forked from TrueCloudLab/neoneo-go
compiler: perform NEF size check on serialization
Retun an error if the serialized NEF size exceeds stackitem.MaxSize. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
This commit is contained in:
parent
14d98811a5
commit
90705e37e9
5 changed files with 76 additions and 4 deletions
|
@ -4,6 +4,7 @@ import (
|
|||
"bytes"
|
||||
"encoding/hex"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strconv"
|
||||
|
@ -1070,3 +1071,27 @@ func filterFilename(infos []os.DirEntry, ext string) string {
|
|||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
func TestContractCompile_NEFSizeCheck(t *testing.T) {
|
||||
tmpDir := t.TempDir()
|
||||
e := testcli.NewExecutor(t, false)
|
||||
|
||||
src := `package nefconstraints
|
||||
var data = "%s"
|
||||
|
||||
func Main() string {
|
||||
return data
|
||||
}`
|
||||
data := make([]byte, stackitem.MaxSize-10)
|
||||
for i := range data {
|
||||
data[i] = byte('a')
|
||||
}
|
||||
|
||||
in := filepath.Join(tmpDir, "main.go")
|
||||
cfg := filepath.Join(tmpDir, "main.yml")
|
||||
require.NoError(t, os.WriteFile(cfg, []byte("name: main"), os.ModePerm))
|
||||
require.NoError(t, os.WriteFile(in, []byte(fmt.Sprintf(src, data)), os.ModePerm))
|
||||
|
||||
e.RunWithError(t, "neo-go", "contract", "compile", "--in", in)
|
||||
require.NoFileExists(t, filepath.Join(tmpDir, "main.nef"))
|
||||
}
|
||||
|
|
|
@ -16,6 +16,7 @@ import (
|
|||
"github.com/nspcc-dev/neo-go/pkg/smartcontract"
|
||||
"github.com/nspcc-dev/neo-go/pkg/smartcontract/manifest"
|
||||
"github.com/nspcc-dev/neo-go/pkg/util"
|
||||
"github.com/nspcc-dev/neo-go/pkg/vm/stackitem"
|
||||
"github.com/stretchr/testify/require"
|
||||
)
|
||||
|
||||
|
@ -84,6 +85,29 @@ func TestCompiler(t *testing.T) {
|
|||
require.NoError(t, err)
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "TestCompileAndSave_NEF_constraints",
|
||||
function: func(t *testing.T) {
|
||||
tmp := t.TempDir()
|
||||
src := `package nefconstraints
|
||||
var data = "%s"
|
||||
|
||||
func Main() string {
|
||||
return data
|
||||
}
|
||||
`
|
||||
data := make([]byte, stackitem.MaxSize-10)
|
||||
for i := range data {
|
||||
data[i] = byte('a')
|
||||
}
|
||||
in := filepath.Join(tmp, "src.go")
|
||||
require.NoError(t, os.WriteFile(in, []byte(fmt.Sprintf(src, data)), os.ModePerm))
|
||||
out := filepath.Join(tmp, "test.nef")
|
||||
_, err := compiler.CompileAndSave(in, &compiler.Options{Outfile: out})
|
||||
require.Error(t, err)
|
||||
require.Contains(t, err.Error(), "serialized NEF size exceeds VM stackitem limits")
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
for _, tcase := range testCases {
|
||||
|
|
|
@ -37,6 +37,8 @@ type NativeContract struct {
|
|||
|
||||
// ToStackItem converts state.Contract to stackitem.Item.
|
||||
func (c *Contract) ToStackItem() (stackitem.Item, error) {
|
||||
// Do not skip the NEF size check, it won't affect native Management related
|
||||
// states as the same checked is performed during contract deploy/update.
|
||||
rawNef, err := c.NEF.Bytes()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
|
|
|
@ -99,8 +99,11 @@ func (h *Header) DecodeBinary(r *io.BinReader) {
|
|||
}
|
||||
|
||||
// CalculateChecksum returns first 4 bytes of double-SHA256(Header) converted to uint32.
|
||||
// CalculateChecksum doesn't perform the resulting serialized NEF size check, and return
|
||||
// the checksum irrespectively to the size limit constraint. It's a caller's duty to check
|
||||
// the resulting NEF size.
|
||||
func (n *File) CalculateChecksum() uint32 {
|
||||
bb, err := n.Bytes()
|
||||
bb, err := n.BytesLong()
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
|
@ -152,14 +155,32 @@ func (n *File) DecodeBinary(r *io.BinReader) {
|
|||
}
|
||||
}
|
||||
|
||||
// Bytes returns a byte array with a serialized NEF File.
|
||||
// Bytes returns a byte array with a serialized NEF File. It performs the
|
||||
// resulting NEF file size check and returns an error if serialized slice length
|
||||
// exceeds [stackitem.MaxSize].
|
||||
func (n File) Bytes() ([]byte, error) {
|
||||
return n.bytes(true)
|
||||
}
|
||||
|
||||
// BytesLong returns a byte array with a serialized NEF File. It performs no
|
||||
// resulting slice check.
|
||||
func (n File) BytesLong() ([]byte, error) {
|
||||
return n.bytes(false)
|
||||
}
|
||||
|
||||
// bytes returns the serialized NEF File representation and performs the resulting
|
||||
// byte array size check if needed.
|
||||
func (n File) bytes(checkSize bool) ([]byte, error) {
|
||||
buf := io.NewBufBinWriter()
|
||||
n.EncodeBinary(buf.BinWriter)
|
||||
if buf.Err != nil {
|
||||
return nil, buf.Err
|
||||
}
|
||||
return buf.Bytes(), nil
|
||||
res := buf.Bytes()
|
||||
if checkSize && len(res) > stackitem.MaxSize {
|
||||
return nil, fmt.Errorf("serialized NEF size exceeds VM stackitem limits: %d bytes is allowed at max, got %d", stackitem.MaxSize, len(res))
|
||||
}
|
||||
return res, nil
|
||||
}
|
||||
|
||||
// FileFromBytes returns a NEF File deserialized from the given bytes.
|
||||
|
|
|
@ -144,7 +144,7 @@ func TestNewFileFromBytesLimits(t *testing.T) {
|
|||
}
|
||||
expected.Checksum = expected.CalculateChecksum()
|
||||
|
||||
bytes, err := expected.Bytes()
|
||||
bytes, err := expected.BytesLong()
|
||||
require.NoError(t, err)
|
||||
_, err = FileFromBytes(bytes)
|
||||
require.Error(t, err)
|
||||
|
|
Loading…
Reference in a new issue