Revision 23f150d0e7f123ca90c178def2978523e10606c7 authored by Marge Bot on 08 September 2022, 14:58:56 UTC, committed by Marge Bot on 08 September 2022, 14:58:56 UTC
Co-authored-by: Killian Delarue <killian.delarue@nomadic-labs.com> Approved-by: Pierre Boutillier <pierre.boutillier@nomadic-labs.com> Approved-by: Victor Allombert <victor.allombert@tezcore.com> See merge request https://gitlab.com/tezos/tezos/-/merge_requests/6223
test_basic.py
from os import path
from typing import List
import pytest
from client.client import Client
from tools import constants, utils
from tools.paths import ACCOUNT_PATH
from tools.utils import assert_run_failure
from .contract_paths import CONTRACT_PATH
BAKE_ARGS: List[str] = []
TRANSFER_ARGS = ['--burn-cap', '0.257']
@pytest.mark.incremental
class TestRawContext:
def test_delegates(self, client: Client):
path = '/chains/main/blocks/head/context/raw/bytes/delegates/?depth=2'
res = client.rpc('get', path)
expected = {
"ed25519": {
"02298c03ed7d454a101eb7022bc95f7e5f41ac78": None,
"a9ceae0f8909125492a7c4700acc59274cc6c846": None,
"c55cf02dbeecc978d9c84625dcae72bb77ea4fbd": None,
"dac9f52543da1aed0bc1d6b46bf7c10db7014cd6": None,
"e7670f32038107a59a2b9cfefae36ea21f5aa63c": None,
}
}
assert res == expected
def test_no_service_1(self, client: Client):
path = '/chains/main/blocks/head/context/raw/bytes/non-existent'
with assert_run_failure('No service found at this URL'):
client.rpc('get', path)
def test_no_service_2(self, client: Client):
path = (
'/chains/main/blocks/head/context/raw/bytes/'
'non-existent?depth=-1'
)
expected = r'Failed to parse argument \'depth\' \("-1"\)'
with assert_run_failure(expected):
client.rpc('get', path)
def test_no_service_3(self, client: Client):
path = '/chains/main/blocks/head/context/raw/bytes/non-existent?depth=0'
with assert_run_failure('No service found at this URL'):
client.rpc('get', path)
def test_bake(self, client: Client):
utils.bake(client, 'bootstrap4')
@pytest.mark.parametrize(
"identity, message, expected_signature",
[
(
'bootstrap1',
'msg1',
'edsigtz68o4FdbpvycnAMDLaa7hpmmhjDx'
'hx4Zu3QWHLYJtcY1mVhW9m6CCvsciFXwf1'
'zLmah8fJP51cqaeaciBPGy5osH11AnR',
),
(
'bootstrap2',
'msg2',
'edsigtZqhR5SW6vbRSmqwzfS1KiJZLYLe'
'FhLcCEw7WxjBDxotVx83M2rLe4Baq52SUT'
'jxfXhQ5J3TabCwqt78kNpoU8j42GDEk4',
),
(
'bootstrap3',
'msg3',
'edsigu2PvAWxVYY3jQFVfBRW2Dg61xZMN'
'esHiNbwCTmpJSyfcJMW8Ch9WABHqsgHQRB'
'aSs6zZNHVGXfHSBnGCxT9x2b49L2zpMW',
),
(
'bootstrap4',
'msg4',
'edsigu5jieost8eeD3JwVrpPuSnKzLLvR3'
'aqezLPDTvxC3p41qwBEpxuViKriipxig5'
'2NQmJ7AFXTzhM3xgKM2ZaADcSMYWztuJ',
),
],
)
def test_sign_message(self, client, identity, message, expected_signature):
assert client.sign_message(message, identity) == expected_signature
@pytest.mark.parametrize(
"identity, message, signature",
[
(
'bootstrap1',
'msg1',
'edsigtz68o4FdbpvycnAMDLaa7hpmmhjDx'
'hx4Zu3QWHLYJtcY1mVhW9m6CCvsciFXwf1'
'zLmah8fJP51cqaeaciBPGy5osH11AnR',
),
(
'bootstrap2',
'msg2',
'edsigtZqhR5SW6vbRSmqwzfS1KiJZLYLe'
'FhLcCEw7WxjBDxotVx83M2rLe4Baq52SUT'
'jxfXhQ5J3TabCwqt78kNpoU8j42GDEk4',
),
(
'bootstrap3',
'msg3',
'edsigu2PvAWxVYY3jQFVfBRW2Dg61xZMN'
'esHiNbwCTmpJSyfcJMW8Ch9WABHqsgHQRB'
'aSs6zZNHVGXfHSBnGCxT9x2b49L2zpMW',
),
(
'bootstrap4',
'msg4',
'edsigu5jieost8eeD3JwVrpPuSnKzLLvR3'
'aqezLPDTvxC3p41qwBEpxuViKriipxig5'
'2NQmJ7AFXTzhM3xgKM2ZaADcSMYWztuJ',
),
],
)
def test_check_message(self, client, identity, message, signature):
assert client.check_message(message, identity, signature)
@pytest.mark.parametrize(
"identity, message, head_block",
[
("bootstrap1", "msg1", False),
("bootstrap2", "msg2", False),
("bootstrap3", "msg3", True),
("bootstrap4", "msg4", True),
],
)
def test_fail_inject_signed_arbitrary_ope(
self, client, identity, message, head_block
):
if head_block:
signature = client.sign_message(message, identity, block="head")
else:
signature = client.sign_message(message, identity)
chain_id = client.rpc('get', '/chains/main/chain_id')
head_hash = client.rpc('get', '/chains/main/blocks/head/hash')
run_json = {
'operation': {
"branch": head_hash,
"contents": [{"kind": "failing_noop", "arbitrary": message}],
'signature': signature,
},
'chain_id': chain_id,
}
run_operation_path = (
'/chains/main/blocks/head/helpers/scripts/run_operation'
)
with assert_run_failure(
'The failing_noop operation cannot be executed by the protocol'
):
client.rpc('post', run_operation_path, data=run_json)
def test_gen_keys(self, client: Client, session):
session['keys'] = ['foo', 'bar', 'boo']
sigs = [None, 'secp256k1', 'ed25519']
for key, sig in zip(session['keys'], sigs):
args = [] if sig is None else ['--sig', sig]
client.gen_key(key, args)
def test_transfers(self, client: Client, session):
client.transfer(1000, 'bootstrap1', session['keys'][0], TRANSFER_ARGS)
utils.bake(client)
client.transfer(2000, 'bootstrap1', session['keys'][1], TRANSFER_ARGS)
utils.bake(client)
client.transfer(3000, 'bootstrap1', session['keys'][2], TRANSFER_ARGS)
utils.bake(client)
def test_balances(self, client: Client, session):
assert client.get_balance(session['keys'][0]) == 1000
assert client.get_balance(session['keys'][1]) == 2000
assert client.get_balance(session['keys'][2]) == 3000
def test_transfer_bar_foo(self, client: Client, session):
client.reveal(session['keys'][1], ['--fee', '0', '--force-low-fee'])
utils.bake(client)
client.transfer(
1000,
session['keys'][1],
session['keys'][0],
['--fee', '0', '--force-low-fee'],
)
utils.bake(client)
def test_balances_bar_foo(self, client: Client, session):
assert client.get_balance(session['keys'][0]) == 2000
assert client.get_balance(session['keys'][1]) == 1000
def test_transfer_foo_bar(self, client: Client, session):
client.reveal(session['keys'][0], ['--fee', '0', '--force-low-fee'])
utils.bake(client)
client.transfer(
1000, session['keys'][0], session['keys'][1], ['--fee', '0.05']
)
utils.bake(client)
def test_balances_foo_bar(self, client: Client, session):
# 999.95 = 1000 - transfer fees
assert client.get_balance(session['keys'][0]) == 999.95
assert client.get_balance(session['keys'][1]) == 2000
def test_transfer_failure(self, client: Client, session):
with pytest.raises(Exception):
client.transfer(999.95, session['keys'][0], session['keys'][1])
def test_originate_contract_noop(self, client: Client):
contract = path.join(CONTRACT_PATH, 'opcodes', 'noop.tz')
client.remember('noop', contract)
client.typecheck(contract)
client.originate(
'noop', 1000, 'bootstrap1', contract, ['--burn-cap', '0.295']
)
utils.bake(client)
def test_transfer_to_noop(self, client: Client):
client.transfer(10, 'bootstrap1', 'noop', ['--arg', 'Unit'])
utils.bake(client)
def test_contract_hardlimit(self, client: Client):
contract = path.join(CONTRACT_PATH, 'mini_scenarios', 'hardlimit.tz')
client.originate(
'hardlimit',
1000,
'bootstrap1',
contract,
['--init', '3', '--burn-cap', '0.341'],
)
utils.bake(client)
client.transfer(10, 'bootstrap1', 'hardlimit', ['--arg', 'Unit'])
utils.bake(client)
client.transfer(10, 'bootstrap1', 'hardlimit', ['--arg', 'Unit'])
utils.bake(client)
def test_transfers_bootstraps5_bootstrap1(self, client: Client):
bootstrap5 = constants.IDENTITIES['bootstrap5']['identity']
all_deposits = client.frozen_deposits(bootstrap5)
balance = client.get_mutez_balance('bootstrap5')
assert balance + all_deposits == utils.mutez_of_tez(4000000.0)
client.transfer(
400000,
'bootstrap5',
'bootstrap1',
['--fee', '0', '--force-low-fee'],
)
utils.bake(client)
client.transfer(
400000,
'bootstrap1',
'bootstrap5',
['--fee', '0', '--force-low-fee'],
)
utils.bake(client)
all_deposits = client.frozen_deposits(bootstrap5)
assert client.get_mutez_balance(
'bootstrap5'
) + all_deposits == utils.mutez_of_tez(4000000.0)
def test_activate_accounts(self, client: Client, session):
account = f"{ACCOUNT_PATH}/king_commitment.json"
session['keys'] += ['king', 'queen']
client.activate_account(session['keys'][3], account)
utils.bake(client)
account = f"{ACCOUNT_PATH}/queen_commitment.json"
client.activate_account(session['keys'][4], account)
utils.bake(client)
assert client.get_balance(session['keys'][3]) == 23932454.669343
assert client.get_balance(session['keys'][4]) == 72954577.464032
def test_transfer_king_queen(self, client: Client, session):
keys = session['keys']
client.transfer(10, keys[3], keys[4], TRANSFER_ARGS)
utils.bake(client)
def test_duplicate_alias(self, client: Client):
client.add_address("baz", "foo", force=True)
show_foo = client.show_address("foo", show_secret=True)
assert show_foo.secret_key is not None
@pytest.mark.incremental
class TestRememberContract:
@pytest.mark.parametrize(
"contract_name,non_originated_contract_address",
[
("test", "KT1BuEZtb68c1Q4yjtckcNjGELqWt56Xyesc"),
("test-2", "KT1TZCh8fmUbuDqFxetPWC2fsQanAHzLx4W9"),
],
)
def test_non_originated_contract_no_forcing_not_saved_before(
self,
client,
contract_name,
non_originated_contract_address,
):
client.remember_contract(contract_name, non_originated_contract_address)
# As it is always the same client, the contracts have been saved
# before
@pytest.mark.parametrize(
"contract_name,non_originated_contract_address",
[
("test", "KT1BuEZtb68c1Q4yjtckcNjGELqWt56Xyesc"),
("test-2", "KT1TZCh8fmUbuDqFxetPWC2fsQanAHzLx4W9"),
],
)
def test_non_originated_contract_with_forcing_and_saved_before(
self,
client,
contract_name,
non_originated_contract_address,
):
client.remember_contract(
contract_name, non_originated_contract_address, force=True
)
# As it is always the same client, the contracts have been saved
# before
@pytest.mark.parametrize(
"contract_name,non_originated_contract_address",
[
("test", "KT1BuEZtb68c1Q4yjtckcNjGELqWt56Xyesc"),
("test-2", "KT1TZCh8fmUbuDqFxetPWC2fsQanAHzLx4W9"),
],
)
def test_non_originated_contract_no_forcing_and_saved_before(
self,
client,
contract_name,
non_originated_contract_address,
):
expected_error = f"The contract alias {contract_name} already exists"
with assert_run_failure(expected_error):
client.remember_contract(
contract_name, non_originated_contract_address, force=False
)
# Test operation size.
def test_operation_size_originate_byte_contract(self, client: Client):
contract = path.join(CONTRACT_PATH, 'opcodes', 'bytes.tz')
client.remember('bytes', contract)
client.typecheck(contract)
client.originate(
'bytes', 1000, 'bootstrap1', contract, ['--burn-cap', '0.295']
)
utils.bake(client)
# Test that operations under 16KB can be injected in the node.
def test_operation_size_small(self, client: Client):
bytes_arg = "0x" + ("00" * 6 * 1024) # 6 KB of data.
client.transfer(10, 'bootstrap1', 'bytes', ['--arg', bytes_arg])
utils.bake(client)
# Test that operations between 16KB and 32KB can be injected in the node.
def test_operation_size_medium(self, client: Client):
bytes_arg = "0x" + ("00" * 24 * 1024) # 24 KB of data.
client.transfer(10, 'bootstrap1', 'bytes', ['--arg', bytes_arg])
utils.bake(client)
# Test that operations above 32KB fail to be injected.
def test_operation_size_oversized(self, client: Client):
bytes_arg = "0x" + ("00" * 36 * 1024) # 36 KB of data.
expected_error = "Oversized operation"
with assert_run_failure(expected_error):
client.transfer(10, 'bootstrap1', 'bytes', ['--arg', bytes_arg])
# Test operation size with various data types.
def test_operation_size_originate_munch_contract(self, client: Client):
contract = path.join(CONTRACT_PATH, 'opcodes', 'munch.tz')
client.remember('munch', contract)
client.typecheck(contract)
client.originate(
'munch', 1000, 'bootstrap1', contract, ['--burn-cap', '0.295']
)
utils.bake(client)
# Test that a large operation under 32KB can be injected in the node
# (variant using a lambda with deep nesting).
def test_operation_size_with_lambda_ok(self, client: Client):
# Each pair of braces is encoded on 5 bytes so this takes
# 5 * 6 * 1024 = 30 KB < 32KB
big_arg = ("{" * 6 * 1024) + ("}" * 6 * 1024)
client.transfer(
10,
'bootstrap1',
'munch',
['--arg', big_arg, "--entrypoint", "lambda"],
)
utils.bake(client)
# Test that a large operation over 32KB cannot be injected in the node,
# and the error is not a stack overflow
# (variant using a lambda with deep nesting).
def test_operation_size_with_lambda_fail(self, client: Client):
# Each pair of braces is encoded on 5 bytes so this takes
# 5 * 7 * 1024 = 35 KB > 32KB
big_arg = ("{" * 7 * 1024) + ("}" * 7 * 1024)
expected_error = "Oversized operation"
with assert_run_failure(expected_error):
client.transfer(
10,
'bootstrap1',
'munch',
['--arg', big_arg, "--entrypoint", "lambda"],
)
# Test that a large operation under 32KB can be injected in the node
# (variant using a long list).
def test_operation_size_with_list_ok(self, client: Client):
# Each element in the list takes 2 bytes so about 30KB in total
big_arg = "{" + ("0; " * 15 * 1024) + "}"
client.transfer(
10,
'bootstrap1',
'munch',
['--arg', big_arg, "--entrypoint", "list_nat"],
)
utils.bake(client)
def test_operation_size_with_list_syntax_error(self, client: Client):
# Each element in the list takes 2 bytes so about 30KB in total
big_arg = "{" + ("0; " * 15 * 1024) + "'foo;'" + "}"
expected_error = "transfer simulation failed"
with assert_run_failure(expected_error):
client.transfer(
10,
'bootstrap1',
'munch',
['--arg', big_arg, "--entrypoint", "list_nat"],
)
def test_operation_size_with_list_ill_typed(self, client: Client):
# Each element in the list takes 2 bytes so about 30KB in total
big_arg = "{" + ("0; " * 15 * 1024) + "Unit;" + "}"
expected_error = "transfer simulation failed"
with assert_run_failure(expected_error):
client.transfer(
10,
'bootstrap1',
'munch',
['--arg', big_arg, "--entrypoint", "list_nat"],
)
# Test that a large operation over 32KB cannot be injected in the node,
# and the error is not a stack overflow
# (variant using a long list).
def test_operation_size_with_list_fail(self, client: Client):
# Each element in the list takes 2 bytes so about 34KB in total
big_arg = "{" + ("0; " * 17 * 1024) + "}"
expected_error = "Oversized operation"
with assert_run_failure(expected_error):
client.transfer(
10,
'bootstrap1',
'munch',
['--arg', big_arg, "--entrypoint", "list_nat"],
)
# Test that a large operation under 32KB can be injected in the node
# (variant using a big nat).
def test_operation_size_with_nat_ok(self, client: Client):
# The encoding for nat uses a byte to encode 7 bits of the number
# so the size of 2 ** (7 * n) is about n bytes
big_arg = 2 ** (7 * 30 * 1024)
client.transfer(
10,
'bootstrap1',
'munch',
['--arg', f"{big_arg}", "--entrypoint", "nat"],
)
utils.bake(client)
# Test that a large operation over 32KB cannot be injected in the node,
# and the error is not a stack overflow
# (variant using a big nat).
def test_operation_size_with_nat_fail(self, client: Client):
# The encoding for nat uses a byte to encode 7 bits of the number
# so the size of 2 ** (7 * n) is about n bytes
big_arg = 2 ** (7 * 33 * 1024)
expected_error = "Oversized operation"
with assert_run_failure(expected_error):
client.transfer(
10,
'bootstrap1',
'munch',
['--arg', f"{big_arg}", "--entrypoint", "nat"],
)
![swh spinner](/static/img/swh-spinner.gif)
Computing file changes ...