2020-01-20 14:40:58 +03:00
|
|
|
// Copyright 2020 The Grin Developers
|
2018-05-09 12:15:58 +03:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
//! Transaction integration tests
|
|
|
|
|
|
|
|
pub mod common;
|
2020-09-03 12:59:54 +03:00
|
|
|
use crate::common::tx1i1o;
|
2020-08-18 22:09:54 +03:00
|
|
|
use crate::core::core::transaction::{self, Error};
|
|
|
|
use crate::core::core::verifier_cache::LruVerifierCache;
|
2020-09-03 12:59:54 +03:00
|
|
|
use crate::core::core::{KernelFeatures, Output, OutputFeatures, Transaction, Weighting};
|
2020-08-18 22:09:54 +03:00
|
|
|
use crate::core::global;
|
|
|
|
use crate::core::libtx::build;
|
|
|
|
use crate::core::libtx::proof::{self, ProofBuilder};
|
|
|
|
use crate::core::{consensus, ser};
|
2018-12-08 02:59:40 +03:00
|
|
|
use grin_core as core;
|
2019-11-14 18:27:30 +03:00
|
|
|
use keychain::{ExtKeychain, Keychain};
|
2020-08-18 22:09:54 +03:00
|
|
|
use std::sync::Arc;
|
|
|
|
use util::RwLock;
|
2018-05-09 12:15:58 +03:00
|
|
|
|
2020-09-03 12:59:54 +03:00
|
|
|
// We use json serialization between wallet->node when pushing transactions to the network.
|
|
|
|
// This test ensures we exercise this serialization/deserialization code.
|
|
|
|
#[test]
|
|
|
|
fn test_transaction_json_ser_deser() {
|
|
|
|
let tx1 = tx1i1o();
|
|
|
|
let value = serde_json::to_value(&tx1).unwrap();
|
|
|
|
|
|
|
|
assert!(value["offset"].is_string());
|
|
|
|
assert_eq!(value["body"]["inputs"][0]["features"], "Plain");
|
|
|
|
assert!(value["body"]["inputs"][0]["commit"].is_string());
|
|
|
|
assert_eq!(value["body"]["outputs"][0]["features"], "Plain");
|
|
|
|
assert!(value["body"]["outputs"][0]["commit"].is_string());
|
|
|
|
assert!(value["body"]["outputs"][0]["proof"].is_string());
|
|
|
|
|
|
|
|
// Note: Tx kernel "features" serialize in a slightly unexpected way.
|
|
|
|
assert_eq!(value["body"]["kernels"][0]["features"]["Plain"]["fee"], 2);
|
|
|
|
assert!(value["body"]["kernels"][0]["excess"].is_string());
|
|
|
|
assert!(value["body"]["kernels"][0]["excess_sig"].is_string());
|
|
|
|
|
|
|
|
let tx2: Transaction = serde_json::from_value(value).unwrap();
|
|
|
|
assert_eq!(tx1, tx2);
|
|
|
|
|
|
|
|
let tx1 = tx1i1o();
|
|
|
|
let str = serde_json::to_string(&tx1).unwrap();
|
|
|
|
println!("{}", str);
|
|
|
|
let tx2: Transaction = serde_json::from_str(&str).unwrap();
|
|
|
|
assert_eq!(tx1, tx2);
|
|
|
|
}
|
|
|
|
|
2018-05-09 12:15:58 +03:00
|
|
|
#[test]
|
|
|
|
fn test_output_ser_deser() {
|
2018-12-29 01:46:21 +03:00
|
|
|
let keychain = ExtKeychain::from_random_seed(false).unwrap();
|
2018-10-10 12:11:01 +03:00
|
|
|
let key_id = ExtKeychain::derive_key_id(1, 1, 0, 0, 0);
|
2020-02-04 16:52:00 +03:00
|
|
|
let switch = keychain::SwitchCommitmentType::Regular;
|
2019-06-12 12:28:55 +03:00
|
|
|
let commit = keychain.commit(5, &key_id, switch).unwrap();
|
2020-08-18 22:09:54 +03:00
|
|
|
let builder = ProofBuilder::new(&keychain);
|
2019-06-12 12:28:55 +03:00
|
|
|
let proof = proof::create(&keychain, &builder, 5, &key_id, switch, commit, None).unwrap();
|
2018-05-09 12:15:58 +03:00
|
|
|
|
2020-09-03 12:59:54 +03:00
|
|
|
let out = Output::new(OutputFeatures::Plain, commit, proof);
|
2018-05-09 12:15:58 +03:00
|
|
|
|
|
|
|
let mut vec = vec![];
|
2019-07-06 17:51:03 +03:00
|
|
|
ser::serialize_default(&mut vec, &out).expect("serialized failed");
|
2019-06-27 19:19:41 +03:00
|
|
|
let dout: Output = ser::deserialize_default(&mut &vec[..]).unwrap();
|
2018-05-09 12:15:58 +03:00
|
|
|
|
2020-09-03 12:59:54 +03:00
|
|
|
assert_eq!(dout.features(), OutputFeatures::Plain);
|
|
|
|
assert_eq!(dout.commitment(), out.commitment());
|
2018-05-09 12:15:58 +03:00
|
|
|
assert_eq!(dout.proof, out.proof);
|
|
|
|
}
|
2020-08-18 22:09:54 +03:00
|
|
|
|
|
|
|
// Test coverage for verifying cut-through during transaction validation.
|
|
|
|
// It is not valid for a transaction to spend an output and produce a new output with the same commitment.
|
|
|
|
// This test covers the case where a plain output is spent, producing a plain output with the same commitment.
|
|
|
|
#[test]
|
|
|
|
fn test_verify_cut_through_plain() -> Result<(), Error> {
|
|
|
|
global::set_local_chain_type(global::ChainTypes::UserTesting);
|
|
|
|
|
|
|
|
let keychain = ExtKeychain::from_random_seed(false)?;
|
|
|
|
|
|
|
|
let key_id1 = ExtKeychain::derive_key_id(1, 1, 0, 0, 0);
|
|
|
|
let key_id2 = ExtKeychain::derive_key_id(1, 2, 0, 0, 0);
|
|
|
|
let key_id3 = ExtKeychain::derive_key_id(1, 3, 0, 0, 0);
|
|
|
|
|
|
|
|
let builder = proof::ProofBuilder::new(&keychain);
|
|
|
|
|
|
|
|
let mut tx = build::transaction(
|
|
|
|
KernelFeatures::Plain { fee: 0 },
|
|
|
|
&[
|
|
|
|
build::input(10, key_id1.clone()),
|
|
|
|
build::input(10, key_id2.clone()),
|
|
|
|
build::output(10, key_id1.clone()),
|
|
|
|
build::output(6, key_id2.clone()),
|
|
|
|
build::output(4, key_id3.clone()),
|
|
|
|
],
|
|
|
|
&keychain,
|
|
|
|
&builder,
|
|
|
|
)
|
|
|
|
.expect("valid tx");
|
|
|
|
|
|
|
|
let verifier_cache = Arc::new(RwLock::new(LruVerifierCache::new()));
|
|
|
|
|
|
|
|
// Transaction should fail validation due to cut-through.
|
|
|
|
assert_eq!(
|
|
|
|
tx.validate(Weighting::AsTransaction, verifier_cache.clone()),
|
|
|
|
Err(Error::CutThrough),
|
|
|
|
);
|
|
|
|
|
|
|
|
// Transaction should fail lightweight "read" validation due to cut-through.
|
|
|
|
assert_eq!(tx.validate_read(), Err(Error::CutThrough));
|
|
|
|
|
|
|
|
// Apply cut-through to eliminate the offending input and output.
|
|
|
|
let mut inputs: Vec<_> = tx.inputs().into();
|
|
|
|
let mut outputs = tx.outputs().to_vec();
|
|
|
|
let (inputs, outputs, _, _) = transaction::cut_through(&mut inputs[..], &mut outputs[..])?;
|
|
|
|
|
|
|
|
tx.body = tx
|
|
|
|
.body
|
|
|
|
.replace_inputs(inputs.into())
|
|
|
|
.replace_outputs(outputs);
|
|
|
|
|
|
|
|
// Transaction validates successfully after applying cut-through.
|
|
|
|
tx.validate(Weighting::AsTransaction, verifier_cache.clone())?;
|
|
|
|
|
|
|
|
// Transaction validates via lightweight "read" validation as well.
|
|
|
|
tx.validate_read()?;
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test coverage for verifying cut-through during transaction validation.
|
|
|
|
// It is not valid for a transaction to spend an output and produce a new output with the same commitment.
|
|
|
|
// This test covers the case where a coinbase output is spent, producing a plain output with the same commitment.
|
|
|
|
#[test]
|
|
|
|
fn test_verify_cut_through_coinbase() -> Result<(), Error> {
|
|
|
|
global::set_local_chain_type(global::ChainTypes::UserTesting);
|
|
|
|
|
|
|
|
let keychain = ExtKeychain::from_random_seed(false)?;
|
|
|
|
|
|
|
|
let key_id1 = ExtKeychain::derive_key_id(1, 1, 0, 0, 0);
|
|
|
|
let key_id2 = ExtKeychain::derive_key_id(1, 2, 0, 0, 0);
|
|
|
|
let key_id3 = ExtKeychain::derive_key_id(1, 3, 0, 0, 0);
|
|
|
|
|
|
|
|
let builder = ProofBuilder::new(&keychain);
|
|
|
|
|
|
|
|
let mut tx = build::transaction(
|
|
|
|
KernelFeatures::Plain { fee: 0 },
|
|
|
|
&[
|
|
|
|
build::coinbase_input(consensus::REWARD, key_id1.clone()),
|
|
|
|
build::coinbase_input(consensus::REWARD, key_id2.clone()),
|
|
|
|
build::output(60_000_000_000, key_id1.clone()),
|
|
|
|
build::output(50_000_000_000, key_id2.clone()),
|
|
|
|
build::output(10_000_000_000, key_id3.clone()),
|
|
|
|
],
|
|
|
|
&keychain,
|
|
|
|
&builder,
|
|
|
|
)
|
|
|
|
.expect("valid tx");
|
|
|
|
|
|
|
|
let verifier_cache = Arc::new(RwLock::new(LruVerifierCache::new()));
|
|
|
|
|
|
|
|
// Transaction should fail validation due to cut-through.
|
|
|
|
assert_eq!(
|
|
|
|
tx.validate(Weighting::AsTransaction, verifier_cache.clone()),
|
|
|
|
Err(Error::CutThrough),
|
|
|
|
);
|
|
|
|
|
|
|
|
// Transaction should fail lightweight "read" validation due to cut-through.
|
|
|
|
assert_eq!(tx.validate_read(), Err(Error::CutThrough));
|
|
|
|
|
|
|
|
// Apply cut-through to eliminate the offending input and output.
|
|
|
|
let mut inputs: Vec<_> = tx.inputs().into();
|
|
|
|
let mut outputs = tx.outputs().to_vec();
|
|
|
|
let (inputs, outputs, _, _) = transaction::cut_through(&mut inputs[..], &mut outputs[..])?;
|
|
|
|
|
|
|
|
tx.body = tx
|
|
|
|
.body
|
|
|
|
.replace_inputs(inputs.into())
|
|
|
|
.replace_outputs(outputs);
|
|
|
|
|
|
|
|
// Transaction validates successfully after applying cut-through.
|
|
|
|
tx.validate(Weighting::AsTransaction, verifier_cache.clone())?;
|
|
|
|
|
|
|
|
// Transaction validates via lightweight "read" validation as well.
|
|
|
|
tx.validate_read()?;
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|