mirror of
				https://github.com/ton-blockchain/ton
				synced 2025-03-09 15:40:10 +00:00 
			
		
		
		
	* fix macOS github actions * fix android tonlib GH action; * fixing wasm GH action * strip binaries * fix randomly failing ubuntu and wasm GH actions * fix randomly failing ubuntu and wasm GH actions * revert some changes * adding more nix scripts and automated native build scripts; debug static ton compilation * minor fix * do not use pkg_config if path specified * move wasm script, run with sudo action script * weird, fixing - cp: missing destination file operand after 'assembly/native/build-ubuntu-20.04-shared.sh' * weird, fixing - cp: missing destination file operand after 'assembly/native/build-ubuntu-20.04-shared.sh' * ok * some adjustments for android and win builds * some adjustments for android and win builds * moving stripping inside the build script * access rights handling; adding simple binaries' tests * make lite-client-common, fift-lib and smc-envelope deliberately static; add -a (artifacts) flag to build scripts; * minor wasm build fix; create separate tonlib android build script; remove outdated __has_trivial_copy(T) * add windows build - WIP * adjust android build; improve win build; * adjust sodium paths for android build; use proper compiler for windows build; * add github windows build auxiliary file * adjust wasm build * add portable ubuntu build * exclude some unstable tests for some time * compile portable binaries on ubuntu-20.04 * exclude some unstable tests * include static gsl * restart builds * restart builds * restart builds * remove libreadline, gsl and blas dependencies in linux build * add macos build script * install missing autoconf in macos builds * enable all tests and see what fails * enable win tests and restart others * enable win tests and fix test-smartcont.cpp * enable win tests * use clang-16 on mac builds, add blockchain-explorer for ubuntu builds, add portable macos build * move sudo part outside a build scripts * move sudo part outside a build scripts * run llvm install with sudo * remove libgnutls28-dev before ubuntu static compilation, include blockchain-explorer into artifacts; remove warning: definition of implicit copy constructor for 'Stat' is deprecated because it has a user-declared copy assignment operator [-Wdeprecated-copy] * rework wrong decision, put back system gnutls, but compile libmicrohttpd with --disable-https * add jenkins pipeline sceleton * WIP jenkins pipeline sceleton * WIP jenkins pipeline changes * WIP jenkins pipeline: add stage timout, zip and group artifacts * WIP jenkins pipeline: macos portable build fix * WIP jenkins pipeline: wording * WIP jenkins pipeline: add android tonlib * WIP jenkins pipeline: add was binaries * WIP jenkins pipeline: add TOTAL_MEMORY 1.5gb to funcfiftlib wasm linking * WIP jenkins pipeline: add nix build on linux aarch64 * WIP jenkins pipeline: funcfiftlib compilation fails that 16mb mem is not enough, increase to 32mb * WIP jenkins pipeline: enable test in nix build * WIP jenkins pipeline: add linux x86-64 nix build * WIP jenkins pipeline: include libs in nix build * WIP jenkins pipeline: include libs in nix build * WIP jenkins pipeline: include mac nix build * WIP jenkins pipeline: include mac nix build * WIP jenkins pipeline: include mac nix build * WIP jenkins pipeline: include mac nix build * WIP jenkins pipeline: include mac nix build * WIP jenkins pipeline: include mac nix build * WIP jenkins pipeline: nix linux arm64 with openssl 1.1 for now * WIP jenkins pipeline: working ubuntu arm64 libtonjson * WIP jenkins pipeline: working ubuntu arm64 libtonjson + minor fix * WIP jenkins pipeline: working ubuntu arm64 libtonjson + minor fix 2 * WIP jenkins pipeline: merry christmas * WIP jenkins pipeline: merry christmas 2 * WIP jenkins pipeline: remove native static builds * WIP jenkins pipeline: enable more tests * WIP jenkins pipeline: zip artifacts better * WIP jenkins pipeline: get rid of path in the final zip * WIP jenkins pipeline: minor fix, include lib and smartcont folders * WIP jenkins pipeline: minor fix, include lib and smartcont folders into nix artifacts also * WIP jenkins pipeline: minor fix * WIP jenkins pipeline: minor fix * adjust github actions for new nix builds * cleanup * cleanup * cleanup * cleanup * rename libtonlibjson.so.0.5 to libtonlibjson.so * Add TON build instructions to README.md * simplify * fix test-tonlib-offline * set timeout per test of 300 sec * set timeout per test of 600 sec for non nix builds * increase test timeout to 900 sec; minor changes * use MS VS 2022 for win TON compilation; update README.md * use MS VS 2022 for win TON compilation; update README.md * change path to MSVC in github workflow * change path to MSVC in groovy pipeline * compile ton on win, with msvc 2022 community and enterprise versions * minor fixes * improve network tests * remove TON compilation against macos-11 github runner * add `choco feature enable -n allowEmptyChecksums` since pkg-config-lite-0.28-1 does not have a checksum * abort win compilation if 3pp can't be downloaded * increase test timeout to 30 min * improving test-catchain
		
			
				
	
	
		
			1665 lines
		
	
	
	
		
			63 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			1665 lines
		
	
	
	
		
			63 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|     This file is part of TON Blockchain Library.
 | |
| 
 | |
|     TON Blockchain Library is free software: you can redistribute it and/or modify
 | |
|     it under the terms of the GNU Lesser General Public License as published by
 | |
|     the Free Software Foundation, either version 2 of the License, or
 | |
|     (at your option) any later version.
 | |
| 
 | |
|     TON Blockchain Library is distributed in the hope that it will be useful,
 | |
|     but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
|     GNU Lesser General Public License for more details.
 | |
| 
 | |
|     You should have received a copy of the GNU Lesser General Public License
 | |
|     along with TON Blockchain Library.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
|     Copyright 2017-2020 Telegram Systems LLP
 | |
| */
 | |
| #include "vm/dict.h"
 | |
| #include "common/bigint.hpp"
 | |
| 
 | |
| #include "Ed25519.h"
 | |
| 
 | |
| #include "block/block-auto.h"
 | |
| #include "block/block.h"
 | |
| #include "block/block-parse.h"
 | |
| 
 | |
| #include "fift/Fift.h"
 | |
| #include "fift/words.h"
 | |
| #include "fift/utils.h"
 | |
| 
 | |
| #include "smc-envelope/GenericAccount.h"
 | |
| #include "smc-envelope/ManualDns.h"
 | |
| #include "smc-envelope/MultisigWallet.h"
 | |
| #include "smc-envelope/SmartContract.h"
 | |
| #include "smc-envelope/SmartContractCode.h"
 | |
| #include "smc-envelope/WalletV3.h"
 | |
| #include "smc-envelope/WalletV4.h"
 | |
| #include "smc-envelope/HighloadWallet.h"
 | |
| #include "smc-envelope/HighloadWalletV2.h"
 | |
| #include "smc-envelope/PaymentChannel.h"
 | |
| 
 | |
| #include "td/utils/base64.h"
 | |
| #include "td/utils/crypto.h"
 | |
| #include "td/utils/Random.h"
 | |
| #include "td/utils/tests.h"
 | |
| #include "td/utils/ScopeGuard.h"
 | |
| #include "td/utils/StringBuilder.h"
 | |
| #include "td/utils/Timer.h"
 | |
| #include "td/utils/PathView.h"
 | |
| #include "td/utils/filesystem.h"
 | |
| #include "td/utils/port/path.h"
 | |
| #include "td/utils/Variant.h"
 | |
| 
 | |
| #include <bitset>
 | |
| #include <set>
 | |
| #include <tuple>
 | |
| 
 | |
| std::string current_dir() {
 | |
|   return td::PathView(td::realpath(__FILE__).move_as_ok()).parent_dir().str();
 | |
| }
 | |
| 
 | |
| std::string load_source(std::string name) {
 | |
|   return td::read_file_str(current_dir() + "../../crypto/" + name).move_as_ok();
 | |
| }
 | |
| 
 | |
| td::Ref<vm::Cell> get_wallet_v3_source() {
 | |
|   std::string code = R"ABCD(
 | |
| SETCP0 DUP IFNOTRET // return if recv_internal
 | |
|    DUP 85143 INT EQUAL OVER 78748 INT EQUAL OR IFJMP:<{ // "seqno" and "get_public_key" get-methods
 | |
|      1 INT AND c4 PUSHCTR CTOS 32 LDU 32 LDU NIP 256 PLDU CONDSEL  // cnt or pubk
 | |
|    }>
 | |
|    INC 32 THROWIF	// fail unless recv_external
 | |
|    9 PUSHPOW2 LDSLICEX DUP 32 LDU 32 LDU 32 LDU 	//  signature in_msg subwallet_id valid_until msg_seqno cs
 | |
|    NOW s1 s3 XCHG LEQ 35 THROWIF	//  signature in_msg subwallet_id cs msg_seqno
 | |
|    c4 PUSH CTOS 32 LDU 32 LDU 256 LDU ENDS	//  signature in_msg subwallet_id cs msg_seqno stored_seqno stored_subwallet public_key
 | |
|    s3 s2 XCPU EQUAL 33 THROWIFNOT	//  signature in_msg subwallet_id cs public_key stored_seqno stored_subwallet
 | |
|    s4 s4 XCPU EQUAL 34 THROWIFNOT	//  signature in_msg stored_subwallet cs public_key stored_seqno
 | |
|    s0 s4 XCHG HASHSU	//  signature stored_seqno stored_subwallet cs public_key msg_hash
 | |
|    s0 s5 s5 XC2PU	//  public_key stored_seqno stored_subwallet cs msg_hash signature public_key
 | |
|    CHKSIGNU 35 THROWIFNOT	//  public_key stored_seqno stored_subwallet cs
 | |
|    ACCEPT
 | |
|    WHILE:<{
 | |
|      DUP SREFS	//  public_key stored_seqno stored_subwallet cs _51
 | |
|    }>DO<{	//  public_key stored_seqno stored_subwallet cs
 | |
|      8 LDU LDREF s0 s2 XCHG	//  public_key stored_seqno stored_subwallet cs _56 mode
 | |
|      SENDRAWMSG
 | |
|    }>	//  public_key stored_seqno stored_subwallet cs
 | |
|    ENDS SWAP INC	//  public_key stored_subwallet seqno'
 | |
|    NEWC 32 STU 32 STU 256 STU ENDC c4 POP
 | |
| )ABCD";
 | |
|   return fift::compile_asm(code).move_as_ok();
 | |
| }
 | |
| 
 | |
| TEST(Tonlib, WalletV3) {
 | |
|   LOG(ERROR) << td::base64_encode(std_boc_serialize(get_wallet_v3_source()).move_as_ok());
 | |
|   CHECK(get_wallet_v3_source()->get_hash() == ton::WalletV3::get_init_code(2)->get_hash());
 | |
| 
 | |
|   auto fift_output = fift::mem_run_fift(load_source("smartcont/new-wallet-v3.fif"), {"aba", "0", "239"}).move_as_ok();
 | |
|   auto new_wallet_pk = fift_output.source_lookup.read_file("new-wallet.pk").move_as_ok().data;
 | |
|   auto new_wallet_query = fift_output.source_lookup.read_file("new-wallet-query.boc").move_as_ok().data;
 | |
|   auto new_wallet_addr = fift_output.source_lookup.read_file("new-wallet.addr").move_as_ok().data;
 | |
| 
 | |
|   td::Ed25519::PrivateKey priv_key{td::SecureString{new_wallet_pk}};
 | |
|   auto pub_key = priv_key.get_public_key().move_as_ok();
 | |
|   ton::WalletV3::InitData init_data;
 | |
|   init_data.public_key = pub_key.as_octet_string();
 | |
|   init_data.wallet_id = 239;
 | |
|   auto wallet = ton::WalletV3::create(init_data, 2);
 | |
|   ASSERT_EQ(239u, wallet->get_wallet_id().ok());
 | |
|   ASSERT_EQ(0u, wallet->get_seqno().ok());
 | |
| 
 | |
|   auto address = wallet->get_address();
 | |
|   CHECK(address.addr.as_slice() == td::Slice(new_wallet_addr).substr(0, 32));
 | |
| 
 | |
|   auto init_message = wallet->get_init_message(priv_key).move_as_ok();
 | |
|   td::Ref<vm::Cell> ext_init_message = ton::GenericAccount::create_ext_message(
 | |
|       address, ton::GenericAccount::get_init_state(wallet->get_state()), init_message);
 | |
|   LOG(ERROR) << "-------";
 | |
|   vm::load_cell_slice(ext_init_message).print_rec(std::cerr);
 | |
|   LOG(ERROR) << "-------";
 | |
|   vm::load_cell_slice(vm::std_boc_deserialize(new_wallet_query).move_as_ok()).print_rec(std::cerr);
 | |
|   CHECK(vm::std_boc_deserialize(new_wallet_query).move_as_ok()->get_hash() == ext_init_message->get_hash());
 | |
| 
 | |
|   CHECK(wallet.write().send_external_message(init_message).success);
 | |
| 
 | |
|   fift_output.source_lookup.write_file("/main.fif", load_source("smartcont/wallet-v3.fif")).ensure();
 | |
|   class ZeroOsTime : public fift::OsTime {
 | |
|    public:
 | |
|     td::uint32 now() override {
 | |
|       return 0;
 | |
|     }
 | |
|   };
 | |
|   fift_output.source_lookup.set_os_time(std::make_unique<ZeroOsTime>());
 | |
|   auto dest = block::StdAddress::parse("Ef9Tj6fMJP+OqhAdhKXxq36DL+HYSzCc3+9O6UNzqsgPfYFX").move_as_ok();
 | |
|   fift_output = fift::mem_run_fift(std::move(fift_output.source_lookup),
 | |
|                                    {"aba", "new-wallet", "-C", "TESTv3",
 | |
|                                     "Ef9Tj6fMJP+OqhAdhKXxq36DL+HYSzCc3+9O6UNzqsgPfYFX", "239", "1", "321"})
 | |
|                     .move_as_ok();
 | |
|   auto wallet_query = fift_output.source_lookup.read_file("wallet-query.boc").move_as_ok().data;
 | |
| 
 | |
|   ton::WalletV3::Gift gift;
 | |
|   gift.destination = dest;
 | |
|   gift.message = "TESTv3";
 | |
|   gift.gramms = 321000000000ll;
 | |
| 
 | |
|   ASSERT_EQ(239u, wallet->get_wallet_id().ok());
 | |
|   ASSERT_EQ(1u, wallet->get_seqno().ok());
 | |
|   CHECK(priv_key.get_public_key().ok().as_octet_string() == wallet->get_public_key().ok().as_octet_string());
 | |
|   CHECK(priv_key.get_public_key().ok().as_octet_string() ==
 | |
|         ton::GenericAccount::get_public_key(*wallet).ok().as_octet_string());
 | |
| 
 | |
|   auto gift_message = ton::GenericAccount::create_ext_message(
 | |
|       address, {}, wallet->make_a_gift_message(priv_key, 60, {gift}).move_as_ok());
 | |
|   LOG(ERROR) << "-------";
 | |
|   vm::load_cell_slice(gift_message).print_rec(std::cerr);
 | |
|   LOG(ERROR) << "-------";
 | |
|   vm::load_cell_slice(vm::std_boc_deserialize(wallet_query).move_as_ok()).print_rec(std::cerr);
 | |
|   CHECK(vm::std_boc_deserialize(wallet_query).move_as_ok()->get_hash() == gift_message->get_hash());
 | |
| }
 | |
| 
 | |
| TEST(Tonlib, HighloadWallet) {
 | |
|   auto source_lookup = fift::create_mem_source_lookup(load_source("smartcont/new-highload-wallet.fif")).move_as_ok();
 | |
|   source_lookup.write_file("/auto/highload-wallet-code.fif", load_source("smartcont/auto/highload-wallet-code.fif"))
 | |
|       .ensure();
 | |
|   auto fift_output = fift::mem_run_fift(std::move(source_lookup), {"aba", "0", "239"}).move_as_ok();
 | |
| 
 | |
|   LOG(ERROR) << fift_output.output;
 | |
|   auto new_wallet_pk = fift_output.source_lookup.read_file("new-wallet.pk").move_as_ok().data;
 | |
|   auto new_wallet_query = fift_output.source_lookup.read_file("new-wallet239-query.boc").move_as_ok().data;
 | |
|   auto new_wallet_addr = fift_output.source_lookup.read_file("new-wallet239.addr").move_as_ok().data;
 | |
| 
 | |
|   td::Ed25519::PrivateKey priv_key{td::SecureString{new_wallet_pk}};
 | |
|   auto pub_key = priv_key.get_public_key().move_as_ok();
 | |
|   ton::HighloadWallet::InitData init_data(pub_key.as_octet_string(), 239);
 | |
| 
 | |
|   auto wallet = ton::HighloadWallet::create(init_data, -1);
 | |
|   auto address = wallet->get_address();
 | |
|   CHECK(address.addr.as_slice() == td::Slice(new_wallet_addr).substr(0, 32));
 | |
|   ASSERT_EQ(239u, wallet->get_wallet_id().ok());
 | |
|   ASSERT_EQ(0u, wallet->get_seqno().ok());
 | |
|   CHECK(pub_key.as_octet_string() == wallet->get_public_key().ok().as_octet_string());
 | |
|   CHECK(pub_key.as_octet_string() == ton::GenericAccount::get_public_key(*wallet).ok().as_octet_string());
 | |
| 
 | |
|   CHECK(address.addr.as_slice() == td::Slice(new_wallet_addr).substr(0, 32));
 | |
| 
 | |
|   auto init_message = wallet->get_init_message(priv_key).move_as_ok();
 | |
|   td::Ref<vm::Cell> res = ton::GenericAccount::create_ext_message(
 | |
|       address, ton::GenericAccount::get_init_state(wallet->get_state()), init_message);
 | |
| 
 | |
|   LOG(ERROR) << "---smc-envelope----";
 | |
|   vm::load_cell_slice(res).print_rec(std::cerr);
 | |
|   LOG(ERROR) << "---fift scripts----";
 | |
|   vm::load_cell_slice(vm::std_boc_deserialize(new_wallet_query).move_as_ok()).print_rec(std::cerr);
 | |
|   CHECK(vm::std_boc_deserialize(new_wallet_query).move_as_ok()->get_hash() == res->get_hash());
 | |
| 
 | |
|   fift_output.source_lookup.write_file("/main.fif", load_source("smartcont/highload-wallet.fif")).ensure();
 | |
|   std::string order;
 | |
|   std::vector<ton::HighloadWallet::Gift> gifts;
 | |
|   auto add_order = [&](td::Slice dest_str, td::int64 gramms) {
 | |
|     auto g = td::to_string(gramms);
 | |
|     if (g.size() < 10) {
 | |
|       g = std::string(10 - g.size(), '0') + g;
 | |
|     }
 | |
|     order += PSTRING() << "SEND " << dest_str << " " << g.substr(0, g.size() - 9) << "." << g.substr(g.size() - 9)
 | |
|                        << "\n";
 | |
| 
 | |
|     ton::HighloadWallet::Gift gift;
 | |
|     gift.destination = block::StdAddress::parse(dest_str).move_as_ok();
 | |
|     gift.gramms = gramms;
 | |
|     gifts.push_back(gift);
 | |
|   };
 | |
|   std::string dest_str = "Ef9Tj6fMJP+OqhAdhKXxq36DL+HYSzCc3+9O6UNzqsgPfYFX";
 | |
|   add_order(dest_str, 0);
 | |
|   add_order(dest_str, 321000000000ll);
 | |
|   add_order(dest_str, 321ll);
 | |
|   fift_output.source_lookup.write_file("/order", order).ensure();
 | |
|   class ZeroOsTime : public fift::OsTime {
 | |
|    public:
 | |
|     td::uint32 now() override {
 | |
|       return 0;
 | |
|     }
 | |
|   };
 | |
|   init_data.seqno = 123;
 | |
|   wallet = ton::HighloadWallet::create(init_data, -1);
 | |
|   fift_output.source_lookup.set_os_time(std::make_unique<ZeroOsTime>());
 | |
|   fift_output = fift::mem_run_fift(std::move(fift_output.source_lookup), {"aba", "new-wallet", "239", "123", "order"})
 | |
|                     .move_as_ok();
 | |
|   auto wallet_query = fift_output.source_lookup.read_file("wallet-query.boc").move_as_ok().data;
 | |
|   auto gift_message = ton::GenericAccount::create_ext_message(
 | |
|       address, {}, wallet->make_a_gift_message(priv_key, 60, gifts).move_as_ok());
 | |
|   LOG(ERROR) << "---smc-envelope----";
 | |
|   vm::load_cell_slice(gift_message).print_rec(std::cerr);
 | |
|   LOG(ERROR) << "---fift scripts----";
 | |
|   vm::load_cell_slice(vm::std_boc_deserialize(wallet_query).move_as_ok()).print_rec(std::cerr);
 | |
|   CHECK(vm::std_boc_deserialize(wallet_query).move_as_ok()->get_hash() == gift_message->get_hash());
 | |
| }
 | |
| 
 | |
| TEST(Tonlib, HighloadWalletV2) {
 | |
|   auto source_lookup = fift::create_mem_source_lookup(load_source("smartcont/new-highload-wallet-v2.fif")).move_as_ok();
 | |
|   source_lookup
 | |
|       .write_file("/auto/highload-wallet-v2-code.fif", load_source("smartcont/auto/highload-wallet-v2-code.fif"))
 | |
|       .ensure();
 | |
|   class ZeroOsTime : public fift::OsTime {
 | |
|    public:
 | |
|     td::uint32 now() override {
 | |
|       return 0;
 | |
|     }
 | |
|   };
 | |
|   source_lookup.set_os_time(std::make_unique<ZeroOsTime>());
 | |
|   auto fift_output = fift::mem_run_fift(std::move(source_lookup), {"aba", "0", "239"}).move_as_ok();
 | |
| 
 | |
|   LOG(ERROR) << fift_output.output;
 | |
|   auto new_wallet_pk = fift_output.source_lookup.read_file("new-wallet.pk").move_as_ok().data;
 | |
|   auto new_wallet_query = fift_output.source_lookup.read_file("new-wallet239-query.boc").move_as_ok().data;
 | |
|   auto new_wallet_addr = fift_output.source_lookup.read_file("new-wallet239.addr").move_as_ok().data;
 | |
| 
 | |
|   td::Ed25519::PrivateKey priv_key{td::SecureString{new_wallet_pk}};
 | |
|   auto pub_key = priv_key.get_public_key().move_as_ok();
 | |
|   ton::HighloadWalletV2::InitData init_data(pub_key.as_octet_string(), 239);
 | |
| 
 | |
|   auto wallet = ton::HighloadWalletV2::create(init_data, -1);
 | |
|   auto address = wallet->get_address();
 | |
| 
 | |
|   ASSERT_EQ(239u, wallet->get_wallet_id().ok());
 | |
|   wallet->get_seqno().ensure_error();
 | |
|   CHECK(pub_key.as_octet_string() == wallet->get_public_key().ok().as_octet_string());
 | |
|   CHECK(pub_key.as_octet_string() == ton::GenericAccount::get_public_key(*wallet).ok().as_octet_string());
 | |
| 
 | |
|   CHECK(address.addr.as_slice() == td::Slice(new_wallet_addr).substr(0, 32));
 | |
| 
 | |
|   auto init_message = wallet->get_init_message(priv_key, 65535).move_as_ok();
 | |
|   td::Ref<vm::Cell> res = ton::GenericAccount::create_ext_message(
 | |
|       address, ton::GenericAccount::get_init_state(wallet->get_state()), init_message);
 | |
| 
 | |
|   LOG(ERROR) << "---smc-envelope----";
 | |
|   vm::load_cell_slice(res).print_rec(std::cerr);
 | |
|   LOG(ERROR) << "---fift scripts----";
 | |
|   vm::load_cell_slice(vm::std_boc_deserialize(new_wallet_query).move_as_ok()).print_rec(std::cerr);
 | |
|   CHECK(vm::std_boc_deserialize(new_wallet_query).move_as_ok()->get_hash() == res->get_hash());
 | |
| 
 | |
|   fift_output.source_lookup.write_file("/main.fif", load_source("smartcont/highload-wallet-v2.fif")).ensure();
 | |
|   std::string order;
 | |
|   std::vector<ton::HighloadWalletV2::Gift> gifts;
 | |
|   auto add_order = [&](td::Slice dest_str, td::int64 gramms) {
 | |
|     auto g = td::to_string(gramms);
 | |
|     if (g.size() < 10) {
 | |
|       g = std::string(10 - g.size(), '0') + g;
 | |
|     }
 | |
|     order += PSTRING() << "SEND " << dest_str << " " << g.substr(0, g.size() - 9) << "." << g.substr(g.size() - 9)
 | |
|                        << "\n";
 | |
| 
 | |
|     ton::HighloadWalletV2::Gift gift;
 | |
|     gift.destination = block::StdAddress::parse(dest_str).move_as_ok();
 | |
|     gift.gramms = gramms;
 | |
|     gifts.push_back(gift);
 | |
|   };
 | |
|   std::string dest_str = "Ef9Tj6fMJP+OqhAdhKXxq36DL+HYSzCc3+9O6UNzqsgPfYFX";
 | |
|   add_order(dest_str, 0);
 | |
|   add_order(dest_str, 321000000000ll);
 | |
|   add_order(dest_str, 321ll);
 | |
|   fift_output.source_lookup.write_file("/order", order).ensure();
 | |
|   fift_output.source_lookup.set_os_time(std::make_unique<ZeroOsTime>());
 | |
|   fift_output =
 | |
|       fift::mem_run_fift(std::move(fift_output.source_lookup), {"aba", "new-wallet", "239", "order"}).move_as_ok();
 | |
|   auto wallet_query = fift_output.source_lookup.read_file("wallet-query.boc").move_as_ok().data;
 | |
|   auto gift_message = ton::GenericAccount::create_ext_message(
 | |
|       address, {}, wallet->make_a_gift_message(priv_key, 60, gifts).move_as_ok());
 | |
|   LOG(ERROR) << "---smc-envelope----";
 | |
|   vm::load_cell_slice(gift_message).print_rec(std::cerr);
 | |
|   LOG(ERROR) << "---fift scripts----";
 | |
|   vm::load_cell_slice(vm::std_boc_deserialize(wallet_query).move_as_ok()).print_rec(std::cerr);
 | |
|   CHECK(vm::std_boc_deserialize(wallet_query).move_as_ok()->get_hash() == gift_message->get_hash());
 | |
| }
 | |
| 
 | |
| TEST(Tonlib, RestrictedWallet) {
 | |
|   //auto source_lookup = fift::create_mem_source_lookup(load_source("smartcont/new-restricted-wallet2.fif")).move_as_ok();
 | |
|   //source_lookup
 | |
|   //.write_file("/auto/restricted-wallet2-code.fif", load_source("smartcont/auto/restricted-wallet2-code.fif"))
 | |
|   //.ensure();
 | |
|   //class ZeroOsTime : public fift::OsTime {
 | |
|   //public:
 | |
|   //td::uint32 now() override {
 | |
|   //return 0;
 | |
|   //}
 | |
|   //};
 | |
|   //source_lookup.set_os_time(std::make_unique<ZeroOsTime>());
 | |
|   //auto priv_key = td::Ed25519::generate_private_key().move_as_ok();
 | |
|   //auto pub_key = priv_key.get_public_key().move_as_ok();
 | |
|   //auto pub_key_serialized = block::PublicKey::from_bytes(pub_key.as_octet_string()).move_as_ok().serialize(true);
 | |
| 
 | |
|   //std::vector<std::string> args = {"path", pub_key_serialized, std::string("100")};
 | |
|   //auto fift_output = fift::mem_run_fift(std::move(source_lookup), args).move_as_ok();
 | |
| 
 | |
|   //ton::RestrictedWallet::InitData init_data;
 | |
|   //td::uint64 x = 100 * 1000000000ull;
 | |
|   //init_data.key = &pub_key;
 | |
|   //init_data.start_at = 0;
 | |
|   //init_data.limits = {{-32768, x}, {92, x * 3 / 4}, {183, x * 1 / 2}, {366, x * 1 / 4}, {548, 0}};
 | |
|   //auto wallet = ton::RestrictedWallet::create(init_data, -1);
 | |
| 
 | |
|   //ASSERT_EQ(0u, wallet->get_seqno().move_as_ok());
 | |
|   //CHECK(pub_key.as_octet_string() == wallet->get_public_key().move_as_ok().as_octet_string());
 | |
|   ////LOG(ERROR) << wallet->get_balance(x, 60 * 60 * 24 * 400).move_as_ok();
 | |
| 
 | |
|   //auto new_wallet_query = fift_output.source_lookup.read_file("rwallet-query.boc").move_as_ok().data;
 | |
|   //auto new_wallet_addr = fift_output.source_lookup.read_file("rwallet.addr").move_as_ok().data;
 | |
| 
 | |
|   //auto address = wallet->get_address(-1);
 | |
|   ////CHECK(address.addr.as_slice() == td::Slice(new_wallet_addr).substr(0, 32));
 | |
|   //address.bounceable = false;
 | |
|   //auto res = ton::GenericAccount::create_ext_message(address, wallet->get_init_state(),
 | |
|   //wallet->get_init_message(priv_key).move_as_ok());
 | |
|   //LOG(ERROR) << "-------";
 | |
|   //vm::load_cell_slice(res).print_rec(std::cerr);
 | |
|   //LOG(ERROR) << "-------";
 | |
|   //vm::load_cell_slice(vm::std_boc_deserialize(new_wallet_query).move_as_ok()).print_rec(std::cerr);
 | |
|   //CHECK(vm::std_boc_deserialize(new_wallet_query).move_as_ok()->get_hash() == res->get_hash());
 | |
| 
 | |
|   //auto dest = block::StdAddress::parse("Ef9Tj6fMJP+OqhAdhKXxq36DL+HYSzCc3+9O6UNzqsgPfYFX").move_as_ok();
 | |
|   //fift_output.source_lookup.write_file("/main.fif", load_source("smartcont/wallet-v2.fif")).ensure();
 | |
|   //fift_output.source_lookup.write_file("rwallet.pk", priv_key.as_octet_string().as_slice()).ensure();
 | |
|   //fift_output = fift::mem_run_fift(
 | |
|   //std::move(fift_output.source_lookup),
 | |
|   //{"aba", "rwallet", "-C", "TESTv2", "Ef9Tj6fMJP+OqhAdhKXxq36DL+HYSzCc3+9O6UNzqsgPfYFX", "0", "321"})
 | |
|   //.move_as_ok();
 | |
|   //auto wallet_query = fift_output.source_lookup.read_file("wallet-query.boc").move_as_ok().data;
 | |
|   //ton::TestWallet::Gift gift;
 | |
|   //gift.destination = dest;
 | |
|   //gift.message = "TESTv2";
 | |
|   //gift.gramms = 321000000000ll;
 | |
|   ////CHECK(priv_key.get_public_key().ok().as_octet_string() == wallet->get_public_key().ok().as_octet_string());
 | |
|   //auto gift_message = ton::GenericAccount::create_ext_message(
 | |
|   //address, {}, wallet->make_a_gift_message(priv_key, 60, {gift}).move_as_ok());
 | |
|   //LOG(ERROR) << "-------";
 | |
|   //vm::load_cell_slice(gift_message).print_rec(std::cerr);
 | |
|   //LOG(ERROR) << "-------";
 | |
|   //vm::load_cell_slice(vm::std_boc_deserialize(wallet_query).move_as_ok()).print_rec(std::cerr);
 | |
|   //CHECK(vm::std_boc_deserialize(wallet_query).move_as_ok()->get_hash() == gift_message->get_hash());
 | |
| }
 | |
| TEST(Tonlib, RestrictedWallet3) {
 | |
|   auto init_priv_key = td::Ed25519::generate_private_key().move_as_ok();
 | |
|   auto init_pub_key = init_priv_key.get_public_key().move_as_ok();
 | |
|   auto priv_key = td::Ed25519::generate_private_key().move_as_ok();
 | |
|   auto pub_key = priv_key.get_public_key().move_as_ok();
 | |
| 
 | |
|   ton::RestrictedWallet::InitData init_data;
 | |
|   init_data.init_key = init_pub_key.as_octet_string();
 | |
|   init_data.main_key = pub_key.as_octet_string();
 | |
|   init_data.wallet_id = 123;
 | |
|   auto wallet = ton::RestrictedWallet::create(init_data, 1);
 | |
| 
 | |
|   auto address = wallet->get_address();
 | |
| 
 | |
|   td::uint64 x = 100 * 1000000000ull;
 | |
|   ton::RestrictedWallet::Config config;
 | |
|   config.start_at = 1;
 | |
|   config.limits = {{-32768, x}, {92, x * 3 / 4}, {183, x * 1 / 2}, {366, x * 1 / 4}, {548, 0}};
 | |
|   CHECK(wallet.write().send_external_message(wallet->get_init_message(init_priv_key, 10, config).move_as_ok()).success);
 | |
|   CHECK(wallet->get_seqno().move_as_ok() == 1);
 | |
| 
 | |
|   ton::WalletInterface::Gift gift;
 | |
|   gift.destination = address;
 | |
|   gift.message = "hello";
 | |
|   CHECK(wallet.write().send_external_message(wallet->make_a_gift_message(priv_key, 10, {gift}).move_as_ok()).success);
 | |
|   CHECK(wallet->get_seqno().move_as_ok() == 2);
 | |
| }
 | |
| 
 | |
| template <class T>
 | |
| void check_wallet_seqno(td::Ref<T> wallet, td::uint32 seqno) {
 | |
|   ASSERT_EQ(seqno, wallet->get_seqno().ok());
 | |
| }
 | |
| void check_wallet_seqno(td::Ref<ton::HighloadWalletV2> wallet, td::uint32 seqno) {
 | |
| }
 | |
| void check_wallet_seqno(td::Ref<ton::WalletInterface> wallet, td::uint32 seqno) {
 | |
| }
 | |
| template <class T>
 | |
| void check_wallet_state(td::Ref<T> wallet, td::uint32 seqno, td::uint32 wallet_id, td::Slice public_key) {
 | |
|   ASSERT_EQ(wallet_id, wallet->get_wallet_id().ok());
 | |
|   ASSERT_EQ(public_key, wallet->get_public_key().ok().as_octet_string().as_slice());
 | |
|   check_wallet_seqno(wallet, seqno);
 | |
| }
 | |
| 
 | |
| struct CreatedWallet {
 | |
|   td::optional<td::Ed25519::PrivateKey> priv_key;
 | |
|   block::StdAddress address;
 | |
|   td::Ref<ton::WalletInterface> wallet;
 | |
| };
 | |
| 
 | |
| template <class T>
 | |
| class InitWallet {
 | |
|  public:
 | |
|   CreatedWallet operator()(int revision) const {
 | |
|     ton::WalletInterface::DefaultInitData init_data;
 | |
|     auto priv_key = td::Ed25519::generate_private_key().move_as_ok();
 | |
|     auto pub_key = priv_key.get_public_key().move_as_ok();
 | |
| 
 | |
|     init_data.seqno = 0;
 | |
|     init_data.wallet_id = 123;
 | |
|     init_data.public_key = pub_key.as_octet_string();
 | |
| 
 | |
|     auto wallet = T::create(init_data, revision);
 | |
|     auto address = wallet->get_address();
 | |
|     check_wallet_state(wallet, 0, 123, init_data.public_key);
 | |
|     CHECK(wallet.write().send_external_message(wallet->get_init_message(priv_key).move_as_ok()).success);
 | |
| 
 | |
|     CreatedWallet res;
 | |
|     res.wallet = std::move(wallet);
 | |
|     res.address = std::move(address);
 | |
|     res.priv_key = std::move(priv_key);
 | |
|     return res;
 | |
|   }
 | |
| };
 | |
| 
 | |
| template <>
 | |
| CreatedWallet InitWallet<ton::RestrictedWallet>::operator()(int revision) const {
 | |
|   auto init_priv_key = td::Ed25519::generate_private_key().move_as_ok();
 | |
|   auto init_pub_key = init_priv_key.get_public_key().move_as_ok();
 | |
|   auto priv_key = td::Ed25519::generate_private_key().move_as_ok();
 | |
|   auto pub_key = priv_key.get_public_key().move_as_ok();
 | |
| 
 | |
|   ton::RestrictedWallet::InitData init_data;
 | |
|   init_data.init_key = init_pub_key.as_octet_string();
 | |
|   init_data.main_key = pub_key.as_octet_string();
 | |
|   init_data.wallet_id = 123;
 | |
|   auto wallet = ton::RestrictedWallet::create(init_data, 1);
 | |
|   check_wallet_state(wallet, 0, 123, init_data.init_key);
 | |
| 
 | |
|   auto address = wallet->get_address();
 | |
| 
 | |
|   td::uint64 x = 100 * 1000000000ull;
 | |
|   ton::RestrictedWallet::Config config;
 | |
|   config.start_at = 1;
 | |
|   config.limits = {{-32768, x}, {92, x * 3 / 4}, {183, x * 1 / 2}, {366, x * 1 / 4}, {548, 0}};
 | |
|   CHECK(wallet.write().send_external_message(wallet->get_init_message(init_priv_key, 10, config).move_as_ok()).success);
 | |
|   CHECK(wallet->get_seqno().move_as_ok() == 1);
 | |
| 
 | |
|   CreatedWallet res;
 | |
|   res.wallet = std::move(wallet);
 | |
|   res.address = std::move(address);
 | |
|   res.priv_key = std::move(priv_key);
 | |
|   return res;
 | |
| }
 | |
| 
 | |
| template <class T>
 | |
| void do_test_wallet(int revision) {
 | |
|   auto res = InitWallet<T>()(revision);
 | |
|   auto priv_key = res.priv_key.unwrap();
 | |
|   auto address = std::move(res.address);
 | |
|   auto iwallet = std::move(res.wallet);
 | |
|   auto public_key = priv_key.get_public_key().move_as_ok().as_octet_string();
 | |
| 
 | |
|   check_wallet_state(iwallet, 1, 123, public_key);
 | |
| 
 | |
|   // lets send a lot of messages
 | |
|   std::vector<ton::WalletInterface::Gift> gifts;
 | |
|   for (size_t i = 0; i < iwallet->get_max_gifts_size(); i++) {
 | |
|     ton::WalletInterface::Gift gift;
 | |
|     gift.gramms = 1;
 | |
|     gift.destination = address;
 | |
|     gift.message = std::string(iwallet->get_max_message_size(), 'z');
 | |
|     gifts.push_back(gift);
 | |
|   }
 | |
| 
 | |
|   td::uint32 valid_until = 10000;
 | |
|   auto send_gifts = iwallet->make_a_gift_message(priv_key, valid_until, gifts).move_as_ok();
 | |
| 
 | |
|   {
 | |
|     auto cwallet = iwallet;
 | |
|     CHECK(!cwallet.write()
 | |
|                .send_external_message(send_gifts, ton::SmartContract::Args().set_now(valid_until + 1))
 | |
|                .success);
 | |
|   }
 | |
|   //TODO: make wallet work (or not) with now == valid_until
 | |
|   auto ans = iwallet.write().send_external_message(send_gifts, ton::SmartContract::Args().set_now(valid_until - 1));
 | |
|   CHECK(ans.success);
 | |
|   CHECK((int)gifts.size() <= ans.output_actions_count(ans.actions));
 | |
|   check_wallet_state(iwallet, 2, 123, public_key);
 | |
| }
 | |
| 
 | |
| template <class T>
 | |
| void do_test_wallet() {
 | |
|   for (auto revision : T::get_revisions()) {
 | |
|     do_test_wallet<T>(revision);
 | |
|   }
 | |
| }
 | |
| 
 | |
| TEST(Tonlib, Wallet) {
 | |
|   do_test_wallet<ton::WalletV3>();
 | |
|   do_test_wallet<ton::WalletV4>();
 | |
|   do_test_wallet<ton::HighloadWallet>();
 | |
|   do_test_wallet<ton::HighloadWalletV2>();
 | |
|   do_test_wallet<ton::RestrictedWallet>();
 | |
| }
 | |
| 
 | |
| namespace std {  // ouch
 | |
| bool operator<(const ton::MultisigWallet::Mask& a, const ton::MultisigWallet::Mask& b) {
 | |
|   for (size_t i = 0; i < a.size(); i++) {
 | |
|     if (a[i] != b[i]) {
 | |
|       return a[i] < b[i];
 | |
|     }
 | |
|   }
 | |
|   return false;
 | |
| }
 | |
| }  // namespace std
 | |
| 
 | |
| TEST(Smartcon, Multisig) {
 | |
|   auto ms_lib = ton::MultisigWallet::create();
 | |
| 
 | |
|   int n = 100;
 | |
|   int k = 99;
 | |
|   td::uint32 wallet_id = std::numeric_limits<td::uint32>::max() - 3;
 | |
|   std::vector<td::Ed25519::PrivateKey> keys;
 | |
|   for (int i = 0; i < n; i++) {
 | |
|     keys.push_back(td::Ed25519::generate_private_key().move_as_ok());
 | |
|   }
 | |
|   auto init_state = ms_lib->create_init_data(
 | |
|       wallet_id, td::transform(keys, [](auto& key) { return key.get_public_key().ok().as_octet_string(); }), k);
 | |
|   auto ms = ton::MultisigWallet::create(init_state);
 | |
| 
 | |
|   td::uint32 now = 0;
 | |
|   auto args = [&now]() -> ton::SmartContract::Args { return ton::SmartContract::Args().set_now(now); };
 | |
| 
 | |
|   // first empty query (init)
 | |
|   CHECK(ms.write().send_external_message(vm::CellBuilder().finalize(), args()).code == 0);
 | |
|   // first empty query
 | |
|   CHECK(ms.write().send_external_message(vm::CellBuilder().finalize(), args()).code > 0);
 | |
| 
 | |
|   {
 | |
|     td::uint64 query_id = 123 | ((now + 10 * 60ull) << 32);
 | |
|     ton::MultisigWallet::QueryBuilder qb(wallet_id, query_id, vm::CellBuilder().finalize());
 | |
|     auto query = qb.create(0, keys[0]);
 | |
|     auto res = ms.write().send_external_message(query, args());
 | |
|     CHECK(!res.accepted);
 | |
|     CHECK(res.code == 41);
 | |
|   }
 | |
|   {
 | |
|     for (int i = 1; i <= 11; i++) {
 | |
|       td::uint64 query_id = i | ((now + 100 * 60ull) << 32);
 | |
|       ton::MultisigWallet::QueryBuilder qb(wallet_id, query_id, vm::CellBuilder().finalize());
 | |
|       auto query = qb.create(5, keys[5]);
 | |
|       auto res = ms.write().send_external_message(query, args());
 | |
|       if (i <= 10) {
 | |
|         CHECK(res.accepted);
 | |
|       } else {
 | |
|         CHECK(!res.accepted);
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     now += 100 * 60 + 100;
 | |
|     {
 | |
|       td::uint64 query_id = 200 | ((now + 100 * 60ull) << 32);
 | |
|       ton::MultisigWallet::QueryBuilder qb(wallet_id, query_id, vm::CellBuilder().finalize());
 | |
|       auto query = qb.create(6, keys[6]);
 | |
|       auto res = ms.write().send_external_message(query, args());
 | |
|       CHECK(res.accepted);
 | |
|     }
 | |
| 
 | |
|     {
 | |
|       td::uint64 query_id = 300 | ((now + 100 * 60ull) << 32);
 | |
|       ton::MultisigWallet::QueryBuilder qb(wallet_id, query_id, vm::CellBuilder().finalize());
 | |
|       auto query = qb.create(5, keys[5]);
 | |
|       auto res = ms.write().send_external_message(query, args());
 | |
|       CHECK(res.accepted);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   td::uint64 query_id = 123 | ((now + 100 * 60ull) << 32);
 | |
|   ton::MultisigWallet::QueryBuilder qb(wallet_id, query_id, vm::CellBuilder().finalize());
 | |
|   for (int i = 0; i < 10; i++) {
 | |
|     auto query = qb.create(i, keys[i]);
 | |
|     auto ans = ms.write().send_external_message(query, args());
 | |
|     LOG(INFO) << "CODE: " << ans.code;
 | |
|     LOG(INFO) << "GAS: " << ans.gas_used;
 | |
|   }
 | |
|   for (int i = 0; i + 1 < 50; i++) {
 | |
|     qb.sign(i, keys[i]);
 | |
|   }
 | |
|   auto query = qb.create(49, keys[49]);
 | |
| 
 | |
|   CHECK(ms->get_n_k() == std::make_pair(n, k));
 | |
|   auto ans = ms.write().send_external_message(query, args());
 | |
|   LOG(INFO) << "CODE: " << ans.code;
 | |
|   LOG(INFO) << "GAS: " << ans.gas_used;
 | |
|   CHECK(ans.success);
 | |
|   ASSERT_EQ(0, ms->processed(query_id));
 | |
|   CHECK(ms.write().send_external_message(query, args()).code > 0);
 | |
|   ASSERT_EQ(0, ms->processed(query_id));
 | |
| 
 | |
|   {
 | |
|     ton::MultisigWallet::QueryBuilder qb(wallet_id, query_id, vm::CellBuilder().finalize());
 | |
|     for (int i = 50; i + 1 < 100; i++) {
 | |
|       qb.sign(i, keys[i]);
 | |
|     }
 | |
|     query = qb.create(99, keys[99]);
 | |
|   }
 | |
| 
 | |
|   ans = ms.write().send_external_message(query, args());
 | |
|   LOG(INFO) << "CODE: " << ans.code;
 | |
|   LOG(INFO) << "GAS: " << ans.gas_used;
 | |
|   ASSERT_EQ(-1, ms->processed(query_id));
 | |
| }
 | |
| 
 | |
| TEST(Smartcont, MultisigStress) {
 | |
|   int n = 10;
 | |
|   int k = 5;
 | |
|   td::uint32 wallet_id = std::numeric_limits<td::uint32>::max() - 3;
 | |
| 
 | |
|   std::vector<td::Ed25519::PrivateKey> keys;
 | |
|   for (int i = 0; i < n; i++) {
 | |
|     keys.push_back(td::Ed25519::generate_private_key().move_as_ok());
 | |
|   }
 | |
|   auto public_keys = td::transform(keys, [](auto& key) { return key.get_public_key().ok().as_octet_string(); });
 | |
|   auto ms_lib = ton::MultisigWallet::create();
 | |
|   auto init_state_old =
 | |
|       ms_lib->create_init_data_fast(wallet_id, td::transform(public_keys, [](auto& key) { return key.copy(); }), k);
 | |
|   auto init_state =
 | |
|       ms_lib->create_init_data(wallet_id, td::transform(public_keys, [](auto& key) { return key.copy(); }), k);
 | |
|   CHECK(init_state_old->get_hash() == init_state->get_hash());
 | |
|   auto ms = ton::MultisigWallet::create(init_state);
 | |
|   CHECK(ms->get_public_keys() == public_keys);
 | |
| 
 | |
|   td::int32 now = 100 * 60;
 | |
|   td::int32 qid = 1;
 | |
|   using Mask = std::bitset<128>;
 | |
|   struct Query {
 | |
|     td::int64 id;
 | |
|     td::Ref<vm::Cell> message;
 | |
|     Mask signed_mask;
 | |
|   };
 | |
| 
 | |
|   std::vector<Query> queries;
 | |
|   int max_queries = 300;
 | |
| 
 | |
|   td::Random::Xorshift128plus rnd(123);
 | |
| 
 | |
|   auto new_query = [&] {
 | |
|     if (qid > max_queries) {
 | |
|       return;
 | |
|     }
 | |
|     Query query;
 | |
|     query.id = (static_cast<td::int64>(now) << 32) | qid++;
 | |
|     query.message = vm::CellBuilder().store_bytes(td::rand_string('a', 'z', rnd.fast(0, 100))).finalize();
 | |
|     queries.push_back(std::move(query));
 | |
|   };
 | |
| 
 | |
|   auto verify = [&] {
 | |
|     auto messages = ms->get_unsigned_messaged();
 | |
|     std::set<std::tuple<td::uint64, ton::MultisigWallet::Mask, std::string>> s;
 | |
|     std::set<std::tuple<td::uint64, ton::MultisigWallet::Mask, std::string>> t;
 | |
| 
 | |
|     for (auto& m : messages) {
 | |
|       auto x = std::make_tuple(m.query_id, m.signed_by, m.message->get_hash().as_slice().str());
 | |
|       s.insert(std::move(x));
 | |
|     }
 | |
| 
 | |
|     for (auto& q : queries) {
 | |
|       if (q.signed_mask.none()) {
 | |
|         continue;
 | |
|       }
 | |
|       t.insert(std::make_tuple(q.id, q.signed_mask, q.message->get_hash().as_slice().str()));
 | |
|     }
 | |
|     ASSERT_EQ(t.size(), s.size());
 | |
|     CHECK(s == t);
 | |
|   };
 | |
| 
 | |
|   auto sign_query = [&](Query& query, Mask mask) {
 | |
|     auto qb = ton::MultisigWallet::QueryBuilder(wallet_id, query.id, query.message);
 | |
|     int first_i = -1;
 | |
|     for (int i = 0; i < (int)mask.size(); i++) {
 | |
|       if (mask.test(i)) {
 | |
|         if (first_i == -1) {
 | |
|           first_i = i;
 | |
|         } else {
 | |
|           qb.sign(i, keys[i]);
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|     return qb.create(first_i, keys[first_i]);
 | |
|   };
 | |
| 
 | |
|   auto send_signature = [&](td::Ref<vm::Cell> query) {
 | |
|     auto ans = ms.write().send_external_message(query);
 | |
|     LOG(ERROR) << "GAS: " << ans.gas_used;
 | |
|     return ans.code == 0;
 | |
|   };
 | |
| 
 | |
|   auto is_ready = [&](Query& query) { return ms->processed(query.id) == -1; };
 | |
| 
 | |
|   auto gen_query = [&](Query& query) {
 | |
|     auto x = rnd.fast(1, n);
 | |
|     Mask mask;
 | |
|     for (int t = 0; t < x; t++) {
 | |
|       mask.set(rnd() % n);
 | |
|     }
 | |
| 
 | |
|     auto signature = sign_query(query, mask);
 | |
|     return std::make_pair(signature, mask);
 | |
|   };
 | |
| 
 | |
|   auto rand_sign = [&] {
 | |
|     if (queries.empty()) {
 | |
|       return;
 | |
|     }
 | |
| 
 | |
|     size_t query_i = rnd() % queries.size();
 | |
|     auto& query = queries[query_i];
 | |
| 
 | |
|     Mask mask;
 | |
|     td::Ref<vm::Cell> signature;
 | |
|     std::tie(signature, mask) = gen_query(query);
 | |
|     if (false && rnd() % 6 == 0) {
 | |
|       Mask mask2;
 | |
|       td::Ref<vm::Cell> signature2;
 | |
|       std::tie(signature2, mask2) = gen_query(query);
 | |
|       for (int i = 0; i < (int)keys.size(); i++) {
 | |
|         if (mask[i]) {
 | |
|           signature = ms->merge_queries(std::move(signature), std::move(signature2));
 | |
|           break;
 | |
|         }
 | |
|         if (mask2[i]) {
 | |
|           signature = ms->merge_queries(std::move(signature2), std::move(signature));
 | |
|           break;
 | |
|         }
 | |
|       }
 | |
|       //signature = ms->merge_queries(std::move(signature), std::move(signature2));
 | |
|       mask |= mask2;
 | |
|     }
 | |
| 
 | |
|     int got_cnt;
 | |
|     Mask got_cnt_bits;
 | |
|     std::tie(got_cnt, got_cnt_bits) = ms->check_query_signatures(signature);
 | |
|     CHECK(mask == got_cnt_bits);
 | |
| 
 | |
|     bool expect_ok = true;
 | |
|     {
 | |
|       auto new_mask = mask & ~query.signed_mask;
 | |
|       expect_ok &= new_mask.any();
 | |
|       for (size_t i = 0; i < mask.size(); i++) {
 | |
|         if (mask[i]) {
 | |
|           expect_ok &= new_mask[i];
 | |
|           break;
 | |
|         }
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     ASSERT_EQ(expect_ok, send_signature(std::move(signature)));
 | |
|     if (expect_ok) {
 | |
|       query.signed_mask |= mask;
 | |
|     }
 | |
|     auto expect_is_ready = query.signed_mask.count() >= (size_t)k;
 | |
|     auto state = ms->get_query_state(query.id);
 | |
|     ASSERT_EQ(expect_is_ready, (state.state == ton::MultisigWallet::QueryState::Sent));
 | |
|     CHECK(expect_is_ready || state.mask == query.signed_mask);
 | |
|     ASSERT_EQ(expect_is_ready, is_ready(query));
 | |
|     if (expect_is_ready) {
 | |
|       queries.erase(queries.begin() + query_i);
 | |
|     }
 | |
|     verify();
 | |
|   };
 | |
|   td::RandomSteps steps({{rand_sign, 2}, {new_query, 1}});
 | |
|   while (!queries.empty() || qid <= max_queries) {
 | |
|     steps.step(rnd);
 | |
|     //LOG(ERROR) << ms->data_size();
 | |
|   }
 | |
|   LOG(INFO) << "Final code size: " << ms->code_size();
 | |
|   LOG(INFO) << "Final data size: " << ms->data_size();
 | |
| }
 | |
| 
 | |
| class MapDns {
 | |
|  public:
 | |
|   using ManualDns = ton::ManualDns;
 | |
|   struct Entry {
 | |
|     std::string name;
 | |
|     td::Bits256 category = td::Bits256::zero();
 | |
|     std::string text;
 | |
| 
 | |
|     auto key() const {
 | |
|       return std::tie(name, category);
 | |
|     }
 | |
|     bool operator<(const Entry& other) const {
 | |
|       return key() < other.key();
 | |
|     }
 | |
|     bool operator==(const ton::DnsInterface::Entry& other) const {
 | |
|       return key() == other.key() && other.data.type == ManualDns::EntryData::Type::Text &&
 | |
|              other.data.data.get<ManualDns::EntryDataText>().text == text;
 | |
|     }
 | |
|     bool operator==(const Entry& other) const {
 | |
|       return key() == other.key() && text == other.text;
 | |
|     }
 | |
|     friend td::StringBuilder& operator<<(td::StringBuilder& sb, const Entry& entry) {
 | |
|       return sb << "[" << entry.name << ":" << entry.category.to_hex() << ":" << entry.text << "]";
 | |
|     }
 | |
|   };
 | |
|   struct Action {
 | |
|     std::string name;
 | |
|     td::Bits256 category = td::Bits256::zero();
 | |
|     td::optional<std::string> text;
 | |
| 
 | |
|     bool does_create_category() const {
 | |
|       CHECK(!name.empty());
 | |
|       CHECK(!category.is_zero());
 | |
|       return static_cast<bool>(text);
 | |
|     }
 | |
|     bool does_change_empty() const {
 | |
|       CHECK(!name.empty());
 | |
|       CHECK(!category.is_zero());
 | |
|       return static_cast<bool>(text) && !text.value().empty();
 | |
|     }
 | |
|     void make_non_empty() {
 | |
|       CHECK(!name.empty());
 | |
|       CHECK(!category.is_zero());
 | |
|       if (!text) {
 | |
|         text = "";
 | |
|       }
 | |
|     }
 | |
|     friend td::StringBuilder& operator<<(td::StringBuilder& sb, const Action& entry) {
 | |
|       return sb << "[" << entry.name << ":" << entry.category.to_hex() << ":"
 | |
|                 << (entry.text ? entry.text.value() : "<empty>") << "]";
 | |
|     }
 | |
|   };
 | |
|   void update(td::Span<Action> actions) {
 | |
|     for (auto& action : actions) {
 | |
|       do_update(action);
 | |
|     }
 | |
|   }
 | |
|   using CombinedActions = ton::ManualDns::CombinedActions<Action>;
 | |
|   void update_combined(td::Span<Action> actions) {
 | |
|     LOG(ERROR) << "BEGIN";
 | |
|     LOG(ERROR) << td::format::as_array(actions);
 | |
|     auto combined_actions = ton::ManualDns::combine_actions(actions);
 | |
|     for (auto& c : combined_actions) {
 | |
|       LOG(ERROR) << c.name << ":" << c.category.to_hex();
 | |
|       if (c.actions) {
 | |
|         LOG(ERROR) << td::format::as_array(c.actions.value());
 | |
|       }
 | |
|     }
 | |
|     LOG(ERROR) << "END";
 | |
|     for (auto& combined_action : combined_actions) {
 | |
|       do_update(combined_action);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   std::vector<Entry> resolve(td::Slice name, td::Bits256 category) {
 | |
|     std::vector<Entry> res;
 | |
|     if (name.empty()) {
 | |
|       for (auto& a : entries_) {
 | |
|         for (auto& b : a.second) {
 | |
|           res.push_back({a.first, b.first, b.second});
 | |
|         }
 | |
|       }
 | |
|     } else {
 | |
|       auto it = entries_.find(name);
 | |
|       while (it == entries_.end()) {
 | |
|         auto sz = name.find('.');
 | |
|         category = ton::DNS_NEXT_RESOLVER_CATEGORY;
 | |
|         if (sz != td::Slice::npos) {
 | |
|           name = name.substr(sz + 1);
 | |
|         } else {
 | |
|           break;
 | |
|         }
 | |
|         it = entries_.find(name);
 | |
|       }
 | |
|       if (it != entries_.end()) {
 | |
|         for (auto& b : it->second) {
 | |
|           if (category.is_zero() || category == b.first) {
 | |
|             res.push_back({name.str(), b.first, b.second});
 | |
|           }
 | |
|         }
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     std::sort(res.begin(), res.end());
 | |
|     return res;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   std::map<std::string, std::map<td::Bits256, std::string>, std::less<>> entries_;
 | |
|   void do_update(const Action& action) {
 | |
|     if (action.name.empty()) {
 | |
|       entries_.clear();
 | |
|       return;
 | |
|     }
 | |
|     if (action.category.is_zero()) {
 | |
|       entries_.erase(action.name);
 | |
|       return;
 | |
|     }
 | |
|     if (action.text) {
 | |
|       if (action.text.value().empty()) {
 | |
|         entries_[action.name].erase(action.category);
 | |
|       } else {
 | |
|         entries_[action.name][action.category] = action.text.value();
 | |
|       }
 | |
|     } else {
 | |
|       auto it = entries_.find(action.name);
 | |
|       if (it != entries_.end()) {
 | |
|         it->second.erase(action.category);
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   void do_update(const CombinedActions& actions) {
 | |
|     if (actions.name.empty()) {
 | |
|       entries_.clear();
 | |
|       LOG(ERROR) << "CLEAR";
 | |
|       if (!actions.actions) {
 | |
|         return;
 | |
|       }
 | |
|       for (auto& action : actions.actions.value()) {
 | |
|         CHECK(!action.name.empty());
 | |
|         CHECK(!action.category.is_zero());
 | |
|         CHECK(action.text);
 | |
|         if (action.text.value().empty()) {
 | |
|           entries_[action.name];
 | |
|         } else {
 | |
|           entries_[action.name][action.category] = action.text.value();
 | |
|         }
 | |
|       }
 | |
|       return;
 | |
|     }
 | |
|     if (actions.category.is_zero()) {
 | |
|       entries_.erase(actions.name);
 | |
|       LOG(ERROR) << "CLEAR " << actions.name;
 | |
|       if (!actions.actions) {
 | |
|         return;
 | |
|       }
 | |
|       entries_[actions.name];
 | |
|       for (auto& action : actions.actions.value()) {
 | |
|         CHECK(action.name == actions.name);
 | |
|         CHECK(!action.category.is_zero());
 | |
|         CHECK(action.text);
 | |
|         if (action.text.value().empty()) {
 | |
|           entries_[action.name];
 | |
|         } else {
 | |
|           entries_[action.name][action.category] = action.text.value();
 | |
|         }
 | |
|       }
 | |
|       return;
 | |
|     }
 | |
|     CHECK(actions.actions);
 | |
|     CHECK(actions.actions.value().size() == 1);
 | |
|     for (auto& action : actions.actions.value()) {
 | |
|       CHECK(action.name == actions.name);
 | |
|       CHECK(!action.category.is_zero());
 | |
|       if (action.text) {
 | |
|         if (action.text.value().empty()) {
 | |
|           entries_[action.name].erase(action.category);
 | |
|         } else {
 | |
|           entries_[action.name][action.category] = action.text.value();
 | |
|         }
 | |
|       } else {
 | |
|         auto it = entries_.find(action.name);
 | |
|         if (it != entries_.end()) {
 | |
|           it->second.erase(action.category);
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| };
 | |
| 
 | |
| class CheckedDns {
 | |
|  public:
 | |
|   explicit CheckedDns(bool check_smc = true, bool check_combine = true) {
 | |
|     if (check_smc) {
 | |
|       key_ = td::Ed25519::generate_private_key().move_as_ok();
 | |
|       dns_ = ManualDns::create(ManualDns::create_init_data_fast(key_.value().get_public_key().move_as_ok(), 123), -1);
 | |
|     }
 | |
|     if (check_combine) {
 | |
|       combined_map_dns_ = MapDns();
 | |
|     }
 | |
|   }
 | |
|   using Action = MapDns::Action;
 | |
|   using Entry = MapDns::Entry;
 | |
|   void update(td::Span<Action> entries) {
 | |
|     if (dns_.not_null()) {
 | |
|       auto smc_actions = td::transform(entries, [](auto& entry) {
 | |
|         ton::DnsInterface::Action action;
 | |
|         action.name = entry.name;
 | |
|         action.category = entry.category;
 | |
|         if (entry.text) {
 | |
|           if (entry.text.value().empty()) {
 | |
|             action.data = td::Ref<vm::Cell>();
 | |
|           } else {
 | |
|             action.data = ManualDns::EntryData::text(entry.text.value()).as_cell().move_as_ok();
 | |
|           }
 | |
|         }
 | |
|         return action;
 | |
|       });
 | |
|       auto query = dns_->create_update_query(key_.value(), smc_actions, query_id_++).move_as_ok();
 | |
|       CHECK(dns_.write().send_external_message(std::move(query)).code == 0);
 | |
|     }
 | |
|     map_dns_.update(entries);
 | |
|     if (combined_map_dns_) {
 | |
|       combined_map_dns_.value().update_combined(entries);
 | |
|     }
 | |
|   }
 | |
|   void update(const Action& action) {
 | |
|     return update(td::span_one(action));
 | |
|   }
 | |
| 
 | |
|   std::vector<Entry> resolve(td::Slice name, td::Bits256 category) {
 | |
|     LOG(ERROR) << "RESOLVE: " << name << " " << category.to_hex();
 | |
|     auto res = map_dns_.resolve(name, category);
 | |
|     LOG(ERROR) << td::format::as_array(res);
 | |
| 
 | |
|     if (dns_.not_null()) {
 | |
|       auto other_res = dns_->resolve(name, category).move_as_ok();
 | |
| 
 | |
|       std::sort(other_res.begin(), other_res.end());
 | |
|       if (res.size() != other_res.size()) {
 | |
|         LOG(ERROR) << td::format::as_array(res);
 | |
|         LOG(FATAL) << td::format::as_array(other_res);
 | |
|       }
 | |
|       for (size_t i = 0; i < res.size(); i++) {
 | |
|         if (!(res[i] == other_res[i])) {
 | |
|           LOG(ERROR) << td::format::as_array(res);
 | |
|           LOG(FATAL) << td::format::as_array(other_res);
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|     if (combined_map_dns_) {
 | |
|       auto other_res = combined_map_dns_.value().resolve(name, category);
 | |
| 
 | |
|       std::sort(other_res.begin(), other_res.end());
 | |
|       if (res.size() != other_res.size()) {
 | |
|         LOG(ERROR) << td::format::as_array(res);
 | |
|         LOG(FATAL) << td::format::as_array(other_res);
 | |
|       }
 | |
|       for (size_t i = 0; i < res.size(); i++) {
 | |
|         if (!(res[i] == other_res[i])) {
 | |
|           LOG(ERROR) << td::format::as_array(res);
 | |
|           LOG(FATAL) << td::format::as_array(other_res);
 | |
|         }
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     return res;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   using ManualDns = ton::ManualDns;
 | |
|   td::optional<td::Ed25519::PrivateKey> key_;
 | |
|   td::Ref<ManualDns> dns_;
 | |
|   td::uint32 query_id_ = 1;  // Query id serve as "valid until", but in tests now() == 0
 | |
| 
 | |
|   MapDns map_dns_;
 | |
|   td::optional<MapDns> combined_map_dns_;
 | |
| 
 | |
|   void do_update_smc(const Action& entry) {
 | |
|     LOG(ERROR) << td::format::escaped(ManualDns::encode_name(entry.name));
 | |
|     ton::DnsInterface::Action action;
 | |
|     action.name = entry.name;
 | |
|     action.category = entry.category;
 | |
|     action.data = ManualDns::EntryData::text(entry.text.value()).as_cell().move_as_ok();
 | |
|   }
 | |
| };
 | |
| 
 | |
| static td::Bits256 intToCat(td::uint32 x) {
 | |
|   auto y = td::make_refint(x);
 | |
|   td::Bits256 cat;
 | |
|   y->export_bytes(cat.data(), 32, false);
 | |
|   return cat;
 | |
| }
 | |
| 
 | |
| void do_dns_test(CheckedDns&& dns) {
 | |
|   using Action = CheckedDns::Action;
 | |
|   std::vector<Action> actions;
 | |
| 
 | |
|   td::Random::Xorshift128plus rnd(123);
 | |
| 
 | |
|   auto gen_name = [&] {
 | |
|     auto cnt = rnd.fast(1, 2);
 | |
|     std::string res;
 | |
|     for (int i = 0; i < cnt; i++) {
 | |
|       if (i != 0) {
 | |
|         res += '.';
 | |
|       }
 | |
|       auto len = rnd.fast(1, 1);
 | |
|       for (int j = 0; j < len; j++) {
 | |
|         res += static_cast<char>(rnd.fast('a', 'b'));
 | |
|       }
 | |
|     }
 | |
|     return res;
 | |
|   };
 | |
|   auto gen_text = [&] {
 | |
|     std::string res;
 | |
|     int len = 5;
 | |
|     for (int j = 0; j < len; j++) {
 | |
|       res += static_cast<char>(rnd.fast('a', 'b'));
 | |
|     }
 | |
|     return res;
 | |
|   };
 | |
| 
 | |
|   auto gen_action = [&] {
 | |
|     Action action;
 | |
|     if (rnd.fast(0, 1000) == 0) {
 | |
|       return action;
 | |
|     }
 | |
|     action.name = gen_name();
 | |
|     if (rnd.fast(0, 20) == 0) {
 | |
|       return action;
 | |
|     }
 | |
|     action.category = intToCat(rnd.fast(1, 5));
 | |
|     if (rnd.fast(0, 4) == 0) {
 | |
|       return action;
 | |
|     }
 | |
|     if (rnd.fast(0, 4) == 0) {
 | |
|       action.text = "";
 | |
|       return action;
 | |
|     }
 | |
|     action.text = gen_text();
 | |
|     return action;
 | |
|   };
 | |
| 
 | |
|   SET_VERBOSITY_LEVEL(VERBOSITY_NAME(ERROR));
 | |
|   for (int i = 0; i < 100000; i++) {
 | |
|     actions.push_back(gen_action());
 | |
|     if (rnd.fast(0, 10) == 0) {
 | |
|       dns.update(actions);
 | |
|       actions.clear();
 | |
|     }
 | |
|     auto name = gen_name();
 | |
|     auto category = td::Bits256::zero();
 | |
|     dns.resolve(name, intToCat(rnd.fast(0, 5)));
 | |
|   }
 | |
| };
 | |
| 
 | |
| TEST(Smartcont, DnsManual) {
 | |
|   using ManualDns = ton::ManualDns;
 | |
|   auto test_entry_data = [](auto&& entry_data) {
 | |
|     auto cell = entry_data.as_cell().move_as_ok();
 | |
|     auto cs = vm::load_cell_slice(cell);
 | |
|     auto new_entry_data = ManualDns::EntryData::from_cellslice(cs).move_as_ok();
 | |
|     ASSERT_EQ(entry_data, new_entry_data);
 | |
|   };
 | |
|   test_entry_data(ManualDns::EntryData::text("abcd"));
 | |
|   test_entry_data(ManualDns::EntryData::adnl_address(ton::Bits256{}));
 | |
| 
 | |
|   CHECK(td::Slice("a\0b\0") == ManualDns::encode_name("b.a"));
 | |
|   CHECK(td::Slice("a\0b\0") == ManualDns::encode_name(".b.a"));
 | |
|   ASSERT_EQ(".b.a", ManualDns::decode_name("a\0b\0"));
 | |
|   ASSERT_EQ("b.a", ManualDns::decode_name("a\0b"));
 | |
|   ASSERT_EQ("", ManualDns::decode_name(""));
 | |
| 
 | |
|   auto key = td::Ed25519::generate_private_key().move_as_ok();
 | |
| 
 | |
|   auto manual = ManualDns::create(ManualDns::create_init_data_fast(key.get_public_key().move_as_ok(), 123), -1);
 | |
|   CHECK(manual->get_wallet_id().move_as_ok() == 123);
 | |
|   auto init_query = manual->create_init_query(key).move_as_ok();
 | |
|   LOG(ERROR) << "A";
 | |
|   CHECK(manual.write().send_external_message(init_query).code == 0);
 | |
|   LOG(ERROR) << "B";
 | |
|   CHECK(manual.write().send_external_message(init_query).code != 0);
 | |
| 
 | |
|   auto value = vm::CellBuilder().store_bytes("hello world").finalize();
 | |
|   auto set_query =
 | |
|       manual
 | |
|           ->sign(key, manual->prepare(manual->create_set_value_unsigned(intToCat(1), "a\0b\0", value).move_as_ok(), 1)
 | |
|                           .move_as_ok())
 | |
|           .move_as_ok();
 | |
|   CHECK(manual.write().send_external_message(set_query).code == 0);
 | |
| 
 | |
|   auto res = manual->run_get_method(
 | |
|       "dnsresolve", {vm::load_cell_slice_ref(vm::CellBuilder().store_bytes("a\0b\0").finalize()), td::make_refint(1)});
 | |
|   CHECK(res.code == 0);
 | |
|   CHECK(res.stack.write().pop_cell()->get_hash() == value->get_hash());
 | |
| 
 | |
|   CheckedDns dns;
 | |
|   dns.update(CheckedDns::Action{"a.b.c", intToCat(1), "hello"});
 | |
|   CHECK(dns.resolve("a.b.c", intToCat(1)).at(0).text == "hello");
 | |
|   dns.resolve("a", intToCat(1));
 | |
|   dns.resolve("a.b", intToCat(1));
 | |
|   CHECK(dns.resolve("a.b.c", intToCat(2)).empty());
 | |
|   dns.update(CheckedDns::Action{"a.b.c", intToCat(2), "test"});
 | |
|   CHECK(dns.resolve("a.b.c", intToCat(2)).at(0).text == "test");
 | |
|   dns.resolve("a.b.c", intToCat(1));
 | |
|   dns.resolve("a.b.c", intToCat(2));
 | |
|   LOG(ERROR) << "Test zero category";
 | |
|   dns.resolve("a.b.c", intToCat(0));
 | |
|   dns.update(CheckedDns::Action{"", intToCat(0), ""});
 | |
|   CHECK(dns.resolve("a.b.c", intToCat(2)).empty());
 | |
| 
 | |
|   LOG(ERROR) << "Test multipe update";
 | |
|   {
 | |
|     CheckedDns::Action e[4] = {
 | |
|         CheckedDns::Action{"", intToCat(0), ""}, CheckedDns::Action{"a.b.c", intToCat(1), "hello"},
 | |
|         CheckedDns::Action{"a.b.c", intToCat(2), "world"}, CheckedDns::Action{"x.y.z", intToCat(3), "abc"}};
 | |
|     dns.update(td::span(e, 4));
 | |
|   }
 | |
|   dns.resolve("a.b.c", intToCat(1));
 | |
|   dns.resolve("a.b.c", intToCat(2));
 | |
|   dns.resolve("x.y.z", intToCat(3));
 | |
| 
 | |
|   dns.update(td::span_one(CheckedDns::Action{"x.y.z", intToCat(0), ""}));
 | |
| 
 | |
|   dns.resolve("a.b.c", intToCat(1));
 | |
|   dns.resolve("a.b.c", intToCat(2));
 | |
|   dns.resolve("x.y.z", intToCat(3));
 | |
| 
 | |
|   {
 | |
|     CheckedDns::Action e[3] = {CheckedDns::Action{"x.y.z", intToCat(0), ""},
 | |
|                                CheckedDns::Action{"x.y.z", intToCat(1), "xxx"},
 | |
|                                CheckedDns::Action{"x.y.z", intToCat(2), "yyy"}};
 | |
|     dns.update(td::span(e, 3));
 | |
|   }
 | |
|   dns.resolve("a.b.c", intToCat(1));
 | |
|   dns.resolve("a.b.c", intToCat(2));
 | |
|   dns.resolve("x.y.z", intToCat(1));
 | |
|   dns.resolve("x.y.z", intToCat(2));
 | |
|   dns.resolve("x.y.z", intToCat(3));
 | |
| 
 | |
|   {
 | |
|     auto actions_ext =
 | |
|         ton::ManualDns::parse("delete.name one\nset one 1 TEXT:one\ndelete.name two\nset two 2 TEXT:two").move_as_ok();
 | |
| 
 | |
|     auto actions = td::transform(actions_ext, [](auto& action) {
 | |
|       td::optional<std::string> data;
 | |
|       if (action.data) {
 | |
|         data = action.data.value().data.template get<ton::ManualDns::EntryDataText>().text;
 | |
|       }
 | |
|       return CheckedDns::Action{action.name, action.category, std::move(data)};
 | |
|     });
 | |
| 
 | |
|     dns.update(actions);
 | |
|   }
 | |
|   dns.resolve("one", intToCat(1));
 | |
|   dns.resolve("two", intToCat(2));
 | |
| 
 | |
|   // TODO: rethink semantic of creating an empty dictionary
 | |
|   do_dns_test(CheckedDns(true, true));
 | |
| }
 | |
| 
 | |
| using namespace ton::pchan;
 | |
| 
 | |
| template <class T>
 | |
| struct ValidateState {
 | |
|   T& self() {
 | |
|     return static_cast<T&>(*this);
 | |
|   }
 | |
| 
 | |
|   void init(td::Ref<vm::Cell> state) {
 | |
|     state_ = state;
 | |
|     block::gen::ChanData::Record data_rec;
 | |
|     if (!tlb::unpack_cell(state, data_rec)) {
 | |
|       on_fatal_error(td::Status::Error("Expected Data"));
 | |
|       return;
 | |
|     }
 | |
|     if (!tlb::unpack_cell(data_rec.state, self().rec)) {
 | |
|       on_fatal_error(td::Status::Error("Expected StatePayout"));
 | |
|       return;
 | |
|     }
 | |
|     CHECK(self().rec.A.not_null());
 | |
|   }
 | |
| 
 | |
|   T& expect_grams(td::Ref<vm::CellSlice> cs, td::uint64 expected, td::Slice name) {
 | |
|     if (has_fatal_error_) {
 | |
|       return self();
 | |
|     }
 | |
|     td::RefInt256 got;
 | |
|     CHECK(cs.not_null());
 | |
|     CHECK(block::tlb::t_Grams.as_integer_to(cs, got));
 | |
|     if (got->cmp(expected) != 0) {
 | |
|       on_error(td::Status::Error(PSLICE() << name << ": expected " << expected << ", got " << got->to_dec_string()));
 | |
|     }
 | |
|     return self();
 | |
|   }
 | |
|   template <class S>
 | |
|   T& expect_eq(S a, S expected, td::Slice name) {
 | |
|     if (has_fatal_error_) {
 | |
|       return self();
 | |
|     }
 | |
|     if (!(a == expected)) {
 | |
|       on_error(td::Status::Error(PSLICE() << name << ": expected " << expected << ", got " << a));
 | |
|     }
 | |
|     return self();
 | |
|   }
 | |
| 
 | |
|   td::Status finish() {
 | |
|     if (errors_.empty()) {
 | |
|       return td::Status::OK();
 | |
|     }
 | |
|     std::stringstream ss;
 | |
|     block::gen::t_ChanData.print_ref(ss, state_);
 | |
|     td::StringBuilder sb;
 | |
|     for (auto& error : errors_) {
 | |
|       sb << error << "\n";
 | |
|     }
 | |
|     sb << ss.str();
 | |
|     return td::Status::Error(sb.as_cslice());
 | |
|   }
 | |
| 
 | |
|   void on_fatal_error(td::Status error) {
 | |
|     CHECK(!has_fatal_error_);
 | |
|     has_fatal_error_ = true;
 | |
|     on_error(std::move(error));
 | |
|   }
 | |
|   void on_error(td::Status error) {
 | |
|     CHECK(error.is_error());
 | |
|     errors_.push_back(std::move(error));
 | |
|   }
 | |
| 
 | |
|  public:
 | |
|   td::Ref<vm::Cell> state_;
 | |
|   bool has_fatal_error_{false};
 | |
|   std::vector<td::Status> errors_;
 | |
| };
 | |
| 
 | |
| struct ValidateStatePayout : public ValidateState<ValidateStatePayout> {
 | |
|   ValidateStatePayout& expect_A(td::uint64 a) {
 | |
|     expect_grams(rec.A, a, "A");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStatePayout& expect_B(td::uint64 b) {
 | |
|     expect_grams(rec.B, b, "B");
 | |
|     return *this;
 | |
|   }
 | |
| 
 | |
|   ValidateStatePayout(td::Ref<vm::Cell> state) {
 | |
|     init(std::move(state));
 | |
|   }
 | |
| 
 | |
|   block::gen::ChanState::Record_chan_state_payout rec;
 | |
| };
 | |
| 
 | |
| struct ValidateStateInit : public ValidateState<ValidateStateInit> {
 | |
|   ValidateStateInit& expect_A(td::uint64 a) {
 | |
|     expect_grams(rec.A, a, "A");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateInit& expect_B(td::uint64 b) {
 | |
|     expect_grams(rec.B, b, "B");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateInit& expect_min_A(td::uint64 a) {
 | |
|     expect_grams(rec.min_A, a, "min_A");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateInit& expect_min_B(td::uint64 b) {
 | |
|     expect_grams(rec.min_B, b, "min_B");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateInit& expect_expire_at(td::uint32 b) {
 | |
|     expect_eq(rec.expire_at, b, "expire_at");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateInit& expect_signed_A(bool x) {
 | |
|     expect_eq(rec.signed_A, x, "signed_A");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateInit& expect_signed_B(bool x) {
 | |
|     expect_eq(rec.signed_B, x, "signed_B");
 | |
|     return *this;
 | |
|   }
 | |
| 
 | |
|   ValidateStateInit(td::Ref<vm::Cell> state) {
 | |
|     init(std::move(state));
 | |
|   }
 | |
| 
 | |
|   block::gen::ChanState::Record_chan_state_init rec;
 | |
| };
 | |
| 
 | |
| struct ValidateStateClose : public ValidateState<ValidateStateClose> {
 | |
|   ValidateStateClose& expect_A(td::uint64 a) {
 | |
|     expect_grams(rec.A, a, "A");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateClose& expect_B(td::uint64 b) {
 | |
|     expect_grams(rec.B, b, "B");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateClose& expect_promise_A(td::uint64 a) {
 | |
|     expect_grams(rec.promise_A, a, "promise_A");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateClose& expect_promise_B(td::uint64 b) {
 | |
|     expect_grams(rec.promise_B, b, "promise_B");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateClose& expect_expire_at(td::uint32 b) {
 | |
|     expect_eq(rec.expire_at, b, "expire_at");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateClose& expect_signed_A(bool x) {
 | |
|     expect_eq(rec.signed_A, x, "signed_A");
 | |
|     return *this;
 | |
|   }
 | |
|   ValidateStateClose& expect_signed_B(bool x) {
 | |
|     expect_eq(rec.signed_B, x, "signed_B");
 | |
|     return *this;
 | |
|   }
 | |
| 
 | |
|   ValidateStateClose(td::Ref<vm::Cell> state) {
 | |
|     init(std::move(state));
 | |
|   }
 | |
| 
 | |
|   block::gen::ChanState::Record_chan_state_close rec;
 | |
| };
 | |
| 
 | |
| // config$_ initTimeout:int exitTimeout:int a_key:int256 b_key:int256 a_addr b_addr channel_id:int256 = Config;
 | |
| TEST(Smarcont, Channel) {
 | |
|   auto code = ton::SmartContractCode::get_code(ton::SmartContractCode::PaymentChannel);
 | |
|   Config config;
 | |
|   auto a_pkey = td::Ed25519::generate_private_key().move_as_ok();
 | |
|   auto b_pkey = td::Ed25519::generate_private_key().move_as_ok();
 | |
|   config.init_timeout = 20;
 | |
|   config.close_timeout = 40;
 | |
|   auto dest = block::StdAddress::parse("Ef9Tj6fMJP+OqhAdhKXxq36DL+HYSzCc3+9O6UNzqsgPfYFX").move_as_ok();
 | |
|   config.a_addr = dest;
 | |
|   config.b_addr = dest;
 | |
|   config.a_key = a_pkey.get_public_key().ok().as_octet_string();
 | |
|   config.b_key = b_pkey.get_public_key().ok().as_octet_string();
 | |
|   config.channel_id = 123;
 | |
| 
 | |
|   Data data;
 | |
|   data.config = config.serialize();
 | |
|   data.state = data.init_state();
 | |
|   auto data_cell = data.serialize();
 | |
| 
 | |
|   auto channel = ton::SmartContract::create(ton::SmartContract::State{code, data_cell});
 | |
|   ValidateStateInit(channel->get_state().data)
 | |
|       .expect_A(0)
 | |
|       .expect_B(0)
 | |
|       .expect_min_A(0)
 | |
|       .expect_min_B(0)
 | |
|       .expect_signed_A(false)
 | |
|       .expect_signed_B(false)
 | |
|       .expect_expire_at(0)
 | |
|       .finish()
 | |
|       .ensure();
 | |
| 
 | |
|   enum err {
 | |
|     ok = 0,
 | |
|     wrong_a_signature = 31,
 | |
|     wrong_b_signature,
 | |
|     msg_value_too_small,
 | |
|     replay_protection,
 | |
|     no_timeout,
 | |
|     expected_init,
 | |
|     expected_close,
 | |
|     no_promise_signature,
 | |
|     wrong_channel_id
 | |
|   };
 | |
| 
 | |
| #define expect_code(description, expected_code, e)                                                            \
 | |
|   {                                                                                                           \
 | |
|     auto res = e;                                                                                             \
 | |
|     LOG_IF(FATAL, expected_code != res.code) << " res.code=" << res.code << " " << description << "\n" << #e; \
 | |
|   }
 | |
| #define expect_ok(description, e) expect_code(description, 0, e)
 | |
| 
 | |
|   expect_code("Trying to invoke a timeout while channel is empty", no_timeout,
 | |
|               channel.write().send_external_message(MsgTimeoutBuilder().finalize(),
 | |
|                                                     ton::SmartContract::Args().set_now(1000000)));
 | |
| 
 | |
|   expect_code("External init message with no signatures", replay_protection,
 | |
|               channel.write().send_external_message(MsgInitBuilder().channel_id(config.channel_id).finalize()));
 | |
|   expect_code("Internal init message with not enough value", msg_value_too_small,
 | |
|               channel.write().send_internal_message(
 | |
|                   MsgInitBuilder().channel_id(config.channel_id).inc_A(1000).min_B(2000).with_a_key(&a_pkey).finalize(),
 | |
|                   ton::SmartContract::Args().set_amount(100)));
 | |
|   expect_code(
 | |
|       "Internal init message with wrong channel_id", wrong_channel_id,
 | |
|       channel.write().send_internal_message(MsgInitBuilder().inc_A(1000).min_B(2000).with_a_key(&a_pkey).finalize(),
 | |
|                                             ton::SmartContract::Args().set_amount(1000)));
 | |
|   expect_ok("A init with (inc_A = 1000, min_A = 1, min_B = 2000)",
 | |
|             channel.write().send_internal_message(MsgInitBuilder()
 | |
|                                                       .channel_id(config.channel_id)
 | |
|                                                       .inc_A(1000)
 | |
|                                                       .min_A(1)
 | |
|                                                       .min_B(2000)
 | |
|                                                       .with_a_key(&a_pkey)
 | |
|                                                       .finalize(),
 | |
|                                                   ton::SmartContract::Args().set_amount(1000)));
 | |
|   ValidateStateInit(channel->get_state().data)
 | |
|       .expect_A(1000)
 | |
|       .expect_B(0)
 | |
|       .expect_min_A(1)
 | |
|       .expect_min_B(2000)
 | |
|       .expect_signed_A(true)
 | |
|       .expect_signed_B(false)
 | |
|       .expect_expire_at(config.init_timeout)
 | |
|       .finish()
 | |
|       .ensure();
 | |
| 
 | |
|   expect_code("Repeated init of A init with (inc_A = 100, min_B = 5000). Must be ignored", replay_protection,
 | |
|               channel.write().send_internal_message(
 | |
|                   MsgInitBuilder().channel_id(config.channel_id).inc_A(100).min_B(5000).with_a_key(&a_pkey).finalize(),
 | |
|                   ton::SmartContract::Args().set_amount(1000)));
 | |
|   expect_code(
 | |
|       "Trying to invoke a timeout too early", no_timeout,
 | |
|       channel.write().send_external_message(MsgTimeoutBuilder().finalize(), ton::SmartContract::Args().set_now(0)));
 | |
| 
 | |
|   {
 | |
|     auto channel_copy = channel;
 | |
|     expect_ok("Invoke a timeout", channel_copy.write().send_external_message(MsgTimeoutBuilder().finalize(),
 | |
|                                                                              ton::SmartContract::Args().set_now(21)));
 | |
|     ValidateStatePayout(channel_copy->get_state().data).expect_A(1000).expect_B(0).finish().ensure();
 | |
|   }
 | |
|   {
 | |
|     auto channel_copy = channel;
 | |
|     expect_ok("B init with inc_B < min_B. Leads to immediate payout",
 | |
|               channel_copy.write().send_internal_message(
 | |
|                   MsgInitBuilder().channel_id(config.channel_id).inc_B(1500).with_b_key(&b_pkey).finalize(),
 | |
|                   ton::SmartContract::Args().set_amount(1500)));
 | |
|     ValidateStatePayout(channel_copy->get_state().data).expect_A(1000).expect_B(1500).finish().ensure();
 | |
|   }
 | |
| 
 | |
|   expect_ok("B init with (inc_B = 2000, min_A = 1, min_A = 1000)",
 | |
|             channel.write().send_internal_message(
 | |
|                 MsgInitBuilder().channel_id(config.channel_id).inc_B(2000).min_A(1000).with_b_key(&b_pkey).finalize(),
 | |
|                 ton::SmartContract::Args().set_amount(2000)));
 | |
|   ValidateStateClose(channel->get_state().data)
 | |
|       .expect_A(1000)
 | |
|       .expect_B(2000)
 | |
|       .expect_promise_A(0)
 | |
|       .expect_promise_B(0)
 | |
|       .expect_signed_A(false)
 | |
|       .expect_signed_B(false)
 | |
|       .expect_expire_at(0)
 | |
|       .finish()
 | |
|       .ensure();
 | |
| 
 | |
|   {
 | |
|     auto channel_copy = channel;
 | |
|     expect_ok("A&B send Promise(1000000, 1000000 + 10) signed by nobody",
 | |
|               channel_copy.write().send_external_message(MsgCloseBuilder()
 | |
|                                                              .signed_promise(SignedPromiseBuilder()
 | |
|                                                                                  .promise_A(1000000)
 | |
|                                                                                  .promise_B(1000000 + 10)
 | |
|                                                                                  .channel_id(config.channel_id)
 | |
|                                                                                  .finalize())
 | |
|                                                              .with_a_key(&a_pkey)
 | |
|                                                              .with_b_key(&b_pkey)
 | |
|                                                              .finalize(),
 | |
|                                                          ton::SmartContract::Args().set_now(21)));
 | |
|     ValidateStatePayout(channel_copy->get_state().data).expect_A(1000 + 10).expect_B(2000 - 10).finish().ensure();
 | |
|   }
 | |
|   {
 | |
|     auto channel_copy = channel;
 | |
|     expect_ok("A&B send Promise(1000000, 1000000 + 10) signed by A",
 | |
|               channel_copy.write().send_external_message(MsgCloseBuilder()
 | |
|                                                              .signed_promise(SignedPromiseBuilder()
 | |
|                                                                                  .promise_A(1000000)
 | |
|                                                                                  .promise_B(1000000 + 10)
 | |
|                                                                                  .with_key(&a_pkey)
 | |
|                                                                                  .channel_id(config.channel_id)
 | |
|                                                                                  .finalize())
 | |
|                                                              .with_a_key(&a_pkey)
 | |
|                                                              .with_b_key(&b_pkey)
 | |
|                                                              .finalize(),
 | |
|                                                          ton::SmartContract::Args().set_now(21)));
 | |
|     ValidateStatePayout(channel_copy->get_state().data).expect_A(1000 + 10).expect_B(2000 - 10).finish().ensure();
 | |
|   }
 | |
| 
 | |
|   expect_code(
 | |
|       "A sends Promise(1000000, 0) signed by A", wrong_b_signature,
 | |
|       channel.write().send_external_message(
 | |
|           MsgCloseBuilder()
 | |
|               .signed_promise(
 | |
|                   SignedPromiseBuilder().promise_A(1000000).with_key(&a_pkey).channel_id(config.channel_id).finalize())
 | |
|               .with_a_key(&a_pkey)
 | |
|               .finalize(),
 | |
|           ton::SmartContract::Args().set_now(21)));
 | |
|   expect_code(
 | |
|       "B sends Promise(1000000, 0) signed by B", wrong_a_signature,
 | |
|       channel.write().send_external_message(
 | |
|           MsgCloseBuilder()
 | |
|               .signed_promise(
 | |
|                   SignedPromiseBuilder().promise_A(1000000).with_key(&b_pkey).channel_id(config.channel_id).finalize())
 | |
|               .with_b_key(&b_pkey)
 | |
|               .finalize(),
 | |
|           ton::SmartContract::Args().set_now(21)));
 | |
|   expect_code("B sends Promise(1000000, 0) signed by A with wrong channel_id", wrong_channel_id,
 | |
|               channel.write().send_external_message(MsgCloseBuilder()
 | |
|                                                         .signed_promise(SignedPromiseBuilder()
 | |
|                                                                             .promise_A(1000000)
 | |
|                                                                             .with_key(&a_pkey)
 | |
|                                                                             .channel_id(config.channel_id + 1)
 | |
|                                                                             .finalize())
 | |
|                                                         .with_b_key(&b_pkey)
 | |
|                                                         .finalize(),
 | |
|                                                     ton::SmartContract::Args().set_now(21)));
 | |
|   expect_code(
 | |
|       "B sends unsigned Promise(1000000, 0)", no_promise_signature,
 | |
|       channel.write().send_external_message(
 | |
|           MsgCloseBuilder()
 | |
|               .signed_promise(SignedPromiseBuilder().promise_A(1000000).channel_id(config.channel_id).finalize())
 | |
|               .with_b_key(&b_pkey)
 | |
|               .finalize(),
 | |
|           ton::SmartContract::Args().set_now(21)));
 | |
| 
 | |
|   expect_ok(
 | |
|       "B sends Promise(1000000, 0) signed by A",
 | |
|       channel.write().send_external_message(
 | |
|           MsgCloseBuilder()
 | |
|               .signed_promise(
 | |
|                   SignedPromiseBuilder().promise_A(1000000).with_key(&a_pkey).channel_id(config.channel_id).finalize())
 | |
|               .with_b_key(&b_pkey)
 | |
|               .finalize(),
 | |
|           ton::SmartContract::Args().set_now(21)));
 | |
|   ValidateStateClose(channel->get_state().data)
 | |
|       .expect_A(1000)
 | |
|       .expect_B(2000)
 | |
|       .expect_promise_A(1000000)
 | |
|       .expect_promise_B(0)
 | |
|       .expect_signed_A(false)
 | |
|       .expect_signed_B(true)
 | |
|       .expect_expire_at(21 + config.close_timeout)
 | |
|       .finish()
 | |
|       .ensure();
 | |
| 
 | |
|   expect_ok("B sends Promise(0, 1000000 + 10) signed by A",
 | |
|             channel.write().send_external_message(MsgCloseBuilder()
 | |
|                                                       .signed_promise(SignedPromiseBuilder()
 | |
|                                                                           .promise_B(1000000 + 10)
 | |
|                                                                           .with_key(&b_pkey)
 | |
|                                                                           .channel_id(config.channel_id)
 | |
|                                                                           .finalize())
 | |
|                                                       .with_a_key(&a_pkey)
 | |
|                                                       .finalize(),
 | |
|                                                   ton::SmartContract::Args().set_now(21)));
 | |
|   ValidateStatePayout(channel->get_state().data).expect_A(1000 + 10).expect_B(2000 - 10).finish().ensure();
 | |
| #undef expect_ok
 | |
| #undef expect_code
 | |
| }
 |