00:00
|
|
|
|
|
|
|
assert.Equal(t, h3.Index, bc.HeaderHeight())
|
|
|
|
assert.Equal(t, uint32(0), bc.BlockHeight())
|
|
|
|
assert.Equal(t, h3.Hash(), bc.CurrentHeaderHash())
|
|
|
|
|
|
|
|
h4 := newBlock(bc.config, 4, h3.Hash().Reverse()).Header()
|
|
|
|
h5 := newBlock(bc.config, 5, h4.Hash()).Header()
|
|
|
|
|
|
|
|
assert.Error(t, bc.AddHeaders(h4, h5))
|
|
|
|
assert.Equal(t, h3.Index, bc.HeaderHeight())
|
|
|
|
assert.Equal(t, uint32(0), bc.BlockHeight())
|
|
|
|
assert.Equal(t, h3.Hash(), bc.CurrentHeaderHash())
|
2018-03-10 12:04:06 +00:00
|
|
|
|
2020-02-29 14:52:09 +00:00
|
|
|
h6 := newBlock(bc.config, 4, h3.Hash()).Header()
|
|
|
|
h6.Script.InvocationScript = nil
|
|
|
|
assert.Error(t, bc.AddHeaders(h6))
|
2018-03-10 12:04:06 +00:00
|
|
|
assert.Equal(t, h3.Index, bc.HeaderHeight())
|
|
|
|
assert.Equal(t, uint32(0), bc.BlockHeight())
|
|
|
|
assert.Equal(t, h3.Hash(), bc.CurrentHeaderHash())
|
2018-03-09 15:55:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAddBlock(t *testing.T) {
|
2020-02-29 14:16:13 +00:00
|
|
|
const size = 3
|
2018-03-17 11:53:21 +00:00
|
|
|
bc := newTestChain(t)
|
2020-02-29 14:16:13 +00:00
|
|
|
blocks, err := bc.genBlocks(size)
|
|
|
|
require.NoError(t, err)
|
2018-03-09 15:55:25 +00:00
|
|
|
|
|
|
|
lastBlock := blocks[len(blocks)-1]
|
|
|
|
assert.Equal(t, lastBlock.Index, bc.HeaderHeight())
|
|
|
|
assert.Equal(t, lastBlock.Hash(), bc.CurrentHeaderHash())
|
2018-03-25 10:45:54 +00:00
|
|
|
|
2019-09-24 15:51:20 +00:00
|
|
|
// This one tests persisting blocks, so it does need to persist()
|
2019-10-21 07:04:58 +00:00
|
|
|
require.NoError(t, bc.persist())
|
2018-03-09 15:55:25 +00:00
|
|
|
|
2018-03-25 10:45:54 +00:00
|
|
|
for _, block := range blocks {
|
2019-11-27 09:23:18 +00:00
|
|
|
key := storage.AppendPrefix(storage.DataBlock, block.Hash().BytesLE())
|
2020-04-07 09:41:12 +00:00
|
|
|
_, err := bc.dao.Store.Get(key)
|
2020-02-29 15:55:16 +00:00
|
|
|
require.NoErrorf(t, err, "block %s not persisted", block.Hash())
|
2018-03-25 10:45:54 +00:00
|
|
|
}
|
|
|
|
|
2018-03-09 15:55:25 +00:00
|
|
|
assert.Equal(t, lastBlock.Index, bc.BlockHeight())
|
|
|
|
assert.Equal(t, lastBlock.Hash(), bc.CurrentHeaderHash())
|
|
|
|
}
|
|
|
|
|
2019-12-25 15:18:17 +00:00
|
|
|
func TestScriptFromWitness(t *testing.T) {
|
|
|
|
witness := &transaction.Witness{}
|
|
|
|
h := util.Uint160{1, 2, 3}
|
|
|
|
|
|
|
|
res, err := ScriptFromWitness(h, witness)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, res)
|
|
|
|
|
|
|
|
witness.VerificationScript = []byte{4, 8, 15, 16, 23, 42}
|
|
|
|
h = hash.Hash160(witness.VerificationScript)
|
|
|
|
|
|
|
|
res, err = ScriptFromWitness(h, witness)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, res)
|
|
|
|
|
|
|
|
h[0] = ^h[0]
|
|
|
|
res, err = ScriptFromWitness(h, witness)
|
|
|
|
require.Error(t, err)
|
|
|
|
require.Nil(t, res)
|
|
|
|
}
|
|
|
|
|
2018-03-17 11:53:21 +00:00
|
|
|
func TestGetHeader(t *testing.T) {
|
|
|
|
bc := newTestChain(t)
|
2020-06-18 09:00:51 +00:00
|
|
|
tx := transaction.New(netmode.UnitTestNet, []byte{byte(opcode.PUSH1)}, 0)
|
2020-04-15 06:50:13 +00:00
|
|
|
tx.ValidUntilBlock = bc.BlockHeight() + 1
|
2020-07-29 16:57:38 +00:00
|
|
|
addSigners(tx)
|
2020-04-16 14:10:42 +00:00
|
|
|
assert.Nil(t, signTx(bc, tx))
|
2020-04-15 06:50:13 +00:00
|
|
|
block := bc.newBlock(tx)
|
2018-03-17 11:53:21 +00:00
|
|
|
err := bc.AddBlock(block)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
|
2019-09-24 15:51:20 +00:00
|
|
|
// Test unpersisted and persisted access
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
hash := block.Hash()
|
|
|
|
header, err := bc.GetHeader(hash)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, block.Header(), header)
|
|
|
|
|
2020-02-29 14:24:37 +00:00
|
|
|
b2 := bc.newBlock()
|
2019-09-24 15:51:20 +00:00
|
|
|
_, err = bc.GetHeader(b2.Hash())
|
|
|
|
assert.Error(t, err)
|
2019-10-21 07:04:58 +00:00
|
|
|
assert.NoError(t, bc.persist())
|
2019-09-24 15:51:20 +00:00
|
|
|
}
|
2018-03-17 11:53:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestGetBlock(t *testing.T) {
|
|
|
|
bc := newTestChain(t)
|
2020-02-29 14:16:13 +00:00
|
|
|
blocks, err := bc.genBlocks(100)
|
|
|
|
require.NoError(t, err)
|
2018-03-17 11:53:21 +00:00
|
|
|
|
2019-09-24 15:51:20 +00:00
|
|
|
// Test unpersisted and persisted access
|
|
|
|
for j := 0; j < 2; j++ {
|
|
|
|
for i := 0; i < len(blocks); i++ {
|
|
|
|
block, err := bc.GetBlock(blocks[i].Hash())
|
2020-02-29 15:55:16 +00:00
|
|
|
require.NoErrorf(t, err, "can't get block %d: %s, attempt %d", i, err, j)
|
2019-09-24 15:51:20 +00:00
|
|
|
assert.Equal(t, blocks[i].Index, block.Index)
|
|
|
|
assert.Equal(t, blocks[i].Hash(), block.Hash())
|
2018-03-17 11:53:21 +00:00
|
|
|
}
|
2019-10-21 07:04:58 +00:00
|
|
|
assert.NoError(t, bc.persist())
|
2018-03-17 11:53:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-13 10:42:21 +00:00
|
|
|
func (bc *Blockchain) newTestTx(h util.Uint160, script []byte) *transaction.Transaction {
|
|
|
|
tx := transaction.New(testchain.Network(), script, 1_000_000)
|
|
|
|
tx.Nonce = rand.Uint32()
|
|
|
|
tx.ValidUntilBlock = 100
|
|
|
|
tx.Signers = []transaction.Signer{{
|
|
|
|
Account: h,
|
|
|
|
Scopes: transaction.CalledByEntry,
|
|
|
|
}}
|
|
|
|
tx.NetworkFee = int64(io.GetVarSize(tx)+200 /* witness */) * bc.FeePerByte()
|
|
|
|
tx.NetworkFee += 1_000_000 // verification cost
|
|
|
|
return tx
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestVerifyTx(t *testing.T) {
|
|
|
|
bc := newTestChain(t)
|
|
|
|
defer bc.Close()
|
|
|
|
|
|
|
|
accs := make([]*wallet.Account, 2)
|
|
|
|
for i := range accs {
|
|
|
|
var err error
|
|
|
|
accs[i], err = wallet.NewAccount()
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
neoHash := bc.contracts.NEO.Hash
|
|
|
|
gasHash := bc.contracts.GAS.Hash
|
|
|
|
w := io.NewBufBinWriter()
|
|
|
|
for _, sc := range []util.Uint160{neoHash, gasHash} {
|
|
|
|
for _, a := range accs {
|
|
|
|
amount := int64(1_000_000)
|
|
|
|
if sc.Equals(gasHash) {
|
|
|
|
amount = 1_000_000_000
|
|
|
|
}
|
|
|
|
emit.AppCallWithOperationAndArgs(w.BinWriter, sc, "transfer",
|
|
|
|
neoOwner, a.PrivateKey().GetScriptHash(), amount)
|
|
|
|
emit.Opcode(w.BinWriter, opcode.ASSERT)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
require.NoError(t, w.Err)
|
|
|
|
|
|
|
|
txMove := bc.newTestTx(neoOwner, w.Bytes())
|
|
|
|
txMove.SystemFee = 1_000_000_000
|
|
|
|
require.NoError(t, signTx(bc, txMove))
|
|
|
|
b := bc.newBlock(txMove)
|
|
|
|
require.NoError(t, bc.AddBlock(b))
|
|
|
|
|
|
|
|
aer, err := bc.GetAppExecResult(txMove.Hash())
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, aer.VMState, vm.HaltState)
|
|
|
|
|
|
|
|
res, err := invokeNativePolicyMethod(bc, "blockAccount", accs[1].PrivateKey().GetScriptHash().BytesBE())
|
|
|
|
require.NoError(t, err)
|
|
|
|
checkResult(t, res, stackitem.NewBool(true))
|
|
|
|
|
|
|
|
checkErr := func(t *testing.T, expectedErr error, tx *transaction.Transaction) {
|
|
|
|
err := bc.verifyTx(tx, nil)
|
|
|
|
fmt.Println(err)
|
|
|
|
require.True(t, errors.Is(err, expectedErr))
|
|
|
|
}
|
|
|
|
|
|
|
|
testScript := []byte{byte(opcode.PUSH1)}
|
|
|
|
h := accs[0].PrivateKey().GetScriptHash()
|
|
|
|
t.Run("Expired", func(t *testing.T) {
|
|
|
|
tx := bc.newTestTx(h, testScript)
|
|
|
|
tx.ValidUntilBlock = 1
|
|
|
|
require.NoError(t, accs[0].SignTx(tx))
|
|
|
|
checkErr(t, ErrTxExpired, tx)
|
|
|
|
})
|
|
|
|
t.Run("BlockedAccount", func(t *testing.T) {
|
|
|
|
tx := bc.newTestTx(accs[1].PrivateKey().GetScriptHash(), testScript)
|
|
|
|
require.NoError(t, accs[1].SignTx(tx))
|
|
|
|
err := bc.verifyTx(tx, nil)
|
|
|
|
require.True(t, errors.Is(err, ErrPolicy))
|
|
|
|
})
|
|
|
|
t.Run("InsufficientGas", func(t *testing.T) {
|
|
|
|
balance := bc.GetUtilityTokenBalance(h)
|
|
|
|
tx := bc.newTestTx(h, testScript)
|
|
|
|
tx.SystemFee = balance.Int64() + 1
|
|
|
|
require.NoError(t, accs[0].SignTx(tx))
|
|
|
|
checkErr(t, ErrInsufficientFunds, tx)
|
|
|
|
})
|
|
|
|
t.Run("TooBigTx", func(t *testing.T) {
|
|
|
|
script := make([]byte, transaction.MaxTransactionSize)
|
|
|
|
tx := bc.newTestTx(h, script)
|
|
|
|
require.NoError(t, accs[0].SignTx(tx))
|
|
|
|
checkErr(t, ErrTxTooBig, tx)
|
|
|
|
})
|
|
|
|
t.Run("SmallNetworkFee", func(t *testing.T) {
|
|
|
|
tx := bc.newTestTx(h, testScript)
|
|
|
|
tx.NetworkFee = 1
|
|
|
|
require.NoError(t, accs[0].SignTx(tx))
|
|
|
|
checkErr(t, ErrTxSmallNetworkFee, tx)
|
|
|
|
})
|
|
|
|
t.Run("Conflict", func(t *testing.T) {
|
|
|
|
balance := bc.GetUtilityTokenBalance(h).Int64()
|
|
|
|
tx := bc.newTestTx(h, testScript)
|
|
|
|
tx.NetworkFee = balance / 2
|
|
|
|
require.NoError(t, accs[0].SignTx(tx))
|
|
|
|
checkErr(t, nil, tx)
|
|
|
|
|
|
|
|
tx2 := bc.newTestTx(h, testScript)
|
|
|
|
tx2.NetworkFee = balance / 2
|
|
|
|
require.NoError(t, bc.memPool.Add(tx2, bc))
|
|
|
|
checkErr(t, ErrMemPoolConflict, tx)
|
|
|
|
})
|
|
|
|
t.Run("NotEnoughWitnesses", func(t *testing.T) {
|
|
|
|
tx := bc.newTestTx(h, testScript)
|
|
|
|
checkErr(t, ErrTxInvalidWitnessNum, tx)
|
|
|
|
})
|
|
|
|
t.Run("InvalidWitnessHash", func(t *testing.T) {
|
|
|
|
tx := bc.newTestTx(h, testScript)
|
|
|
|
require.NoError(t, accs[0].SignTx(tx))
|
|
|
|
tx.Scripts[0].VerificationScript = []byte{byte(opcode.PUSHT)}
|
|
|
|
checkErr(t, ErrWitnessHashMismatch, tx)
|
|
|
|
})
|
|
|
|
t.Run("InvalidWitnessSignature", func(t *testing.T) {
|
|
|
|
tx := bc.newTestTx(h, testScript)
|
|
|
|
require.NoError(t, accs[0].SignTx(tx))
|
|
|
|
tx.Scripts[0].InvocationScript[10] = ^tx.Scripts[0].InvocationScript[10]
|
|
|
|
checkErr(t, ErrVerificationFailed, tx)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-08-13 15:42:53 +00:00
|
|
|
func TestVerifyHashAgainstScript(t *testing.T) {
|
|
|
|
bc := newTestChain(t)
|
|
|
|
defer bc.Close()
|
|
|
|
|
|
|
|
cs, csInvalid := getTestContractState()
|
|
|
|
ic := bc.newInteropContext(trigger.Verification, bc.dao, nil, nil)
|
|
|
|
require.NoError(t, ic.DAO.PutContractState(cs))
|
|
|
|
require.NoError(t, ic.DAO.PutContractState(csInvalid))
|
|
|
|
|
|
|
|
gas := bc.contracts.Policy.GetMaxVerificationGas(ic.DAO)
|
|
|
|
t.Run("Contract", func(t *testing.T) {
|
|
|
|
t.Run("Missing", func(t *testing.T) {
|
|
|
|
newH := cs.ScriptHash()
|
|
|
|
newH[0] = ^newH[0]
|
|
|
|
w := &transaction.Witness{InvocationScript: []byte{byte(opcode.PUSH4)}}
|
|
|
|
err := bc.verifyHashAgainstScript(newH, w, ic, false, gas)
|
|
|
|
require.True(t, errors.Is(err, ErrUnknownVerificationContract))
|
|
|
|
})
|
|
|
|
t.Run("Invalid", func(t *testing.T) {
|
|
|
|
w := &transaction.Witness{InvocationScript: []byte{byte(opcode.PUSH4)}}
|
|
|
|
err := bc.verifyHashAgainstScript(csInvalid.ScriptHash(), w, ic, false, gas)
|
|
|
|
require.True(t, errors.Is(err, ErrInvalidVerificationContract))
|
|
|
|
})
|
|
|
|
t.Run("ValidSignature", func(t *testing.T) {
|
|
|
|
w := &transaction.Witness{InvocationScript: []byte{byte(opcode.PUSH4)}}
|
|
|
|
err := bc.verifyHashAgainstScript(cs.ScriptHash(), w, ic, false, gas)
|
|
|
|
require.NoError(t, err)
|
|
|
|
})
|
|
|
|
t.Run("InvalidSignature", func(t *testing.T) {
|
|
|
|
w := &transaction.Witness{InvocationScript: []byte{byte(opcode.PUSH3)}}
|
|
|
|
err := bc.verifyHashAgainstScript(cs.ScriptHash(), w, ic, false, gas)
|
|
|
|
require.True(t, errors.Is(err, ErrVerificationFailed))
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-03-17 11:53:21 +00:00
|
|
|
func TestHasBlock(t *testing.T) {
|
|
|
|
bc := newTestChain(t)
|
2020-02-29 14:16:13 +00:00
|
|
|
blocks, err := bc.genBlocks(50)
|
|
|
|
require.NoError(t, err)
|
2018-03-17 11:53:21 +00:00
|
|
|
|
2019-09-24 15:51:20 +00:00
|
|
|
// Test unpersisted and persisted access
|
|
|
|
for j := 0; j < 2; j++ {
|
|
|
|
for i := 0; i < len(blocks); i++ {
|
|
|
|
assert.True(t, bc.HasBlock(blocks[i].Hash()))
|
|
|
|
}
|
2020-02-29 14:24:37 +00:00
|
|
|
newBlock := bc.newBlock()
|
2019-09-24 15:51:20 +00:00
|
|
|
assert.False(t, bc.HasBlock(newBlock.Hash()))
|
2019-10-21 07:04:58 +00:00
|
|
|
assert.NoError(t, bc.persist())
|
2018-03-17 11:53:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-15 06:50:13 +00:00
|
|
|
//TODO NEO3.0:Update binary
|
|
|
|
/*
|
2018-03-21 16:11:04 +00:00
|
|
|
func TestGetTransaction(t *testing.T) {
|
2019-09-26 15:14:00 +00:00
|
|
|
b1 := getDecodedBlock(t, 1)
|
2019-09-10 20:21:26 +00:00
|
|
|
block := getDecodedBlock(t, 2)
|
2018-03-21 16:11:04 +00:00
|
|
|
bc := newTestChain(t)
|
2019-10-21 08:05:10 +00:00
|
|
|
// Turn verification off, because these blocks are really from some other chain
|
|
|
|
// and can't be verified, but we don't care about that in this test.
|
|
|
|
bc.config.VerifyBlocks = false
|
2018-03-21 16:11:04 +00:00
|
|
|
|
2019-10-21 08:05:10 +00:00
|
|
|
assert.Nil(t, bc.AddBlock(b1))
|
|
|
|
assert.Nil(t, bc.AddBlock(block))
|
2018-03-21 16:11:04 +00:00
|
|
|
|
2019-09-24 15:51:20 +00:00
|
|
|
// Test unpersisted and persisted access
|
|
|
|
for j := 0; j < 2; j++ {
|
|
|
|
tx, height, err := bc.GetTransaction(block.Transactions[0].Hash())
|
|
|
|
require.Nil(t, err)
|
|
|
|
assert.Equal(t, block.Index, height)
|
|
|
|
assert.Equal(t, block.Transactions[0], tx)
|
|
|
|
assert.Equal(t, 10, io.GetVarSize(tx))
|
|
|
|
assert.Equal(t, 1, io.GetVarSize(tx.Attributes))
|
|
|
|
assert.Equal(t, 1, io.GetVarSize(tx.Inputs))
|
|
|
|
assert.Equal(t, 1, io.GetVarSize(tx.Outputs))
|
|
|
|
assert.Equal(t, 1, io.GetVarSize(tx.Scripts))
|
2019-10-21 07:04:58 +00:00
|
|
|
assert.NoError(t, bc.persist())
|
2018-03-21 16:11:04 +00:00
|
|
|
}
|
|
|
|
}
|
2020-04-15 06:50:13 +00:00
|
|
|
*/
|
2020-02-25 13:15:17 +00:00
|
|
|
func TestGetClaimable(t *testing.T) {
|
|
|
|
bc := newTestChain(t)
|
2020-06-27 09:36:43 +00:00
|
|
|
defer bc.Close()
|
2020-02-25 13:15:17 +00:00
|
|
|
|
|
|
|
bc.generationAmount = []int{4, 3, 2, 1}
|
|
|
|
bc.decrementInterval = 2
|
2020-02-27 13:48:24 +00:00
|
|
|
_, err := bc.genBlocks(10)
|
2020-02-25 13:15:17 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
t.Run("first generation period", func(t *testing.T) {
|
2020-07-09 09:57:24 +00:00
|
|
|
amount := bc.CalculateClaimable(big.NewInt(1), 0, 2)
|
|
|
|
require.EqualValues(t, big.NewInt(8), amount)
|
2020-02-25 13:15:17 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("a number of full periods", func(t *testing.T) {
|
2020-07-09 09:57:24 +00:00
|
|
|
amount := bc.CalculateClaimable(big.NewInt(1), 0, 6)
|
|
|
|
require.EqualValues(t, big.NewInt(4+4+3+3+2+2), amount)
|
2020-02-25 13:15:17 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("start from the 2-nd block", func(t *testing.T) {
|
2020-07-09 09:57:24 +00:00
|
|
|
amount := bc.CalculateClaimable(big.NewInt(1), 1, 7)
|
|
|
|
require.EqualValues(t, big.NewInt(4+3+3+2+2+1), amount)
|
2020-02-25 13:15:17 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("end height after generation has ended", func(t *testing.T) {
|
2020-07-09 09:57:24 +00:00
|
|
|
amount := bc.CalculateClaimable(big.NewInt(1), 1, 10)
|
|
|
|
require.EqualValues(t, big.NewInt(4+3+3+2+2+1+1), amount)
|
2020-02-25 13:15:17 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-11-07 17:47:48 +00:00
|
|
|
func TestClose(t *testing.T) {
|
|
|
|
defer func() {
|
|
|
|
r := recover()
|
|
|
|
assert.NotNil(t, r)
|
|
|
|
}()
|
|
|
|
bc := newTestChain(t)
|
2020-02-29 14:16:13 +00:00
|
|
|
_, err := bc.genBlocks(10)
|
|
|
|
require.NoError(t, err)
|
2019-11-07 17:47:48 +00:00
|
|
|
bc.Close()
|
|
|
|
// It's a hack, but we use internal knowledge of MemoryStore
|
|
|
|
// implementation which makes it completely unusable (up to panicing)
|
|
|
|
// after Close().
|
2020-04-07 09:41:12 +00:00
|
|
|
_ = bc.dao.Store.Put([]byte{0}, []byte{1})
|
2019-11-07 17:47:48 +00:00
|
|
|
|
|
|
|
// This should never be executed.
|
|
|
|
assert.Nil(t, t)
|
|
|
|
}
|
2020-05-12 14:20:41 +00:00
|
|
|
|
|
|
|
func TestSubscriptions(t *testing.T) {
|
|
|
|
// We use buffering here as a substitute for reader goroutines, events
|
|
|
|
// get queued up and we read them one by one here.
|
|
|
|
const chBufSize = 16
|
|
|
|
blockCh := make(chan *block.Block, chBufSize)
|
|
|
|
txCh := make(chan *transaction.Transaction, chBufSize)
|
|
|
|
notificationCh := make(chan *state.NotificationEvent, chBufSize)
|
|
|
|
executionCh := make(chan *state.AppExecResult, chBufSize)
|
|
|
|
|
|
|
|
bc := newTestChain(t)
|
core: fix TestSubscriptions occasional failures
panic: Log in goroutine after TestSubscriptions has completed
goroutine 1079 [running]:
testing.(*common).logDepth(0xc00057a100, 0xc00039e210, 0xa4, 0x3)
/usr/local/go/src/testing/testing.go:634 +0x51a
testing.(*common).log(...)
/usr/local/go/src/testing/testing.go:614
testing.(*common).Logf(0xc00057a100, 0xe32eaa, 0x2, 0xc0009560e0, 0x1, 0x1)
/usr/local/go/src/testing/testing.go:649 +0x91
go.uber.org/zap/zaptest.testingWriter.Write(0xf64120, 0xc00057a100, 0x0, 0xc0003fe400, 0xa5, 0x400, 0xc000958e40, 0xc0009560d0, 0xc000958e60)
/go/pkg/mod/go.uber.org/zap@v1.10.0/zaptest/logger.go:130 +0x120
go.uber.org/zap/zapcore.(*ioCore).Write(0xc0005cd050, 0x0, 0xbfb54ffc0626aba2, 0x916de700, 0x1485500, 0x0, 0x0, 0xe43fb0, 0x1c, 0x0, ...)
/go/pkg/mod/go.uber.org/zap@v1.10.0/zapcore/core.go:90 +0x1c5
go.uber.org/zap/zapcore.(*CheckedEntry).Write(0xc000102d10, 0xc00039a000, 0x5, 0x5)
/go/pkg/mod/go.uber.org/zap@v1.10.0/zapcore/entry.go:215 +0x1e8
go.uber.org/zap.(*Logger).Info(0xc00035eba0, 0xe43fb0, 0x1c, 0xc00039a000, 0x5, 0x5)
/go/pkg/mod/go.uber.org/zap@v1.10.0/logger.go:187 +0x96
github.com/nspcc-dev/neo-go/pkg/core.(*Blockchain).persist(0xc00000cb40, 0xc00017c2c0, 0xbe8a00)
/go/src/github.com/nspcc-dev/neo-go/pkg/core/blockchain.go:839 +0x6c9
github.com/nspcc-dev/neo-go/pkg/core.(*Blockchain).Run.func2(0xc00000cb40, 0xc0005c6c30)
/go/src/github.com/nspcc-dev/neo-go/pkg/core/blockchain.go:302 +0x54
created by github.com/nspcc-dev/neo-go/pkg/core.(*Blockchain).Run
/go/src/github.com/nspcc-dev/neo-go/pkg/core/blockchain.go:301 +0x25d
FAIL github.com/nspcc-dev/neo-go/pkg/core 2.463s
2020-06-25 16:22:38 +00:00
|
|
|
defer bc.Close()
|
2020-05-12 14:20:41 +00:00
|
|
|
bc.SubscribeForBlocks(blockCh)
|
|
|
|
bc.SubscribeForTransactions(txCh)
|
|
|
|
bc.SubscribeForNotifications(notificationCh)
|
|
|
|
bc.SubscribeForExecutions(executionCh)
|
|
|
|
|
|
|
|
assert.Empty(t, notificationCh)
|
|
|
|
assert.Empty(t, executionCh)
|
|
|
|
assert.Empty(t, blockCh)
|
|
|
|
assert.Empty(t, txCh)
|
|
|
|
|
|
|
|
blocks, err := bc.genBlocks(1)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Eventually(t, func() bool { return len(blockCh) != 0 }, time.Second, 10*time.Millisecond)
|
|
|
|
assert.Empty(t, notificationCh)
|
2020-06-18 11:19:55 +00:00
|
|
|
assert.Len(t, executionCh, 1)
|
2020-05-12 14:20:41 +00:00
|
|
|
assert.Empty(t, txCh)
|
|
|
|
|
|
|
|
b := <-blockCh
|
|
|
|
assert.Equal(t, blocks[0], b)
|
|
|
|
assert.Empty(t, blockCh)
|
|
|
|
|
2020-06-18 11:19:55 +00:00
|
|
|
aer := <-executionCh
|
|
|
|
assert.Equal(t, b.Hash(), aer.TxHash)
|
|
|
|
|
2020-05-12 14:20:41 +00:00
|
|
|
script := io.NewBufBinWriter()
|
|
|
|
emit.Bytes(script.BinWriter, []byte("yay!"))
|
2020-06-10 08:49:39 +00:00
|
|
|
emit.Syscall(script.BinWriter, "System.Runtime.Notify")
|
2020-05-12 14:20:41 +00:00
|
|
|
require.NoError(t, script.Err)
|
2020-06-18 09:00:51 +00:00
|
|
|
txGood1 := transaction.New(netmode.UnitTestNet, script.Bytes(), 0)
|
2020-07-29 16:57:38 +00:00
|
|
|
txGood1.Signers = []transaction.Signer{{Account: neoOwner}}
|
2020-05-12 14:20:41 +00:00
|
|
|
txGood1.Nonce = 1
|
|
|
|
txGood1.ValidUntilBlock = 100500
|
|
|
|
require.NoError(t, signTx(bc, txGood1))
|
|
|
|
|
|
|
|
// Reset() reuses the script buffer and we need to keep scripts.
|
|
|
|
script = io.NewBufBinWriter()
|
|
|
|
emit.Bytes(script.BinWriter, []byte("nay!"))
|
2020-06-10 08:49:39 +00:00
|
|
|
emit.Syscall(script.BinWriter, "System.Runtime.Notify")
|
2020-05-12 14:20:41 +00:00
|
|
|
emit.Opcode(script.BinWriter, opcode.THROW)
|
|
|
|
require.NoError(t, script.Err)
|
2020-06-18 09:00:51 +00:00
|
|
|
txBad := transaction.New(netmode.UnitTestNet, script.Bytes(), 0)
|
2020-07-29 16:57:38 +00:00
|
|
|
txBad.Signers = []transaction.Signer{{Account: neoOwner}}
|
2020-05-12 14:20:41 +00:00
|
|
|
txBad.Nonce = 2
|
|
|
|
txBad.ValidUntilBlock = 100500
|
|
|
|
require.NoError(t, signTx(bc, txBad))
|
|
|
|
|
|
|
|
script = io.NewBufBinWriter()
|
|
|
|
emit.Bytes(script.BinWriter, []byte("yay! yay! yay!"))
|
2020-06-10 08:49:39 +00:00
|
|
|
emit.Syscall(script.BinWriter, "System.Runtime.Notify")
|
2020-05-12 14:20:41 +00:00
|
|
|
require.NoError(t, script.Err)
|
2020-06-18 09:00:51 +00:00
|
|
|
txGood2 := transaction.New(netmode.UnitTestNet, script.Bytes(), 0)
|
2020-07-29 16:57:38 +00:00
|
|
|
txGood2.Signers = []transaction.Signer{{Account: neoOwner}}
|
2020-05-12 14:20:41 +00:00
|
|
|
txGood2.Nonce = 3
|
|
|
|
txGood2.ValidUntilBlock = 100500
|
|
|
|
require.NoError(t, signTx(bc, txGood2))
|
|
|
|
|
|
|
|
invBlock := newBlock(bc.config, bc.BlockHeight()+1, bc.CurrentHeaderHash(), txGood1, txBad, txGood2)
|
|
|
|
require.NoError(t, bc.AddBlock(invBlock))
|
|
|
|
|
|
|
|
require.Eventually(t, func() bool {
|
|
|
|
return len(blockCh) != 0 && len(txCh) != 0 &&
|
|
|
|
len(notificationCh) != 0 && len(executionCh) != 0
|
|
|
|
}, time.Second, 10*time.Millisecond)
|
|
|
|
|
|
|
|
b = <-blockCh
|
|
|
|
require.Equal(t, invBlock, b)
|
|
|
|
assert.Empty(t, blockCh)
|
|
|
|
|
2020-06-18 11:19:55 +00:00
|
|
|
exec := <-executionCh
|
|
|
|
require.Equal(t, b.Hash(), exec.TxHash)
|
2020-07-27 14:57:53 +00:00
|
|
|
require.Equal(t, exec.VMState, vm.HaltState)
|
2020-06-18 11:19:55 +00:00
|
|
|
|
|
|
|
// 3 burn events for every tx and 1 mint for primary node
|
|
|
|
require.True(t, len(notificationCh) >= 4)
|
|
|
|
for i := 0; i < 4; i++ {
|
|
|
|
notif := <-notificationCh
|
|
|
|
require.Equal(t, bc.contracts.GAS.Hash, notif.ScriptHash)
|
|
|
|
}
|
|
|
|
|
2020-05-12 14:20:41 +00:00
|
|
|
// Follow in-block transaction order.
|
|
|
|
for _, txExpected := range invBlock.Transactions {
|
|
|
|
tx := <-txCh
|
|
|
|
require.Equal(t, txExpected, tx)
|
2020-06-05 13:07:04 +00:00
|
|
|
exec := <-executionCh
|
|
|
|
require.Equal(t, tx.Hash(), exec.TxHash)
|
2020-07-27 14:57:53 +00:00
|
|
|
if exec.VMState == vm.HaltState {
|
2020-06-05 13:07:04 +00:00
|
|
|
notif := <-notificationCh
|
|
|
|
require.Equal(t, hash.Hash160(tx.Script), notif.ScriptHash)
|
2020-05-12 14:20:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
assert.Empty(t, txCh)
|
|
|
|
assert.Empty(t, notificationCh)
|
|
|
|
assert.Empty(t, executionCh)
|
|
|
|
|
|
|
|
bc.UnsubscribeFromBlocks(blockCh)
|
|
|
|
bc.UnsubscribeFromTransactions(txCh)
|
|
|
|
bc.UnsubscribeFromNotifications(notificationCh)
|
|
|
|
bc.UnsubscribeFromExecutions(executionCh)
|
|
|
|
|
|
|
|
// Ensure that new blocks are processed correctly after unsubscription.
|
|
|
|
_, err = bc.genBlocks(2 * chBufSize)
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|