trac-msb 0.2.4 → 0.2.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (239) hide show
  1. package/.dockerignore +16 -0
  2. package/.github/workflows/acceptance-tests.yml +7 -0
  3. package/.github/workflows/publish.yml +40 -0
  4. package/.github/workflows/{CI.yml → unit-tests.yml} +1 -1
  5. package/README.md +175 -50
  6. package/docker-compose.yml +16 -0
  7. package/dockerfile +41 -0
  8. package/docs/fee_distribution.md +89 -0
  9. package/msb.mjs +12 -14
  10. package/package.json +8 -4
  11. package/rpc/constants.mjs +4 -1
  12. package/rpc/handlers.mjs +109 -66
  13. package/rpc/routes/v1.mjs +3 -1
  14. package/rpc/rpc_services.js +126 -0
  15. package/rpc/utils/confirmedParameter.mjs +17 -0
  16. package/rpc/utils/url.mjs +38 -0
  17. package/src/core/network/Network.js +27 -10
  18. package/src/core/network/identity/NetworkWalletFactory.js +78 -0
  19. package/src/core/network/services/ConnectionManager.js +2 -2
  20. package/src/core/network/services/ValidatorObserverService.js +7 -4
  21. package/src/core/state/State.js +28 -22
  22. package/src/index.js +197 -385
  23. package/src/utils/cliCommands.js +280 -0
  24. package/src/utils/constants.js +3 -1
  25. package/tests/acceptance/v1/account/account.test.mjs +123 -0
  26. package/tests/acceptance/v1/balance/balance.test.mjs +55 -0
  27. package/tests/acceptance/v1/broadcast-transaction/broadcast-transaction.test.mjs +111 -0
  28. package/tests/acceptance/v1/confirmed-length/confirmed-length.test.mjs +19 -0
  29. package/tests/acceptance/v1/fee/fee.test.mjs +11 -0
  30. package/tests/acceptance/v1/rpc.test.mjs +62 -291
  31. package/tests/acceptance/v1/tx/tx.test.mjs +98 -0
  32. package/tests/acceptance/v1/tx-details/tx-details.test.mjs +195 -0
  33. package/tests/acceptance/v1/tx-hashes/tx-hashes.test.mjs +72 -0
  34. package/tests/acceptance/v1/tx-payloads-bulk/tx-payloads-bulk.test.mjs +27 -0
  35. package/tests/acceptance/v1/txv/txv.test.mjs +11 -0
  36. package/tests/acceptance/v1/unconfirmed-length/unconfirmed-length.test.mjs +11 -0
  37. package/tests/helpers/StateNetworkFactory.js +157 -0
  38. package/tests/helpers/autobaseTestHelpers.js +369 -0
  39. package/tests/helpers/createTestSignature.js +12 -0
  40. package/tests/helpers/transactionPayloads.mjs +78 -0
  41. package/tests/unit/network/NetworkWalletFactory.test.js +156 -0
  42. package/tests/unit/state/apply/addAdmin/addAdminHappyPathScenario.js +38 -0
  43. package/tests/unit/state/apply/addAdmin/addAdminScenarioHelpers.js +273 -0
  44. package/tests/unit/state/apply/addAdmin/adminEntryEncodingFailureScenario.js +30 -0
  45. package/tests/unit/state/apply/addAdmin/adminEntryExistsScenario.js +78 -0
  46. package/tests/unit/state/apply/addAdmin/nodeEntryInitializationFailureScenario.js +30 -0
  47. package/tests/unit/state/apply/addAdmin/nonBootstrapNodeScenario.js +68 -0
  48. package/tests/unit/state/apply/addAdmin/state.apply.addAdmin.test.js +155 -0
  49. package/tests/unit/state/apply/addIndexer/addIndexerHappyPathScenario.js +39 -0
  50. package/tests/unit/state/apply/addIndexer/addIndexerMultipleIndexersInTheNetworkScenario.js +167 -0
  51. package/tests/unit/state/apply/addIndexer/addIndexerPretenderAlreadyIndexerScenario.js +21 -0
  52. package/tests/unit/state/apply/addIndexer/addIndexerPretenderNotWriterScenario.js +21 -0
  53. package/tests/unit/state/apply/addIndexer/addIndexerRemoveAndReAddScenario.js +186 -0
  54. package/tests/unit/state/apply/addIndexer/addIndexerScenarioHelpers.js +445 -0
  55. package/tests/unit/state/apply/addIndexer/addIndexerWriterKeyAlreadyRegisteredScenario.js +32 -0
  56. package/tests/unit/state/apply/addIndexer/state.apply.addIndexer.test.js +297 -0
  57. package/tests/unit/state/apply/addWriter/addWriterHappyPathScenario.js +41 -0
  58. package/tests/unit/state/apply/addWriter/addWriterInvalidValidatorSignatureScenario.js +32 -0
  59. package/tests/unit/state/apply/addWriter/addWriterNewWkScenario.js +149 -0
  60. package/tests/unit/state/apply/addWriter/addWriterRequesterAlreadyWriterScenario.js +21 -0
  61. package/tests/unit/state/apply/addWriter/addWriterRequesterBalanceInsufficientScenario.js +21 -0
  62. package/tests/unit/state/apply/addWriter/addWriterRequesterEntryDecodeFailureScenario.js +19 -0
  63. package/tests/unit/state/apply/addWriter/addWriterRequesterEntryMissingScenario.js +19 -0
  64. package/tests/unit/state/apply/addWriter/addWriterRequesterIndexerScenario.js +21 -0
  65. package/tests/unit/state/apply/addWriter/addWriterRequesterNotWhitelistedScenario.js +21 -0
  66. package/tests/unit/state/apply/addWriter/addWriterScenarioHelpers.js +757 -0
  67. package/tests/unit/state/apply/addWriter/addWriterStakeBalanceUpdateFailureScenario.js +50 -0
  68. package/tests/unit/state/apply/addWriter/addWriterStakeInsufficientBalanceScenario.js +29 -0
  69. package/tests/unit/state/apply/addWriter/addWriterStakeInvalidBalanceScenario.js +29 -0
  70. package/tests/unit/state/apply/addWriter/addWriterStakeInvalidEntryScenario.js +21 -0
  71. package/tests/unit/state/apply/addWriter/addWriterStakeStakedBalanceFailureScenario.js +37 -0
  72. package/tests/unit/state/apply/addWriter/addWriterStakeSubtractFailureScenario.js +42 -0
  73. package/tests/unit/state/apply/addWriter/addWriterValidatorRewardScenario.js +105 -0
  74. package/tests/unit/state/apply/addWriter/addWriterWriterKeyMismatchScenario.js +54 -0
  75. package/tests/unit/state/apply/addWriter/addWriterWriterKeyOwnershipScenario.js +54 -0
  76. package/tests/unit/state/apply/addWriter/addWriterZeroWriterKeyScenario.js +29 -0
  77. package/tests/unit/state/apply/addWriter/state.apply.addWriter.test.js +309 -0
  78. package/tests/unit/state/apply/adminRecovery/adminRecoveryHappyPathScenario.js +30 -0
  79. package/tests/unit/state/apply/adminRecovery/adminRecoveryScenarioHelpers.js +866 -0
  80. package/tests/unit/state/apply/adminRecovery/state.apply.adminRecovery.test.js +439 -0
  81. package/tests/unit/state/apply/appendWhitelist/appendWhitelistBanAndReapplyScenario.js +78 -0
  82. package/tests/unit/state/apply/appendWhitelist/appendWhitelistExistingReaderHappyPathScenario.js +98 -0
  83. package/tests/unit/state/apply/appendWhitelist/appendWhitelistFeeAfterDisableScenario.js +66 -0
  84. package/tests/unit/state/apply/appendWhitelist/appendWhitelistHappyPathScenario.js +55 -0
  85. package/tests/unit/state/apply/appendWhitelist/appendWhitelistInsufficientAdminBalanceScenario.js +103 -0
  86. package/tests/unit/state/apply/appendWhitelist/appendWhitelistNodeAlreadyWhitelistedScenario.js +60 -0
  87. package/tests/unit/state/apply/appendWhitelist/appendWhitelistScenarioHelpers.js +191 -0
  88. package/tests/unit/state/apply/appendWhitelist/state.apply.appendWhitelist.test.js +220 -0
  89. package/tests/unit/state/apply/balanceInitialization/balanceInitializationHappyPathScenario.js +82 -0
  90. package/tests/unit/state/apply/balanceInitialization/balanceInitializationScenarioHelpers.js +106 -0
  91. package/tests/unit/state/apply/balanceInitialization/invalidAmountScenario.js +45 -0
  92. package/tests/unit/state/apply/balanceInitialization/nodeEntryBalanceUpdateFailureScenario.js +81 -0
  93. package/tests/unit/state/apply/balanceInitialization/state.apply.balanceInitialization.test.js +189 -0
  94. package/tests/unit/state/apply/banValidator/banValidatorBanAndReWhitelistScenario.js +155 -0
  95. package/tests/unit/state/apply/banValidator/banValidatorHappyPathScenario.js +36 -0
  96. package/tests/unit/state/apply/banValidator/banValidatorScenarioHelpers.js +534 -0
  97. package/tests/unit/state/apply/banValidator/banValidatorSequentialBansScenario.js +74 -0
  98. package/tests/unit/state/apply/banValidator/banValidatorTargetDecodeFailureScenario.js +19 -0
  99. package/tests/unit/state/apply/banValidator/banValidatorTargetIndexerScenario.js +32 -0
  100. package/tests/unit/state/apply/banValidator/banValidatorTargetNodeEntryMissingScenario.js +19 -0
  101. package/tests/unit/state/apply/banValidator/banValidatorTargetRoleUpdateFailureScenario.js +19 -0
  102. package/tests/unit/state/apply/banValidator/banValidatorWhitelistedNonWriterScenario.js +38 -0
  103. package/tests/unit/state/apply/banValidator/banValidatorWhitelistedZeroBalanceScenario.js +91 -0
  104. package/tests/unit/state/apply/banValidator/banValidatorWithdrawFailureScenario.js +19 -0
  105. package/tests/unit/state/apply/banValidator/state.apply.banValidator.test.js +266 -0
  106. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentDuplicateRegistrationScenario.js +142 -0
  107. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentHappyPathScenario.js +26 -0
  108. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentIncompleteOperationScenario.js +94 -0
  109. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentInvalidDeploymentEntryScenario.js +37 -0
  110. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentMultipleBootstrapScenario.js +86 -0
  111. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentScenarioHelpers.js +344 -0
  112. package/tests/unit/state/apply/bootstrapDeployment/invalidValidatorNodeEntryScenario.js +57 -0
  113. package/tests/unit/state/apply/bootstrapDeployment/state.apply.bootstrapDeployment.test.js +429 -0
  114. package/tests/unit/state/apply/common/access-control/adminConsistencyMismatchScenario.js +119 -0
  115. package/tests/unit/state/apply/common/access-control/adminEntryDecodeFailureScenario.js +130 -0
  116. package/tests/unit/state/apply/common/access-control/adminEntryExistsScenario.js +93 -0
  117. package/tests/unit/state/apply/common/access-control/adminEntryMissingScenario.js +108 -0
  118. package/tests/unit/state/apply/common/access-control/adminOnlyGuardScenario.js +126 -0
  119. package/tests/unit/state/apply/common/access-control/adminPublicKeyDecodeFailureScenario.js +120 -0
  120. package/tests/unit/state/apply/common/access-control/roleAccessOperationValidationScenario.js +50 -0
  121. package/tests/unit/state/apply/common/adminControlOperationValidationScenario.js +56 -0
  122. package/tests/unit/state/apply/common/balances/adminEntryUpdateFailureScenario.js +52 -0
  123. package/tests/unit/state/apply/common/balances/base/requesterBalanceScenarioBase.js +197 -0
  124. package/tests/unit/state/apply/common/balances/feeDecodeFailureScenario.js +52 -0
  125. package/tests/unit/state/apply/common/balances/requesterBalanceDecodeFailureScenario.js +15 -0
  126. package/tests/unit/state/apply/common/balances/requesterBalanceFeeApplicationFailureScenario.js +11 -0
  127. package/tests/unit/state/apply/common/balances/requesterBalanceInsufficientScenario.js +15 -0
  128. package/tests/unit/state/apply/common/balances/requesterBalanceUpdateFailureScenario.js +11 -0
  129. package/tests/unit/state/apply/common/balances/validatorEntryRewardFailureScenario.js +11 -0
  130. package/tests/unit/state/apply/common/balances/validatorEntryUpdateFailureScenario.js +11 -0
  131. package/tests/unit/state/apply/common/balances/validatorNodeEntryDecodeFailureScenario.js +40 -0
  132. package/tests/unit/state/apply/common/base/OperationValidationScenarioBase.js +114 -0
  133. package/tests/unit/state/apply/common/commonScenarioHelper.js +103 -0
  134. package/tests/unit/state/apply/common/indexer/indexerNodeEntryDecodeFailureScenario.js +36 -0
  135. package/tests/unit/state/apply/common/indexer/indexerNodeEntryMissingScenario.js +36 -0
  136. package/tests/unit/state/apply/common/indexer/indexerRoleUpdateFailureScenario.js +29 -0
  137. package/tests/unit/state/apply/common/indexer/indexerSequenceStateInvalidScenario.js +66 -0
  138. package/tests/unit/state/apply/common/invalidMessageComponentValidationScenario.js +84 -0
  139. package/tests/unit/state/apply/common/nodeEntryInitializationFailureScenario.js +47 -0
  140. package/tests/unit/state/apply/common/operationAlreadyAppliedScenario.js +85 -0
  141. package/tests/unit/state/apply/common/payload-structure/addressWithInvalidPublicKeyScenario.js +52 -0
  142. package/tests/unit/state/apply/common/payload-structure/initializationDisabledScenario.js +49 -0
  143. package/tests/unit/state/apply/common/payload-structure/invalidAddressValidationScenario.js +73 -0
  144. package/tests/unit/state/apply/common/payload-structure/invalidHashValidationScenario.js +71 -0
  145. package/tests/unit/state/apply/common/payload-structure/invalidPayloadValidationScenario.js +31 -0
  146. package/tests/unit/state/apply/common/payload-structure/invalidSignatureValidationScenario.js +142 -0
  147. package/tests/unit/state/apply/common/payload-structure/partialOperationValidationScenario.js +87 -0
  148. package/tests/unit/state/apply/common/requester/requesterNodeEntryBufferMissingScenario.js +70 -0
  149. package/tests/unit/state/apply/common/requester/requesterNodeEntryDecodeFailureScenario.js +72 -0
  150. package/tests/unit/state/apply/common/requester/requesterNodeEntryMissingScenario.js +36 -0
  151. package/tests/unit/state/apply/common/requesterAddressValidationScenario.js +44 -0
  152. package/tests/unit/state/apply/common/requesterPublicKeyValidationScenario.js +25 -0
  153. package/tests/unit/state/apply/common/transactionValidityMismatchScenario.js +98 -0
  154. package/tests/unit/state/apply/common/validatorConsistency/base/validatorConsistencyScenarioBase.js +201 -0
  155. package/tests/unit/state/apply/common/validatorConsistency/validatorEntryDecodeFailureScenario.js +17 -0
  156. package/tests/unit/state/apply/common/validatorConsistency/validatorEntryMissingScenario.js +44 -0
  157. package/tests/unit/state/apply/common/validatorConsistency/validatorInactiveScenario.js +19 -0
  158. package/tests/unit/state/apply/common/validatorConsistency/validatorWriterKeyMismatchScenario.js +18 -0
  159. package/tests/unit/state/apply/common/validatorEntryValidation/base/validatorEntryValidationScenarioBase.js +314 -0
  160. package/tests/unit/state/apply/common/validatorEntryValidation/validatorEntryInvalidBalanceScenario.js +18 -0
  161. package/tests/unit/state/apply/common/writerKeyExistsValidationScenario.js +43 -0
  162. package/tests/unit/state/apply/disableInitialization/disableInitializationAlreadyDisabledScenario.js +53 -0
  163. package/tests/unit/state/apply/disableInitialization/disableInitializationHappyPathScenario.js +24 -0
  164. package/tests/unit/state/apply/disableInitialization/disableInitializationScenarioHelpers.js +197 -0
  165. package/tests/unit/state/apply/disableInitialization/state.apply.disableInitialization.test.js +161 -0
  166. package/tests/unit/state/apply/missing-tests.md +18 -0
  167. package/tests/unit/state/apply/removeIndexer/removeIndexerHappyPathScenario.js +58 -0
  168. package/tests/unit/state/apply/removeIndexer/removeIndexerReAddAndRemoveAgainScenario.js +98 -0
  169. package/tests/unit/state/apply/removeIndexer/removeIndexerRemoveMultipleIndexersScenario.js +167 -0
  170. package/tests/unit/state/apply/removeIndexer/removeIndexerScenarioHelpers.js +428 -0
  171. package/tests/unit/state/apply/removeIndexer/removeIndexerTargetNotIndexerScenario.js +22 -0
  172. package/tests/unit/state/apply/removeIndexer/removeIndexerWriterKeyMissingScenario.js +20 -0
  173. package/tests/unit/state/apply/removeIndexer/state.apply.removeIndexer.test.js +291 -0
  174. package/tests/unit/state/apply/removeWriter/removeWriterAndAddWriterAgainScenario.js +87 -0
  175. package/tests/unit/state/apply/removeWriter/removeWriterHappyPathScenario.js +38 -0
  176. package/tests/unit/state/apply/removeWriter/removeWriterInvalidValidatorSignatureScenario.js +32 -0
  177. package/tests/unit/state/apply/removeWriter/removeWriterRequesterBalanceInsufficientScenario.js +21 -0
  178. package/tests/unit/state/apply/removeWriter/removeWriterRequesterEntryDecodeFailureScenario.js +19 -0
  179. package/tests/unit/state/apply/removeWriter/removeWriterRequesterEntryMissingScenario.js +19 -0
  180. package/tests/unit/state/apply/removeWriter/removeWriterRequesterIndexerScenario.js +21 -0
  181. package/tests/unit/state/apply/removeWriter/removeWriterRequesterNotWriterScenario.js +21 -0
  182. package/tests/unit/state/apply/removeWriter/removeWriterRequesterRoleUpdateFailureScenario.js +19 -0
  183. package/tests/unit/state/apply/removeWriter/removeWriterScenarioHelpers.js +344 -0
  184. package/tests/unit/state/apply/removeWriter/removeWriterThroughWriterValidatorScenario.js +113 -0
  185. package/tests/unit/state/apply/removeWriter/removeWriterUnstakeFailureScenario.js +33 -0
  186. package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyMismatchScenario.js +21 -0
  187. package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyOwnershipScenario.js +26 -0
  188. package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyRegistryMissingScenario.js +22 -0
  189. package/tests/unit/state/apply/removeWriter/state.apply.removeWriter.test.js +307 -0
  190. package/tests/unit/state/apply/state.apply.test.js +24 -0
  191. package/tests/unit/state/apply/transfer/state.apply.transfer.test.js +819 -0
  192. package/tests/unit/state/apply/transfer/transferContractSchemaValidationScenario.js +22 -0
  193. package/tests/unit/state/apply/transfer/transferDoubleSpendAcrossValidatorsScenario.js +137 -0
  194. package/tests/unit/state/apply/transfer/transferDoubleSpendSameBatchScenario.js +63 -0
  195. package/tests/unit/state/apply/transfer/transferDoubleSpendSingleValidatorScenario.js +67 -0
  196. package/tests/unit/state/apply/transfer/transferExistingRecipientAmountScenario.js +31 -0
  197. package/tests/unit/state/apply/transfer/transferExistingRecipientZeroAmountScenario.js +31 -0
  198. package/tests/unit/state/apply/transfer/transferHandlerGuardScenarios.js +22 -0
  199. package/tests/unit/state/apply/transfer/transferHappyPathScenario.js +8 -0
  200. package/tests/unit/state/apply/transfer/transferInvalidIncomingDataScenario.js +66 -0
  201. package/tests/unit/state/apply/transfer/transferNewRecipientAmountScenario.js +31 -0
  202. package/tests/unit/state/apply/transfer/transferNewRecipientZeroAmountScenario.js +31 -0
  203. package/tests/unit/state/apply/transfer/transferScenarioHelpers.js +1167 -0
  204. package/tests/unit/state/apply/transfer/transferSelfTransferAmountScenario.js +38 -0
  205. package/tests/unit/state/apply/transfer/transferSelfTransferZeroAmountScenario.js +38 -0
  206. package/tests/unit/state/apply/transfer/transferValidatorRecipientAmountScenario.js +38 -0
  207. package/tests/unit/state/apply/transfer/transferValidatorRecipientZeroAmountScenario.js +38 -0
  208. package/tests/unit/state/apply/txOperation/state.apply.txOperation.test.js +318 -0
  209. package/tests/unit/state/apply/txOperation/txOperationBootstrapNotRegisteredScenario.js +70 -0
  210. package/tests/unit/state/apply/txOperation/txOperationDifferentValidatorCreatorHappyPathScenario.js +23 -0
  211. package/tests/unit/state/apply/txOperation/txOperationInvalidDeploymentEntryScenario.js +48 -0
  212. package/tests/unit/state/apply/txOperation/txOperationInvalidFeeAmountScenario.js +39 -0
  213. package/tests/unit/state/apply/txOperation/txOperationInvalidSubnetCreatorAddressScenario.js +46 -0
  214. package/tests/unit/state/apply/txOperation/txOperationRequesterCreatorHappyPathScenario.js +21 -0
  215. package/tests/unit/state/apply/txOperation/txOperationScenarioHelpers.js +429 -0
  216. package/tests/unit/state/apply/txOperation/txOperationStandardHappyPathScenario.js +21 -0
  217. package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddCreatorBalanceFailureScenario.js +26 -0
  218. package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddValidatorBalanceFailureScenario.js +25 -0
  219. package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddValidatorBonusFailureScenario.js +27 -0
  220. package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeCreatorEntryScenario.js +18 -0
  221. package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeRequesterEntryScenario.js +17 -0
  222. package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeValidatorEntryScenario.js +31 -0
  223. package/tests/unit/state/apply/txOperation/txOperationTransferFeeGuardBypassScenario.js +49 -0
  224. package/tests/unit/state/apply/txOperation/txOperationTransferFeeGuardScenarioFactory.js +92 -0
  225. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInsufficientRequesterBalanceScenario.js +28 -0
  226. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidCreatorBalanceScenario.js +29 -0
  227. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidRequesterBalanceScenario.js +28 -0
  228. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidRequesterEntryScenario.js +17 -0
  229. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidValidatorBalanceScenario.js +33 -0
  230. package/tests/unit/state/apply/txOperation/txOperationTransferFeeMissingCreatorEntryScenario.js +18 -0
  231. package/tests/unit/state/apply/txOperation/txOperationTransferFeeSubtractFailureScenario.js +25 -0
  232. package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateCreatorBalanceFailureScenario.js +26 -0
  233. package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateFailureScenario.js +25 -0
  234. package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateValidatorBalanceFailureScenario.js +26 -0
  235. package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateValidatorBonusFailureScenario.js +27 -0
  236. package/tests/unit/state/apply/txOperation/txOperationValidatorCreatorHappyPathScenario.js +21 -0
  237. package/tests/unit/state/stateModule.test.js +1 -0
  238. package/tests/unit/state/stateTestUtils.js +5 -1
  239. package/.env +0 -3
@@ -0,0 +1,439 @@
1
+ import b4a from 'b4a';
2
+ import adminRecoveryHappyPathScenario from './adminRecoveryHappyPathScenario.js';
3
+ import {
4
+ setupAdminRecoveryScenario,
5
+ buildAdminRecoveryPayload,
6
+ assertAdminRecoveryFailureState,
7
+ assertAdminRecoverySuccessState,
8
+ applyAdminRecoveryViaValidator,
9
+ buildAdminRecoveryPayloadWithTxValidity,
10
+ applyWithMissingComponentBypass,
11
+ applyWithRoleAccessBypass,
12
+ applyWithRegisteredWriterKey,
13
+ applyWithIndexerSequenceFailure,
14
+ applyWithIndexerSequenceCorruption,
15
+ applyWithAdminEntryMutation,
16
+ applyWithAdminNodeEntryMutation,
17
+ cloneIndexers,
18
+ applyWithAdminEncodeFailure,
19
+ applyWithAdminBalanceDecodeFailure,
20
+ applyWithInvalidRequesterMessage,
21
+ applyWithInvalidValidatorMessage,
22
+ applyWithValidatorBalanceUpdateFailure,
23
+ applyWithAdminInsufficientBalance,
24
+ applyWithAdminFeeSubtractionFailure,
25
+ applyWithValidatorNodeDecodeFailure,
26
+ applyWithValidatorBalanceDecodeFailure,
27
+ applyWithValidatorFeeTransferFailure,
28
+ applyWithDuplicateOperation,
29
+ applyWithOldWriterKeyMissing,
30
+ applyWithNewWriterKeyPresent,
31
+ applyWithAdminNodeDecodeFailure
32
+ } from './adminRecoveryScenarioHelpers.js';
33
+ import RoleAccessOperationValidationScenario from '../common/access-control/roleAccessOperationValidationScenario.js';
34
+ import PartialOperationValidationScenario, {
35
+ PartialOperationMutationStrategy
36
+ } from '../common/payload-structure/partialOperationValidationScenario.js';
37
+ import RequesterAddressValidationScenario from '../common/requesterAddressValidationScenario.js';
38
+ import createRequesterPublicKeyValidationScenario from '../common/requesterPublicKeyValidationScenario.js';
39
+ import InvalidHashValidationScenario from '../common/payload-structure/invalidHashValidationScenario.js';
40
+ import OperationValidationScenarioBase from '../common/base/OperationValidationScenarioBase.js';
41
+ import { safeDecodeApplyOperation, safeEncodeApplyOperation } from '../../../../../src/utils/protobuf/operationHelpers.js';
42
+ import InvalidAddressValidationScenario from '../common/payload-structure/invalidAddressValidationScenario.js';
43
+ import createAddressWithInvalidPublicKeyScenario from '../common/payload-structure/addressWithInvalidPublicKeyScenario.js';
44
+ import TransactionValidityMismatchScenario from '../common/transactionValidityMismatchScenario.js';
45
+ import IndexerSequenceStateInvalidScenario from '../common/indexer/indexerSequenceStateInvalidScenario.js';
46
+ import ValidatorInactiveScenario from '../common/validatorConsistency/validatorInactiveScenario.js';
47
+ import ValidatorEntryDecodeFailureScenario from '../common/validatorConsistency/validatorEntryDecodeFailureScenario.js';
48
+ import ValidatorWriterKeyMismatchScenario from '../common/validatorConsistency/validatorWriterKeyMismatchScenario.js';
49
+ import ValidatorConsistencyScenarioBase, {
50
+ ValidatorEntryMutation
51
+ } from '../common/validatorConsistency/base/validatorConsistencyScenarioBase.js';
52
+ import adminEntryUtils from '../../../../../src/core/state/utils/adminEntry.js';
53
+ import addressUtils from '../../../../../src/core/state/utils/address.js';
54
+ import nodeEntryUtils from '../../../../../src/core/state/utils/nodeEntry.js';
55
+
56
+ adminRecoveryHappyPathScenario();
57
+
58
+ new RoleAccessOperationValidationScenario({
59
+ title: 'State.apply adminRecovery rejects payloads when contract validation fails',
60
+ setupScenario: setupAdminRecoveryScenario,
61
+ buildValidPayload: buildAdminRecoveryPayload,
62
+ assertStateUnchanged: assertAdminRecoveryFailureState,
63
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
64
+ expectedLogs: ['Contract schema validation failed.']
65
+ }).performScenario();
66
+
67
+ new PartialOperationValidationScenario({
68
+ title: 'State.apply adminRecovery rejects incomplete validator co-signatures',
69
+ setupScenario: setupAdminRecoveryScenario,
70
+ buildValidPayload: buildAdminRecoveryPayload,
71
+ assertStateUnchanged: assertAdminRecoveryFailureState,
72
+ strategy: PartialOperationMutationStrategy.MISSING_COMPONENT,
73
+ parentKey: 'rao',
74
+ applyInvalidPayload: applyWithMissingComponentBypass,
75
+ expectedLogs: ['Operation is not complete.']
76
+ }).performScenario();
77
+
78
+ new PartialOperationValidationScenario({
79
+ title: 'State.apply adminRecovery rejects payloads when nonces match',
80
+ setupScenario: setupAdminRecoveryScenario,
81
+ buildValidPayload: buildAdminRecoveryPayload,
82
+ assertStateUnchanged: assertAdminRecoveryFailureState,
83
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
84
+ strategy: PartialOperationMutationStrategy.NONCE_MATCH,
85
+ parentKey: 'rao',
86
+ expectedLogs: ['Nonces should not be the same.']
87
+ }).performScenario();
88
+
89
+ new PartialOperationValidationScenario({
90
+ title: 'State.apply adminRecovery rejects payloads when validator shares requester address',
91
+ setupScenario: setupAdminRecoveryScenario,
92
+ buildValidPayload: buildAdminRecoveryPayload,
93
+ assertStateUnchanged: assertAdminRecoveryFailureState,
94
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
95
+ strategy: PartialOperationMutationStrategy.ADDRESS_MATCH,
96
+ parentKey: 'rao',
97
+ expectedLogs: ['Addresses should be different.']
98
+ }).performScenario();
99
+
100
+ new PartialOperationValidationScenario({
101
+ title: 'State.apply adminRecovery rejects payloads when signatures duplicate',
102
+ setupScenario: setupAdminRecoveryScenario,
103
+ buildValidPayload: buildAdminRecoveryPayload,
104
+ assertStateUnchanged: assertAdminRecoveryFailureState,
105
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
106
+ strategy: PartialOperationMutationStrategy.SIGNATURE_MATCH,
107
+ parentKey: 'rao',
108
+ expectedLogs: ['Signatures should be different.']
109
+ }).performScenario();
110
+
111
+ new RequesterAddressValidationScenario({
112
+ title: 'State.apply adminRecovery rejects invalid requester address',
113
+ setupScenario: setupAdminRecoveryScenario,
114
+ buildValidPayload: buildAdminRecoveryPayload,
115
+ assertStateUnchanged: assertAdminRecoveryFailureState,
116
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
117
+ expectedLogs: ['Requester address is invalid.']
118
+ }).performScenario();
119
+
120
+ createRequesterPublicKeyValidationScenario({
121
+ title: 'State.apply adminRecovery rejects requester public key decode failures',
122
+ setupScenario: setupAdminRecoveryScenario,
123
+ buildValidPayload: buildAdminRecoveryPayload,
124
+ assertStateUnchanged: assertAdminRecoveryFailureState,
125
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
126
+ expectedLogs: ['Error while decoding requester public key.']
127
+ }).performScenario();
128
+
129
+ new OperationValidationScenarioBase({
130
+ title: 'State.apply adminRecovery rejects invalid requester messages',
131
+ setupScenario: setupAdminRecoveryScenario,
132
+ buildValidPayload: buildAdminRecoveryPayload,
133
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
134
+ mutatePayload: (_t, payload) => payload,
135
+ applyInvalidPayload: async (context, invalidPayload) =>
136
+ applyWithInvalidRequesterMessage(context, invalidPayload),
137
+ expectedLogs: ['Invalid requester message.']
138
+ }).performScenario();
139
+
140
+ new InvalidHashValidationScenario({
141
+ title: 'State.apply adminRecovery rejects requester message hash mismatch',
142
+ setupScenario: setupAdminRecoveryScenario,
143
+ buildValidPayload: buildAdminRecoveryPayload,
144
+ assertStateUnchanged: assertAdminRecoveryFailureState,
145
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
146
+ expectedLogs: ['Message hash does not match the tx_hash.']
147
+ }).performScenario();
148
+
149
+ new OperationValidationScenarioBase({
150
+ title: 'State.apply adminRecovery rejects requester signature verification failures',
151
+ setupScenario: setupAdminRecoveryScenario,
152
+ buildValidPayload: buildAdminRecoveryPayload,
153
+ assertStateUnchanged: assertAdminRecoveryFailureState,
154
+ mutatePayload: (t, payload) => {
155
+ const decoded = safeDecodeApplyOperation(payload);
156
+ t.ok(decoded, 'fixtures decode');
157
+ if (decoded?.rao?.is) {
158
+ decoded.rao.is = b4a.alloc(decoded.rao.is.length);
159
+ }
160
+ return safeEncodeApplyOperation(decoded);
161
+ },
162
+ applyInvalidPayload: async (context, invalidPayload) => applyWithRoleAccessBypass(context, invalidPayload),
163
+ expectedLogs: ['Failed to verify requester message signature.']
164
+ }).performScenario();
165
+
166
+ new InvalidAddressValidationScenario({
167
+ title: 'State.apply adminRecovery rejects invalid validator address',
168
+ setupScenario: setupAdminRecoveryScenario,
169
+ buildValidPayload: buildAdminRecoveryPayload,
170
+ assertStateUnchanged: assertAdminRecoveryFailureState,
171
+ addressPath: ['rao', 'va'],
172
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
173
+ expectedLogs: ['Failed to validate validator address.']
174
+ }).performScenario();
175
+
176
+ createAddressWithInvalidPublicKeyScenario({
177
+ title: 'State.apply adminRecovery rejects validator public key decode failures',
178
+ setupScenario: setupAdminRecoveryScenario,
179
+ buildValidPayload: buildAdminRecoveryPayload,
180
+ assertStateUnchanged: assertAdminRecoveryFailureState,
181
+ addressPath: ['rao', 'va'],
182
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
183
+ expectedLogs: ['Failed to decode validator public key.']
184
+ }).performScenario();
185
+
186
+ new OperationValidationScenarioBase({
187
+ title: 'State.apply adminRecovery rejects invalid validator messages',
188
+ setupScenario: setupAdminRecoveryScenario,
189
+ buildValidPayload: buildAdminRecoveryPayload,
190
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
191
+ mutatePayload: (_t, payload) => payload,
192
+ applyInvalidPayload: async (context, invalidPayload) =>
193
+ applyWithInvalidValidatorMessage(context, invalidPayload),
194
+ expectedLogs: ['Failed to verify validator message signature.']
195
+ }).performScenario();
196
+
197
+ new OperationValidationScenarioBase({
198
+ title: 'State.apply adminRecovery rejects validator signature verification failures',
199
+ setupScenario: setupAdminRecoveryScenario,
200
+ buildValidPayload: buildAdminRecoveryPayload,
201
+ assertStateUnchanged: assertAdminRecoveryFailureState,
202
+ mutatePayload: (t, payload) => {
203
+ const decoded = safeDecodeApplyOperation(payload);
204
+ t.ok(decoded, 'fixtures decode');
205
+ if (decoded?.rao?.vs) {
206
+ decoded.rao.vs = b4a.alloc(decoded.rao.vs.length);
207
+ }
208
+ return safeEncodeApplyOperation(decoded);
209
+ },
210
+ applyInvalidPayload: async (context, invalidPayload) => applyWithRoleAccessBypass(context, invalidPayload),
211
+ expectedLogs: ['Failed to verify message signature.']
212
+ }).performScenario();
213
+
214
+ new OperationValidationScenarioBase({
215
+ title: 'State.apply adminRecovery rejects payloads when writer key already exists',
216
+ setupScenario: setupAdminRecoveryScenario,
217
+ buildValidPayload: buildAdminRecoveryPayload,
218
+ assertStateUnchanged: (t, context) =>
219
+ assertAdminRecoveryFailureState(t, context, { skipSync: true }),
220
+ mutatePayload: (_t, payload) => payload,
221
+ applyInvalidPayload: async (context, invalidPayload) => applyWithRegisteredWriterKey(context, invalidPayload),
222
+ expectedLogs: ['Writer key already exists.']
223
+ }).performScenario();
224
+
225
+ new IndexerSequenceStateInvalidScenario({
226
+ title: 'State.apply adminRecovery rejects when indexer sequence state is invalid',
227
+ setupScenario: setupAdminRecoveryScenario,
228
+ buildValidPayload: buildAdminRecoveryPayload,
229
+ assertStateUnchanged: (t, context, validPayload, invalidPayload) =>
230
+ assertAdminRecoveryFailureState(t, context, { skipSync: true }),
231
+ applyInvalidPayload: applyWithIndexerSequenceFailure,
232
+ expectedLogs: ['Indexer sequence state is invalid.']
233
+ }).performScenario();
234
+
235
+ new TransactionValidityMismatchScenario({
236
+ title: 'State.apply adminRecovery rejects payloads when tx validity mismatches indexer state',
237
+ setupScenario: setupAdminRecoveryScenario,
238
+ buildValidPayload: buildAdminRecoveryPayload,
239
+ assertStateUnchanged: assertAdminRecoveryFailureState,
240
+ txValidityPath: ['rao', 'txv'],
241
+ rebuildPayloadWithTxValidity: ({ context, mutatedTxValidity }) =>
242
+ buildAdminRecoveryPayloadWithTxValidity(context, mutatedTxValidity),
243
+ applyInvalidPayload: applyAdminRecoveryViaValidator,
244
+ expectedLogs: ['Transaction was not executed.']
245
+ }).performScenario();
246
+
247
+ new ValidatorInactiveScenario({
248
+ title: 'State.apply adminRecovery rejects inconsistent validator entries',
249
+ setupScenario: setupAdminRecoveryScenario,
250
+ buildValidPayload: buildAdminRecoveryPayload,
251
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
252
+ selectNode: context => context.adminRecovery.validatorPeer1,
253
+ expectedLogs: [{ anyOf: ['Validator consistency check failed.', 'Operation validator is not active'] }]
254
+ }).performScenario();
255
+
256
+ new ValidatorConsistencyScenarioBase({
257
+ title: 'State.apply adminRecovery rejects when validator entry is missing',
258
+ setupScenario: setupAdminRecoveryScenario,
259
+ buildValidPayload: buildAdminRecoveryPayload,
260
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
261
+ mutateEntry: () => ValidatorEntryMutation.DELETE,
262
+ selectNode: context => context.adminRecovery.validatorPeer1,
263
+ expectedLogs: ['Incoming validator entry is null.']
264
+ }).performScenario();
265
+
266
+ new ValidatorEntryDecodeFailureScenario({
267
+ title: 'State.apply adminRecovery rejects when validator entry cannot be decoded',
268
+ setupScenario: setupAdminRecoveryScenario,
269
+ buildValidPayload: buildAdminRecoveryPayload,
270
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
271
+ selectNode: context => context.adminRecovery.validatorPeer1
272
+ }).performScenario();
273
+
274
+ new ValidatorWriterKeyMismatchScenario({
275
+ title: 'State.apply adminRecovery rejects when validator writer key mismatches requester',
276
+ setupScenario: setupAdminRecoveryScenario,
277
+ buildValidPayload: buildAdminRecoveryPayload,
278
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
279
+ selectNode: context => context.adminRecovery.validatorPeer1,
280
+ expectedLogs: ['Validator cannot be the same as requester.']
281
+ }).performScenario();
282
+
283
+ new OperationValidationScenarioBase({
284
+ title: 'State.apply adminRecovery rejects when admin entry cannot be decoded',
285
+ setupScenario: setupAdminRecoveryScenario,
286
+ buildValidPayload: buildAdminRecoveryPayload,
287
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
288
+ mutatePayload: (_t, payload) => payload,
289
+ applyInvalidPayload: async (context, invalidPayload) =>
290
+ applyWithAdminEntryMutation(context, invalidPayload, () => ({ value: b4a.alloc(1) })),
291
+ expectedLogs: ['Failed to decode admin entry.']
292
+ }).performScenario();
293
+
294
+ new OperationValidationScenarioBase({
295
+ title: 'State.apply adminRecovery rejects when admin public key mismatches node key',
296
+ setupScenario: setupAdminRecoveryScenario,
297
+ buildValidPayload: buildAdminRecoveryPayload,
298
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
299
+ mutatePayload: (_t, payload) => payload,
300
+ applyInvalidPayload: async (context, invalidPayload) => {
301
+ const otherAddress = context.adminRecovery.validatorPeer2.wallet.address;
302
+ const otherAddressBuffer = addressUtils.addressToBuffer(otherAddress);
303
+ const mutatedEntry = adminEntryUtils.encode(otherAddressBuffer, context.adminRecovery.oldAdminWriterKey);
304
+ return applyWithAdminEntryMutation(context, invalidPayload, () => ({ value: mutatedEntry }));
305
+ },
306
+ expectedLogs: ['Admin public key does not match the node public key.']
307
+ }).performScenario();
308
+
309
+ new OperationValidationScenarioBase({
310
+ title: 'State.apply adminRecovery rejects when admin entry encoding fails',
311
+ setupScenario: setupAdminRecoveryScenario,
312
+ buildValidPayload: buildAdminRecoveryPayload,
313
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
314
+ mutatePayload: (_t, payload) => payload,
315
+ applyInvalidPayload: async (context, invalidPayload) =>
316
+ applyWithAdminEncodeFailure(context, invalidPayload),
317
+ expectedLogs: ['Invalid admin entry.']
318
+ }).performScenario();
319
+
320
+ new OperationValidationScenarioBase({
321
+ title: 'State.apply adminRecovery rejects when admin balance cannot be decoded',
322
+ setupScenario: setupAdminRecoveryScenario,
323
+ buildValidPayload: buildAdminRecoveryPayload,
324
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
325
+ mutatePayload: (_t, payload) => payload,
326
+ applyInvalidPayload: async (context, invalidPayload) =>
327
+ applyWithAdminBalanceDecodeFailure(context, invalidPayload),
328
+ expectedLogs: ['Invalid admin balance.']
329
+ }).performScenario();
330
+
331
+ new OperationValidationScenarioBase({
332
+ title: 'State.apply adminRecovery rejects when admin balance is insufficient',
333
+ setupScenario: setupAdminRecoveryScenario,
334
+ buildValidPayload: buildAdminRecoveryPayload,
335
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
336
+ mutatePayload: (_t, payload) => payload,
337
+ applyInvalidPayload: async (context, invalidPayload) =>
338
+ applyWithAdminInsufficientBalance(context, invalidPayload),
339
+ expectedLogs: ['Insufficient admin balance.']
340
+ }).performScenario();
341
+
342
+ new OperationValidationScenarioBase({
343
+ title: 'State.apply adminRecovery rejects when admin fee deduction fails',
344
+ setupScenario: setupAdminRecoveryScenario,
345
+ buildValidPayload: buildAdminRecoveryPayload,
346
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
347
+ mutatePayload: (_t, payload) => payload,
348
+ applyInvalidPayload: async (context, invalidPayload) =>
349
+ applyWithAdminFeeSubtractionFailure(context, invalidPayload),
350
+ expectedLogs: ['Failed to apply fee.']
351
+ }).performScenario();
352
+
353
+ new OperationValidationScenarioBase({
354
+ title: 'State.apply adminRecovery rejects when validator node entry cannot be decoded after validation',
355
+ setupScenario: setupAdminRecoveryScenario,
356
+ buildValidPayload: buildAdminRecoveryPayload,
357
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
358
+ mutatePayload: (_t, payload) => payload,
359
+ applyInvalidPayload: async (context, invalidPayload) =>
360
+ applyWithValidatorNodeDecodeFailure(context, invalidPayload),
361
+ expectedLogs: ['Invalid validator node entry.']
362
+ }).performScenario();
363
+
364
+ new OperationValidationScenarioBase({
365
+ title: 'State.apply adminRecovery rejects when validator balance cannot be decoded',
366
+ setupScenario: setupAdminRecoveryScenario,
367
+ buildValidPayload: buildAdminRecoveryPayload,
368
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
369
+ mutatePayload: (_t, payload) => payload,
370
+ applyInvalidPayload: async (context, invalidPayload) =>
371
+ applyWithValidatorBalanceDecodeFailure(context, invalidPayload),
372
+ expectedLogs: ['Invalid validator balance.']
373
+ }).performScenario();
374
+
375
+ new OperationValidationScenarioBase({
376
+ title: 'State.apply adminRecovery rejects when validator fee transfer fails',
377
+ setupScenario: setupAdminRecoveryScenario,
378
+ buildValidPayload: buildAdminRecoveryPayload,
379
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
380
+ mutatePayload: (_t, payload) => payload,
381
+ applyInvalidPayload: async (context, invalidPayload) =>
382
+ applyWithValidatorFeeTransferFailure(context, invalidPayload),
383
+ expectedLogs: ['Failed to transfer fee to validator.']
384
+ }).performScenario();
385
+
386
+ new OperationValidationScenarioBase({
387
+ title: 'State.apply adminRecovery rejects when validator balance update fails',
388
+ setupScenario: setupAdminRecoveryScenario,
389
+ buildValidPayload: buildAdminRecoveryPayload,
390
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
391
+ mutatePayload: (_t, payload) => payload,
392
+ applyInvalidPayload: async (context, invalidPayload) =>
393
+ applyWithValidatorBalanceUpdateFailure(context, invalidPayload),
394
+ expectedLogs: ['Failed to update validator balance.']
395
+ }).performScenario();
396
+
397
+ new OperationValidationScenarioBase({
398
+ title: 'State.apply adminRecovery rejects duplicate operations',
399
+ setupScenario: setupAdminRecoveryScenario,
400
+ buildValidPayload: buildAdminRecoveryPayload,
401
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
402
+ mutatePayload: (_t, payload) => payload,
403
+ applyInvalidPayload: async (context, invalidPayload) =>
404
+ applyWithDuplicateOperation(context, invalidPayload),
405
+ expectedLogs: ['Operation has already been applied.']
406
+ }).performScenario();
407
+
408
+ new OperationValidationScenarioBase({
409
+ title: 'State.apply adminRecovery rejects when old writer key is absent in indexer list',
410
+ setupScenario: setupAdminRecoveryScenario,
411
+ buildValidPayload: buildAdminRecoveryPayload,
412
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
413
+ mutatePayload: (_t, payload) => payload,
414
+ applyInvalidPayload: async (context, invalidPayload) =>
415
+ applyWithOldWriterKeyMissing(context, invalidPayload),
416
+ expectedLogs: ['Old writer key is not in indexer list.']
417
+ }).performScenario();
418
+
419
+ new OperationValidationScenarioBase({
420
+ title: 'State.apply adminRecovery rejects when new writer key already sits in indexer list',
421
+ setupScenario: setupAdminRecoveryScenario,
422
+ buildValidPayload: buildAdminRecoveryPayload,
423
+ assertStateUnchanged: (t, context) => assertAdminRecoveryFailureState(t, context, { skipSync: true }),
424
+ mutatePayload: (_t, payload) => payload,
425
+ applyInvalidPayload: async (context, invalidPayload) =>
426
+ applyWithNewWriterKeyPresent(context, invalidPayload),
427
+ expectedLogs: ['New writer key is already in indexer list.']
428
+ }).performScenario();
429
+
430
+ new OperationValidationScenarioBase({
431
+ title: 'State.apply adminRecovery rejects when admin node entry cannot be decoded after writing key update',
432
+ setupScenario: setupAdminRecoveryScenario,
433
+ buildValidPayload: buildAdminRecoveryPayload,
434
+ assertStateUnchanged: async t => t.pass('state unchanged check skipped for decode failure'),
435
+ mutatePayload: (_t, payload) => payload,
436
+ applyInvalidPayload: async (context, invalidPayload) =>
437
+ applyWithAdminNodeDecodeFailure(context, invalidPayload),
438
+ expectedLogs: ['Failed to decode node entry.']
439
+ }).performScenario();
@@ -0,0 +1,78 @@
1
+ import { test } from 'brittle';
2
+ import b4a from 'b4a';
3
+ import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
4
+ import nodeEntryUtils from '../../../../../src/core/state/utils/nodeEntry.js';
5
+ import setupAppendWhitelistScenario, {
6
+ buildAppendWhitelistPayload,
7
+ buildBanWriterPayload,
8
+ selectReaderPeer,
9
+ assertReaderWhitelisted
10
+ } from './appendWhitelistScenarioHelpers.js';
11
+
12
+ export default function appendWhitelistBanAndReapplyScenario() {
13
+ test('State.apply appendWhitelist re-applies whitelisted role after ban without reallocating license', async t => {
14
+ const context = await setupAppendWhitelistScenario(t);
15
+ const adminNode = context.adminBootstrap;
16
+ const readerPeer = selectReaderPeer(context);
17
+
18
+ const initialWhitelistPayload = await buildAppendWhitelistPayload(
19
+ context,
20
+ readerPeer.wallet.address
21
+ );
22
+ await adminNode.base.append(initialWhitelistPayload);
23
+ await adminNode.base.update();
24
+ await eventFlush();
25
+
26
+ const { decodedEntry: initialWhitelistedEntry } = await assertReaderWhitelisted(
27
+ t,
28
+ adminNode.base,
29
+ readerPeer.wallet.address,
30
+ { expectedLicenseCount: 2 }
31
+ );
32
+ const initialLicenseBuffer = b4a.from(initialWhitelistedEntry.license);
33
+
34
+ const banPayload = await buildBanWriterPayload(context, readerPeer.wallet.address);
35
+ await adminNode.base.append(banPayload);
36
+ await adminNode.base.update();
37
+ await eventFlush();
38
+
39
+ const readerEntryAfterBan = await adminNode.base.view.get(readerPeer.wallet.address);
40
+ t.ok(readerEntryAfterBan, 'reader entry persists after ban');
41
+ const decodedAfterBan = nodeEntryUtils.decode(readerEntryAfterBan.value);
42
+ t.ok(decodedAfterBan, 'reader entry decodes after ban');
43
+ t.is(decodedAfterBan.isWhitelisted, false, 'reader un-whitelisted after ban');
44
+ t.is(decodedAfterBan.isWriter, false, 'reader writer flag cleared after ban');
45
+ t.ok(
46
+ b4a.equals(decodedAfterBan.license, initialLicenseBuffer),
47
+ 'license retained after ban'
48
+ );
49
+
50
+ const reapplyWhitelistPayload = await buildAppendWhitelistPayload(
51
+ context,
52
+ readerPeer.wallet.address
53
+ );
54
+ await adminNode.base.append(reapplyWhitelistPayload);
55
+ await adminNode.base.update();
56
+ await eventFlush();
57
+
58
+ const { decodedEntry: rewhitelistedEntry } = await assertReaderWhitelisted(
59
+ t,
60
+ adminNode.base,
61
+ readerPeer.wallet.address,
62
+ { expectedLicenseCount: 2 }
63
+ );
64
+ t.ok(
65
+ b4a.equals(rewhitelistedEntry.license, initialLicenseBuffer),
66
+ 'license reused when reader re-whitelisted'
67
+ );
68
+
69
+ await context.sync();
70
+
71
+ const syncedEntry = await readerPeer.base.view.get(readerPeer.wallet.address);
72
+ t.ok(syncedEntry, 'reader entry replicated on peer');
73
+ const decodedSyncedEntry = nodeEntryUtils.decode(syncedEntry.value);
74
+ t.ok(decodedSyncedEntry, 'replicated entry decodes');
75
+ t.is(decodedSyncedEntry.isWhitelisted, true, 'reader flagged as whitelisted after reapply');
76
+ t.ok(b4a.equals(decodedSyncedEntry.license, initialLicenseBuffer),'license stable across ban/reapply cycle');
77
+ });
78
+ }
@@ -0,0 +1,98 @@
1
+ import { test } from 'brittle';
2
+ import b4a from 'b4a';
3
+ import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
4
+ import nodeEntryUtils, { ZERO_LICENSE } from '../../../../../src/core/state/utils/nodeEntry.js';
5
+ import { toTerm } from '../../../../../src/core/state/utils/balance.js';
6
+ import { safeDecodeApplyOperation } from '../../../../../src/utils/protobuf/operationHelpers.js';
7
+ import setupAppendWhitelistScenario, {
8
+ buildAppendWhitelistPayload,
9
+ selectReaderPeer,
10
+ assertReaderWhitelisted
11
+ } from './appendWhitelistScenarioHelpers.js';
12
+ import { buildBalanceInitializationPayload } from '../balanceInitialization/balanceInitializationScenarioHelpers.js';
13
+
14
+ export default function appendWhitelistExistingReaderHappyPathScenario() {
15
+ test('State.apply appendWhitelist upgrades initialized readers without altering their balances', async t => {
16
+ const context = await setupAppendWhitelistScenario(t);
17
+ const adminNode = context.adminBootstrap;
18
+ const readerPeer = selectReaderPeer(context);
19
+ const initialReaderBalance = toTerm(75n);
20
+
21
+ const adminNodeEntryBefore = await adminNode.base.view.get(adminNode.wallet.address);
22
+ t.ok(adminNodeEntryBefore, 'admin node entry exists');
23
+ const decodedAdminBefore = nodeEntryUtils.decode(adminNodeEntryBefore.value);
24
+ t.ok(decodedAdminBefore, 'admin node entry decodes');
25
+ const adminBalanceSnapshot = decodedAdminBefore.balance && b4a.from(decodedAdminBefore.balance);
26
+
27
+ const balanceInitializationPayload = await buildBalanceInitializationPayload(
28
+ context,
29
+ readerPeer.wallet.address,
30
+ initialReaderBalance
31
+ );
32
+ await adminNode.base.append(balanceInitializationPayload);
33
+ await adminNode.base.update();
34
+ await eventFlush();
35
+
36
+ const readerEntryAfterInitialization = await adminNode.base.view.get(readerPeer.wallet.address);
37
+ t.ok(readerEntryAfterInitialization, 'reader entry created via balance initialization');
38
+ const decodedReaderBeforeWhitelist = nodeEntryUtils.decode(readerEntryAfterInitialization.value);
39
+ t.ok(decodedReaderBeforeWhitelist, 'reader entry decodes before whitelist');
40
+ t.ok(
41
+ b4a.equals(decodedReaderBeforeWhitelist.balance, initialReaderBalance),
42
+ 'reader balance stored during initialization'
43
+ );
44
+ t.is(decodedReaderBeforeWhitelist.isWhitelisted, false, 'reader not whitelisted yet');
45
+ t.ok(
46
+ b4a.equals(decodedReaderBeforeWhitelist.license, ZERO_LICENSE),
47
+ 'reader license absent before whitelist'
48
+ );
49
+
50
+ const appendWhitelistPayload = await buildAppendWhitelistPayload(
51
+ context,
52
+ readerPeer.wallet.address
53
+ );
54
+ const decodedPayload = safeDecodeApplyOperation(appendWhitelistPayload);
55
+ t.ok(decodedPayload, 'append whitelist payload decodes');
56
+ const whitelistTxHash = decodedPayload?.aco?.tx?.toString('hex');
57
+ t.ok(whitelistTxHash, 'whitelist tx hash extracted');
58
+
59
+ await adminNode.base.append(appendWhitelistPayload);
60
+ await adminNode.base.update();
61
+ await eventFlush();
62
+
63
+ const { decodedEntry: decodedReaderAfterWhitelist } = await assertReaderWhitelisted(
64
+ t,
65
+ adminNode.base,
66
+ readerPeer.wallet.address,
67
+ { expectedLicenseCount: 2 }
68
+ );
69
+ t.ok(
70
+ b4a.equals(decodedReaderAfterWhitelist.balance, initialReaderBalance),
71
+ 'reader balance preserved after whitelist append'
72
+ );
73
+
74
+ const adminNodeEntryAfter = await adminNode.base.view.get(adminNode.wallet.address);
75
+ const decodedAdminAfter = nodeEntryUtils.decode(adminNodeEntryAfter.value);
76
+ t.ok(decodedAdminAfter, 'admin node entry decodes after whitelist append');
77
+ t.ok(
78
+ b4a.equals(decodedAdminAfter.balance, adminBalanceSnapshot),
79
+ 'admin balance remains unchanged while initialization enabled'
80
+ );
81
+
82
+ const txEntry = await adminNode.base.view.get(whitelistTxHash);
83
+ t.ok(txEntry, 'whitelist transaction recorded to prevent replays');
84
+
85
+ await context.sync();
86
+
87
+ const { decodedEntry: readerReplicaEntry } = await assertReaderWhitelisted(
88
+ t,
89
+ readerPeer.base,
90
+ readerPeer.wallet.address,
91
+ { expectedLicenseCount: 2 }
92
+ );
93
+ t.ok(
94
+ b4a.equals(readerReplicaEntry.balance, initialReaderBalance),
95
+ 'reader balance replicated with whitelist role'
96
+ );
97
+ });
98
+ }
@@ -0,0 +1,66 @@
1
+ import { test } from 'brittle';
2
+ import b4a from 'b4a';
3
+ import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
4
+ import nodeEntryUtils from '../../../../../src/core/state/utils/nodeEntry.js';
5
+ import { toBalance, BALANCE_FEE } from '../../../../../src/core/state/utils/balance.js';
6
+ import setupAppendWhitelistScenario, {
7
+ buildAppendWhitelistPayload,
8
+ selectReaderPeer,
9
+ assertReaderWhitelisted
10
+ } from './appendWhitelistScenarioHelpers.js';
11
+ import {
12
+ buildDisableInitializationPayload,
13
+ assertInitializationDisabledState
14
+ } from '../disableInitialization/disableInitializationScenarioHelpers.js';
15
+
16
+ export default function appendWhitelistFeeAfterDisableScenario() {
17
+ test('State.apply appendWhitelist charges admin fee once initialization is disabled', async t => {
18
+ const context = await setupAppendWhitelistScenario(t);
19
+ const adminNode = context.adminBootstrap;
20
+ const readerPeer = selectReaderPeer(context);
21
+
22
+ const disablePayload = await buildDisableInitializationPayload(context);
23
+ await adminNode.base.append(disablePayload);
24
+ await adminNode.base.update();
25
+ await eventFlush();
26
+ await assertInitializationDisabledState(t, adminNode.base, disablePayload);
27
+
28
+ const adminEntryBefore = await adminNode.base.view.get(adminNode.wallet.address);
29
+ t.ok(adminEntryBefore, 'admin node entry exists after disabling initialization');
30
+ const decodedAdminBefore = nodeEntryUtils.decode(adminEntryBefore.value);
31
+ t.ok(decodedAdminBefore, 'admin node entry decodes before fee is applied');
32
+ const adminBalanceBefore = toBalance(decodedAdminBefore.balance);
33
+ t.ok(adminBalanceBefore, 'admin balance decodes');
34
+
35
+ const whitelistPayload = await buildAppendWhitelistPayload(
36
+ context,
37
+ readerPeer.wallet.address
38
+ );
39
+ await adminNode.base.append(whitelistPayload);
40
+ await adminNode.base.update();
41
+ await eventFlush();
42
+
43
+ await assertReaderWhitelisted(t, adminNode.base, readerPeer.wallet.address, {
44
+ expectedLicenseCount: 2
45
+ });
46
+
47
+ const adminEntryAfter = await adminNode.base.view.get(adminNode.wallet.address);
48
+ const decodedAdminAfter = nodeEntryUtils.decode(adminEntryAfter.value);
49
+ t.ok(decodedAdminAfter, 'admin node entry decodes after fee is applied');
50
+ const adminBalanceAfter = toBalance(decodedAdminAfter.balance);
51
+ t.ok(adminBalanceAfter, 'admin balance decodes after fee is applied');
52
+
53
+ const expectedBalance = adminBalanceBefore.sub(BALANCE_FEE);
54
+ t.ok(expectedBalance, 'fee subtraction succeeds');
55
+ t.ok(
56
+ b4a.equals(adminBalanceAfter.value, expectedBalance.value),
57
+ 'admin balance reduced by BALANCE_FEE when initialization disabled'
58
+ );
59
+
60
+ await context.sync();
61
+
62
+ await assertReaderWhitelisted(t, readerPeer.base, readerPeer.wallet.address, {
63
+ expectedLicenseCount: 2
64
+ });
65
+ });
66
+ }