trac-msb 0.2.4 → 0.2.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (239) hide show
  1. package/.dockerignore +16 -0
  2. package/.github/workflows/acceptance-tests.yml +7 -0
  3. package/.github/workflows/publish.yml +40 -0
  4. package/.github/workflows/{CI.yml → unit-tests.yml} +1 -1
  5. package/README.md +175 -50
  6. package/docker-compose.yml +16 -0
  7. package/dockerfile +41 -0
  8. package/docs/fee_distribution.md +89 -0
  9. package/msb.mjs +12 -14
  10. package/package.json +8 -4
  11. package/rpc/constants.mjs +4 -1
  12. package/rpc/handlers.mjs +109 -66
  13. package/rpc/routes/v1.mjs +3 -1
  14. package/rpc/rpc_services.js +126 -0
  15. package/rpc/utils/confirmedParameter.mjs +17 -0
  16. package/rpc/utils/url.mjs +38 -0
  17. package/src/core/network/Network.js +27 -10
  18. package/src/core/network/identity/NetworkWalletFactory.js +78 -0
  19. package/src/core/network/services/ConnectionManager.js +2 -2
  20. package/src/core/network/services/ValidatorObserverService.js +7 -4
  21. package/src/core/state/State.js +28 -22
  22. package/src/index.js +197 -385
  23. package/src/utils/cliCommands.js +280 -0
  24. package/src/utils/constants.js +3 -1
  25. package/tests/acceptance/v1/account/account.test.mjs +123 -0
  26. package/tests/acceptance/v1/balance/balance.test.mjs +55 -0
  27. package/tests/acceptance/v1/broadcast-transaction/broadcast-transaction.test.mjs +111 -0
  28. package/tests/acceptance/v1/confirmed-length/confirmed-length.test.mjs +19 -0
  29. package/tests/acceptance/v1/fee/fee.test.mjs +11 -0
  30. package/tests/acceptance/v1/rpc.test.mjs +62 -291
  31. package/tests/acceptance/v1/tx/tx.test.mjs +98 -0
  32. package/tests/acceptance/v1/tx-details/tx-details.test.mjs +195 -0
  33. package/tests/acceptance/v1/tx-hashes/tx-hashes.test.mjs +72 -0
  34. package/tests/acceptance/v1/tx-payloads-bulk/tx-payloads-bulk.test.mjs +27 -0
  35. package/tests/acceptance/v1/txv/txv.test.mjs +11 -0
  36. package/tests/acceptance/v1/unconfirmed-length/unconfirmed-length.test.mjs +11 -0
  37. package/tests/helpers/StateNetworkFactory.js +157 -0
  38. package/tests/helpers/autobaseTestHelpers.js +369 -0
  39. package/tests/helpers/createTestSignature.js +12 -0
  40. package/tests/helpers/transactionPayloads.mjs +78 -0
  41. package/tests/unit/network/NetworkWalletFactory.test.js +156 -0
  42. package/tests/unit/state/apply/addAdmin/addAdminHappyPathScenario.js +38 -0
  43. package/tests/unit/state/apply/addAdmin/addAdminScenarioHelpers.js +273 -0
  44. package/tests/unit/state/apply/addAdmin/adminEntryEncodingFailureScenario.js +30 -0
  45. package/tests/unit/state/apply/addAdmin/adminEntryExistsScenario.js +78 -0
  46. package/tests/unit/state/apply/addAdmin/nodeEntryInitializationFailureScenario.js +30 -0
  47. package/tests/unit/state/apply/addAdmin/nonBootstrapNodeScenario.js +68 -0
  48. package/tests/unit/state/apply/addAdmin/state.apply.addAdmin.test.js +155 -0
  49. package/tests/unit/state/apply/addIndexer/addIndexerHappyPathScenario.js +39 -0
  50. package/tests/unit/state/apply/addIndexer/addIndexerMultipleIndexersInTheNetworkScenario.js +167 -0
  51. package/tests/unit/state/apply/addIndexer/addIndexerPretenderAlreadyIndexerScenario.js +21 -0
  52. package/tests/unit/state/apply/addIndexer/addIndexerPretenderNotWriterScenario.js +21 -0
  53. package/tests/unit/state/apply/addIndexer/addIndexerRemoveAndReAddScenario.js +186 -0
  54. package/tests/unit/state/apply/addIndexer/addIndexerScenarioHelpers.js +445 -0
  55. package/tests/unit/state/apply/addIndexer/addIndexerWriterKeyAlreadyRegisteredScenario.js +32 -0
  56. package/tests/unit/state/apply/addIndexer/state.apply.addIndexer.test.js +297 -0
  57. package/tests/unit/state/apply/addWriter/addWriterHappyPathScenario.js +41 -0
  58. package/tests/unit/state/apply/addWriter/addWriterInvalidValidatorSignatureScenario.js +32 -0
  59. package/tests/unit/state/apply/addWriter/addWriterNewWkScenario.js +149 -0
  60. package/tests/unit/state/apply/addWriter/addWriterRequesterAlreadyWriterScenario.js +21 -0
  61. package/tests/unit/state/apply/addWriter/addWriterRequesterBalanceInsufficientScenario.js +21 -0
  62. package/tests/unit/state/apply/addWriter/addWriterRequesterEntryDecodeFailureScenario.js +19 -0
  63. package/tests/unit/state/apply/addWriter/addWriterRequesterEntryMissingScenario.js +19 -0
  64. package/tests/unit/state/apply/addWriter/addWriterRequesterIndexerScenario.js +21 -0
  65. package/tests/unit/state/apply/addWriter/addWriterRequesterNotWhitelistedScenario.js +21 -0
  66. package/tests/unit/state/apply/addWriter/addWriterScenarioHelpers.js +757 -0
  67. package/tests/unit/state/apply/addWriter/addWriterStakeBalanceUpdateFailureScenario.js +50 -0
  68. package/tests/unit/state/apply/addWriter/addWriterStakeInsufficientBalanceScenario.js +29 -0
  69. package/tests/unit/state/apply/addWriter/addWriterStakeInvalidBalanceScenario.js +29 -0
  70. package/tests/unit/state/apply/addWriter/addWriterStakeInvalidEntryScenario.js +21 -0
  71. package/tests/unit/state/apply/addWriter/addWriterStakeStakedBalanceFailureScenario.js +37 -0
  72. package/tests/unit/state/apply/addWriter/addWriterStakeSubtractFailureScenario.js +42 -0
  73. package/tests/unit/state/apply/addWriter/addWriterValidatorRewardScenario.js +105 -0
  74. package/tests/unit/state/apply/addWriter/addWriterWriterKeyMismatchScenario.js +54 -0
  75. package/tests/unit/state/apply/addWriter/addWriterWriterKeyOwnershipScenario.js +54 -0
  76. package/tests/unit/state/apply/addWriter/addWriterZeroWriterKeyScenario.js +29 -0
  77. package/tests/unit/state/apply/addWriter/state.apply.addWriter.test.js +309 -0
  78. package/tests/unit/state/apply/adminRecovery/adminRecoveryHappyPathScenario.js +30 -0
  79. package/tests/unit/state/apply/adminRecovery/adminRecoveryScenarioHelpers.js +866 -0
  80. package/tests/unit/state/apply/adminRecovery/state.apply.adminRecovery.test.js +439 -0
  81. package/tests/unit/state/apply/appendWhitelist/appendWhitelistBanAndReapplyScenario.js +78 -0
  82. package/tests/unit/state/apply/appendWhitelist/appendWhitelistExistingReaderHappyPathScenario.js +98 -0
  83. package/tests/unit/state/apply/appendWhitelist/appendWhitelistFeeAfterDisableScenario.js +66 -0
  84. package/tests/unit/state/apply/appendWhitelist/appendWhitelistHappyPathScenario.js +55 -0
  85. package/tests/unit/state/apply/appendWhitelist/appendWhitelistInsufficientAdminBalanceScenario.js +103 -0
  86. package/tests/unit/state/apply/appendWhitelist/appendWhitelistNodeAlreadyWhitelistedScenario.js +60 -0
  87. package/tests/unit/state/apply/appendWhitelist/appendWhitelistScenarioHelpers.js +191 -0
  88. package/tests/unit/state/apply/appendWhitelist/state.apply.appendWhitelist.test.js +220 -0
  89. package/tests/unit/state/apply/balanceInitialization/balanceInitializationHappyPathScenario.js +82 -0
  90. package/tests/unit/state/apply/balanceInitialization/balanceInitializationScenarioHelpers.js +106 -0
  91. package/tests/unit/state/apply/balanceInitialization/invalidAmountScenario.js +45 -0
  92. package/tests/unit/state/apply/balanceInitialization/nodeEntryBalanceUpdateFailureScenario.js +81 -0
  93. package/tests/unit/state/apply/balanceInitialization/state.apply.balanceInitialization.test.js +189 -0
  94. package/tests/unit/state/apply/banValidator/banValidatorBanAndReWhitelistScenario.js +155 -0
  95. package/tests/unit/state/apply/banValidator/banValidatorHappyPathScenario.js +36 -0
  96. package/tests/unit/state/apply/banValidator/banValidatorScenarioHelpers.js +534 -0
  97. package/tests/unit/state/apply/banValidator/banValidatorSequentialBansScenario.js +74 -0
  98. package/tests/unit/state/apply/banValidator/banValidatorTargetDecodeFailureScenario.js +19 -0
  99. package/tests/unit/state/apply/banValidator/banValidatorTargetIndexerScenario.js +32 -0
  100. package/tests/unit/state/apply/banValidator/banValidatorTargetNodeEntryMissingScenario.js +19 -0
  101. package/tests/unit/state/apply/banValidator/banValidatorTargetRoleUpdateFailureScenario.js +19 -0
  102. package/tests/unit/state/apply/banValidator/banValidatorWhitelistedNonWriterScenario.js +38 -0
  103. package/tests/unit/state/apply/banValidator/banValidatorWhitelistedZeroBalanceScenario.js +91 -0
  104. package/tests/unit/state/apply/banValidator/banValidatorWithdrawFailureScenario.js +19 -0
  105. package/tests/unit/state/apply/banValidator/state.apply.banValidator.test.js +266 -0
  106. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentDuplicateRegistrationScenario.js +142 -0
  107. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentHappyPathScenario.js +26 -0
  108. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentIncompleteOperationScenario.js +94 -0
  109. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentInvalidDeploymentEntryScenario.js +37 -0
  110. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentMultipleBootstrapScenario.js +86 -0
  111. package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentScenarioHelpers.js +344 -0
  112. package/tests/unit/state/apply/bootstrapDeployment/invalidValidatorNodeEntryScenario.js +57 -0
  113. package/tests/unit/state/apply/bootstrapDeployment/state.apply.bootstrapDeployment.test.js +429 -0
  114. package/tests/unit/state/apply/common/access-control/adminConsistencyMismatchScenario.js +119 -0
  115. package/tests/unit/state/apply/common/access-control/adminEntryDecodeFailureScenario.js +130 -0
  116. package/tests/unit/state/apply/common/access-control/adminEntryExistsScenario.js +93 -0
  117. package/tests/unit/state/apply/common/access-control/adminEntryMissingScenario.js +108 -0
  118. package/tests/unit/state/apply/common/access-control/adminOnlyGuardScenario.js +126 -0
  119. package/tests/unit/state/apply/common/access-control/adminPublicKeyDecodeFailureScenario.js +120 -0
  120. package/tests/unit/state/apply/common/access-control/roleAccessOperationValidationScenario.js +50 -0
  121. package/tests/unit/state/apply/common/adminControlOperationValidationScenario.js +56 -0
  122. package/tests/unit/state/apply/common/balances/adminEntryUpdateFailureScenario.js +52 -0
  123. package/tests/unit/state/apply/common/balances/base/requesterBalanceScenarioBase.js +197 -0
  124. package/tests/unit/state/apply/common/balances/feeDecodeFailureScenario.js +52 -0
  125. package/tests/unit/state/apply/common/balances/requesterBalanceDecodeFailureScenario.js +15 -0
  126. package/tests/unit/state/apply/common/balances/requesterBalanceFeeApplicationFailureScenario.js +11 -0
  127. package/tests/unit/state/apply/common/balances/requesterBalanceInsufficientScenario.js +15 -0
  128. package/tests/unit/state/apply/common/balances/requesterBalanceUpdateFailureScenario.js +11 -0
  129. package/tests/unit/state/apply/common/balances/validatorEntryRewardFailureScenario.js +11 -0
  130. package/tests/unit/state/apply/common/balances/validatorEntryUpdateFailureScenario.js +11 -0
  131. package/tests/unit/state/apply/common/balances/validatorNodeEntryDecodeFailureScenario.js +40 -0
  132. package/tests/unit/state/apply/common/base/OperationValidationScenarioBase.js +114 -0
  133. package/tests/unit/state/apply/common/commonScenarioHelper.js +103 -0
  134. package/tests/unit/state/apply/common/indexer/indexerNodeEntryDecodeFailureScenario.js +36 -0
  135. package/tests/unit/state/apply/common/indexer/indexerNodeEntryMissingScenario.js +36 -0
  136. package/tests/unit/state/apply/common/indexer/indexerRoleUpdateFailureScenario.js +29 -0
  137. package/tests/unit/state/apply/common/indexer/indexerSequenceStateInvalidScenario.js +66 -0
  138. package/tests/unit/state/apply/common/invalidMessageComponentValidationScenario.js +84 -0
  139. package/tests/unit/state/apply/common/nodeEntryInitializationFailureScenario.js +47 -0
  140. package/tests/unit/state/apply/common/operationAlreadyAppliedScenario.js +85 -0
  141. package/tests/unit/state/apply/common/payload-structure/addressWithInvalidPublicKeyScenario.js +52 -0
  142. package/tests/unit/state/apply/common/payload-structure/initializationDisabledScenario.js +49 -0
  143. package/tests/unit/state/apply/common/payload-structure/invalidAddressValidationScenario.js +73 -0
  144. package/tests/unit/state/apply/common/payload-structure/invalidHashValidationScenario.js +71 -0
  145. package/tests/unit/state/apply/common/payload-structure/invalidPayloadValidationScenario.js +31 -0
  146. package/tests/unit/state/apply/common/payload-structure/invalidSignatureValidationScenario.js +142 -0
  147. package/tests/unit/state/apply/common/payload-structure/partialOperationValidationScenario.js +87 -0
  148. package/tests/unit/state/apply/common/requester/requesterNodeEntryBufferMissingScenario.js +70 -0
  149. package/tests/unit/state/apply/common/requester/requesterNodeEntryDecodeFailureScenario.js +72 -0
  150. package/tests/unit/state/apply/common/requester/requesterNodeEntryMissingScenario.js +36 -0
  151. package/tests/unit/state/apply/common/requesterAddressValidationScenario.js +44 -0
  152. package/tests/unit/state/apply/common/requesterPublicKeyValidationScenario.js +25 -0
  153. package/tests/unit/state/apply/common/transactionValidityMismatchScenario.js +98 -0
  154. package/tests/unit/state/apply/common/validatorConsistency/base/validatorConsistencyScenarioBase.js +201 -0
  155. package/tests/unit/state/apply/common/validatorConsistency/validatorEntryDecodeFailureScenario.js +17 -0
  156. package/tests/unit/state/apply/common/validatorConsistency/validatorEntryMissingScenario.js +44 -0
  157. package/tests/unit/state/apply/common/validatorConsistency/validatorInactiveScenario.js +19 -0
  158. package/tests/unit/state/apply/common/validatorConsistency/validatorWriterKeyMismatchScenario.js +18 -0
  159. package/tests/unit/state/apply/common/validatorEntryValidation/base/validatorEntryValidationScenarioBase.js +314 -0
  160. package/tests/unit/state/apply/common/validatorEntryValidation/validatorEntryInvalidBalanceScenario.js +18 -0
  161. package/tests/unit/state/apply/common/writerKeyExistsValidationScenario.js +43 -0
  162. package/tests/unit/state/apply/disableInitialization/disableInitializationAlreadyDisabledScenario.js +53 -0
  163. package/tests/unit/state/apply/disableInitialization/disableInitializationHappyPathScenario.js +24 -0
  164. package/tests/unit/state/apply/disableInitialization/disableInitializationScenarioHelpers.js +197 -0
  165. package/tests/unit/state/apply/disableInitialization/state.apply.disableInitialization.test.js +161 -0
  166. package/tests/unit/state/apply/missing-tests.md +18 -0
  167. package/tests/unit/state/apply/removeIndexer/removeIndexerHappyPathScenario.js +58 -0
  168. package/tests/unit/state/apply/removeIndexer/removeIndexerReAddAndRemoveAgainScenario.js +98 -0
  169. package/tests/unit/state/apply/removeIndexer/removeIndexerRemoveMultipleIndexersScenario.js +167 -0
  170. package/tests/unit/state/apply/removeIndexer/removeIndexerScenarioHelpers.js +428 -0
  171. package/tests/unit/state/apply/removeIndexer/removeIndexerTargetNotIndexerScenario.js +22 -0
  172. package/tests/unit/state/apply/removeIndexer/removeIndexerWriterKeyMissingScenario.js +20 -0
  173. package/tests/unit/state/apply/removeIndexer/state.apply.removeIndexer.test.js +291 -0
  174. package/tests/unit/state/apply/removeWriter/removeWriterAndAddWriterAgainScenario.js +87 -0
  175. package/tests/unit/state/apply/removeWriter/removeWriterHappyPathScenario.js +38 -0
  176. package/tests/unit/state/apply/removeWriter/removeWriterInvalidValidatorSignatureScenario.js +32 -0
  177. package/tests/unit/state/apply/removeWriter/removeWriterRequesterBalanceInsufficientScenario.js +21 -0
  178. package/tests/unit/state/apply/removeWriter/removeWriterRequesterEntryDecodeFailureScenario.js +19 -0
  179. package/tests/unit/state/apply/removeWriter/removeWriterRequesterEntryMissingScenario.js +19 -0
  180. package/tests/unit/state/apply/removeWriter/removeWriterRequesterIndexerScenario.js +21 -0
  181. package/tests/unit/state/apply/removeWriter/removeWriterRequesterNotWriterScenario.js +21 -0
  182. package/tests/unit/state/apply/removeWriter/removeWriterRequesterRoleUpdateFailureScenario.js +19 -0
  183. package/tests/unit/state/apply/removeWriter/removeWriterScenarioHelpers.js +344 -0
  184. package/tests/unit/state/apply/removeWriter/removeWriterThroughWriterValidatorScenario.js +113 -0
  185. package/tests/unit/state/apply/removeWriter/removeWriterUnstakeFailureScenario.js +33 -0
  186. package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyMismatchScenario.js +21 -0
  187. package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyOwnershipScenario.js +26 -0
  188. package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyRegistryMissingScenario.js +22 -0
  189. package/tests/unit/state/apply/removeWriter/state.apply.removeWriter.test.js +307 -0
  190. package/tests/unit/state/apply/state.apply.test.js +24 -0
  191. package/tests/unit/state/apply/transfer/state.apply.transfer.test.js +819 -0
  192. package/tests/unit/state/apply/transfer/transferContractSchemaValidationScenario.js +22 -0
  193. package/tests/unit/state/apply/transfer/transferDoubleSpendAcrossValidatorsScenario.js +137 -0
  194. package/tests/unit/state/apply/transfer/transferDoubleSpendSameBatchScenario.js +63 -0
  195. package/tests/unit/state/apply/transfer/transferDoubleSpendSingleValidatorScenario.js +67 -0
  196. package/tests/unit/state/apply/transfer/transferExistingRecipientAmountScenario.js +31 -0
  197. package/tests/unit/state/apply/transfer/transferExistingRecipientZeroAmountScenario.js +31 -0
  198. package/tests/unit/state/apply/transfer/transferHandlerGuardScenarios.js +22 -0
  199. package/tests/unit/state/apply/transfer/transferHappyPathScenario.js +8 -0
  200. package/tests/unit/state/apply/transfer/transferInvalidIncomingDataScenario.js +66 -0
  201. package/tests/unit/state/apply/transfer/transferNewRecipientAmountScenario.js +31 -0
  202. package/tests/unit/state/apply/transfer/transferNewRecipientZeroAmountScenario.js +31 -0
  203. package/tests/unit/state/apply/transfer/transferScenarioHelpers.js +1167 -0
  204. package/tests/unit/state/apply/transfer/transferSelfTransferAmountScenario.js +38 -0
  205. package/tests/unit/state/apply/transfer/transferSelfTransferZeroAmountScenario.js +38 -0
  206. package/tests/unit/state/apply/transfer/transferValidatorRecipientAmountScenario.js +38 -0
  207. package/tests/unit/state/apply/transfer/transferValidatorRecipientZeroAmountScenario.js +38 -0
  208. package/tests/unit/state/apply/txOperation/state.apply.txOperation.test.js +318 -0
  209. package/tests/unit/state/apply/txOperation/txOperationBootstrapNotRegisteredScenario.js +70 -0
  210. package/tests/unit/state/apply/txOperation/txOperationDifferentValidatorCreatorHappyPathScenario.js +23 -0
  211. package/tests/unit/state/apply/txOperation/txOperationInvalidDeploymentEntryScenario.js +48 -0
  212. package/tests/unit/state/apply/txOperation/txOperationInvalidFeeAmountScenario.js +39 -0
  213. package/tests/unit/state/apply/txOperation/txOperationInvalidSubnetCreatorAddressScenario.js +46 -0
  214. package/tests/unit/state/apply/txOperation/txOperationRequesterCreatorHappyPathScenario.js +21 -0
  215. package/tests/unit/state/apply/txOperation/txOperationScenarioHelpers.js +429 -0
  216. package/tests/unit/state/apply/txOperation/txOperationStandardHappyPathScenario.js +21 -0
  217. package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddCreatorBalanceFailureScenario.js +26 -0
  218. package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddValidatorBalanceFailureScenario.js +25 -0
  219. package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddValidatorBonusFailureScenario.js +27 -0
  220. package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeCreatorEntryScenario.js +18 -0
  221. package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeRequesterEntryScenario.js +17 -0
  222. package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeValidatorEntryScenario.js +31 -0
  223. package/tests/unit/state/apply/txOperation/txOperationTransferFeeGuardBypassScenario.js +49 -0
  224. package/tests/unit/state/apply/txOperation/txOperationTransferFeeGuardScenarioFactory.js +92 -0
  225. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInsufficientRequesterBalanceScenario.js +28 -0
  226. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidCreatorBalanceScenario.js +29 -0
  227. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidRequesterBalanceScenario.js +28 -0
  228. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidRequesterEntryScenario.js +17 -0
  229. package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidValidatorBalanceScenario.js +33 -0
  230. package/tests/unit/state/apply/txOperation/txOperationTransferFeeMissingCreatorEntryScenario.js +18 -0
  231. package/tests/unit/state/apply/txOperation/txOperationTransferFeeSubtractFailureScenario.js +25 -0
  232. package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateCreatorBalanceFailureScenario.js +26 -0
  233. package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateFailureScenario.js +25 -0
  234. package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateValidatorBalanceFailureScenario.js +26 -0
  235. package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateValidatorBonusFailureScenario.js +27 -0
  236. package/tests/unit/state/apply/txOperation/txOperationValidatorCreatorHappyPathScenario.js +21 -0
  237. package/tests/unit/state/stateModule.test.js +1 -0
  238. package/tests/unit/state/stateTestUtils.js +5 -1
  239. package/.env +0 -3
@@ -0,0 +1,36 @@
1
+ import { test } from 'brittle';
2
+ import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
3
+ import { selectWriterPeer } from '../addWriter/addWriterScenarioHelpers.js';
4
+ import {
5
+ setupBanValidatorScenario,
6
+ buildBanValidatorPayload,
7
+ assertBanValidatorSuccessState
8
+ } from './banValidatorScenarioHelpers.js';
9
+
10
+ export default function banValidatorHappyPathScenario() {
11
+ test('State.apply banValidator removes validator privileges - happy path', async t => {
12
+ const context = await setupBanValidatorScenario(t);
13
+ const adminPeer = context.adminBootstrap;
14
+ const validatorPeer = context.banValidatorScenario?.validatorPeer ?? selectWriterPeer(context);
15
+
16
+ const validatorEntryBefore = await adminPeer.base.view.get(validatorPeer.wallet.address);
17
+ t.ok(validatorEntryBefore, 'validator entry exists before banValidator');
18
+
19
+ const adminEntryBefore = await adminPeer.base.view.get(adminPeer.wallet.address);
20
+ t.ok(adminEntryBefore, 'admin entry exists before banValidator');
21
+
22
+ const payload = await buildBanValidatorPayload(context, { adminPeer, validatorPeer });
23
+
24
+ await adminPeer.base.append(payload);
25
+ await adminPeer.base.update();
26
+ await eventFlush();
27
+
28
+ await assertBanValidatorSuccessState(t, context, {
29
+ validatorPeer,
30
+ adminPeer,
31
+ validatorEntryBefore,
32
+ adminEntryBefore,
33
+ payload
34
+ });
35
+ });
36
+ }
@@ -0,0 +1,534 @@
1
+ import b4a from 'b4a';
2
+ import { deriveIndexerSequenceState, eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
3
+ import CompleteStateMessageOperations from '../../../../../src/messages/completeStateMessages/CompleteStateMessageOperations.js';
4
+ import nodeEntryUtils, { ZERO_LICENSE } from '../../../../../src/core/state/utils/nodeEntry.js';
5
+ import addressUtils from '../../../../../src/core/state/utils/address.js';
6
+ import lengthEntryUtils from '../../../../../src/core/state/utils/lengthEntry.js';
7
+ import { EntryType } from '../../../../../src/utils/constants.js';
8
+ import { BALANCE_FEE, BALANCE_ZERO, toBalance } from '../../../../../src/core/state/utils/balance.js';
9
+ import { safeDecodeApplyOperation, safeEncodeApplyOperation } from '../../../../../src/utils/protobuf/operationHelpers.js';
10
+ import {
11
+ setupAddWriterScenario,
12
+ selectWriterPeer,
13
+ promotePeerToWriter,
14
+ applyWithStakeEntryMutation
15
+ } from '../addWriter/addWriterScenarioHelpers.js';
16
+ import { setupAdminAndWhitelistedReaderNetwork } from '../common/commonScenarioHelper.js';
17
+ import { applyWithRequesterEntryRemoval } from '../addWriter/addWriterScenarioHelpers.js';
18
+ import { createMessage } from '../../../../../src/utils/buffer.js';
19
+ import { blake3Hash } from '../../../../../src/utils/crypto.js';
20
+ import { NETWORK_ID, OperationType } from '../../../../../src/utils/constants.js';
21
+
22
+ export async function setupBanValidatorScenario(
23
+ t,
24
+ { promoteToWriter = true, nodes = 2, readerInitialBalance = null } = {}
25
+ ) {
26
+ if (promoteToWriter) {
27
+ const addWriterOptions = { nodes };
28
+ if (readerInitialBalance) {
29
+ addWriterOptions.writerInitialBalance = readerInitialBalance;
30
+ }
31
+ const context = await setupAddWriterScenario(t, addWriterOptions);
32
+ const validatorPeer = selectWriterPeer(context);
33
+ await promotePeerToWriter(t, context, { readerPeer: validatorPeer });
34
+ const adminEntry = await context.adminBootstrap.base.view.get(context.adminBootstrap.wallet.address);
35
+ const validatorEntry = await context.adminBootstrap.base.view.get(validatorPeer.wallet.address);
36
+ context.banValidatorScenario = {
37
+ validatorPeer,
38
+ adminEntryBefore: adminEntry ? { ...adminEntry, value: b4a.from(adminEntry.value) } : null,
39
+ validatorEntryBefore: validatorEntry ? { ...validatorEntry, value: b4a.from(validatorEntry.value) } : null
40
+ };
41
+ return context;
42
+ }
43
+
44
+ const context = await setupAdminAndWhitelistedReaderNetwork(t, {
45
+ nodes,
46
+ readerInitialBalance
47
+ });
48
+ const validatorPeer = selectWriterPeer(context);
49
+ const adminEntry = await context.adminBootstrap.base.view.get(context.adminBootstrap.wallet.address);
50
+ const validatorEntry = await context.adminBootstrap.base.view.get(validatorPeer.wallet.address);
51
+ context.banValidatorScenario = {
52
+ validatorPeer,
53
+ adminEntryBefore: adminEntry ? { ...adminEntry, value: b4a.from(adminEntry.value) } : null,
54
+ validatorEntryBefore: validatorEntry ? { ...validatorEntry, value: b4a.from(validatorEntry.value) } : null
55
+ };
56
+ return context;
57
+ }
58
+
59
+ export async function buildBanValidatorPayload(
60
+ context,
61
+ { adminPeer = context.adminBootstrap, validatorPeer = selectWriterPeer(context) } = {}
62
+ /* cover tests */
63
+ ) {
64
+ const txValidity = await deriveIndexerSequenceState(adminPeer.base);
65
+ return CompleteStateMessageOperations.assembleBanWriterMessage(
66
+ adminPeer.wallet,
67
+ validatorPeer.wallet.address,
68
+ txValidity
69
+ );
70
+ }
71
+
72
+ export async function buildBanValidatorPayloadWithTxValidity(
73
+ context,
74
+ mutatedTxValidity,
75
+ { adminPeer = context.adminBootstrap, validatorPeer = selectWriterPeer(context) } = {}
76
+ ) {
77
+ return CompleteStateMessageOperations.assembleBanWriterMessage(
78
+ adminPeer.wallet,
79
+ validatorPeer.wallet.address,
80
+ mutatedTxValidity
81
+ );
82
+ }
83
+
84
+ export async function assertBanValidatorSuccessState(
85
+ t,
86
+ context,
87
+ {
88
+ validatorPeer = selectWriterPeer(context),
89
+ adminPeer = context.adminBootstrap,
90
+ validatorEntryBefore,
91
+ adminEntryBefore,
92
+ payload,
93
+ expectedInitialRoles = { isWhitelisted: true, isWriter: true, isIndexer: false },
94
+ expectWriterRegistry = null,
95
+ skipSync = false
96
+ } = {}
97
+ ) {
98
+ if (!validatorEntryBefore?.value) {
99
+ throw new Error('assertBanValidatorSuccessState requires the validator entry before ban.');
100
+ }
101
+ if (!adminEntryBefore?.value) {
102
+ throw new Error('assertBanValidatorSuccessState requires the admin entry before ban.');
103
+ }
104
+ if (!payload) {
105
+ throw new Error('assertBanValidatorSuccessState requires the banValidator payload.');
106
+ }
107
+
108
+ const decodedBefore = nodeEntryUtils.decode(validatorEntryBefore.value);
109
+ t.ok(decodedBefore, 'validator entry before banValidator decodes');
110
+ if (!decodedBefore) return;
111
+ const expectWriterBefore = expectedInitialRoles?.isWriter !== false;
112
+ const expectWhitelistedBefore = expectedInitialRoles?.isWhitelisted !== false;
113
+ const expectIndexerBefore = expectedInitialRoles?.isIndexer === true;
114
+
115
+ t.is(decodedBefore.isWhitelisted, expectWhitelistedBefore, 'validator whitelist status before banValidator');
116
+ t.is(decodedBefore.isWriter, expectWriterBefore, 'validator writer status before banValidator');
117
+ t.is(decodedBefore.isIndexer, expectIndexerBefore, 'validator indexer status before banValidator');
118
+
119
+ const balanceBefore = toBalance(decodedBefore.balance);
120
+ const stakedBefore = toBalance(decodedBefore.stakedBalance);
121
+ t.ok(balanceBefore, 'validator balance before banValidator decodes');
122
+ t.ok(stakedBefore, 'validator staked balance before banValidator decodes');
123
+
124
+ const validatorEntryAfter = await adminPeer.base.view.get(validatorPeer.wallet.address);
125
+ t.ok(validatorEntryAfter, 'validator entry exists after banValidator');
126
+ const decodedAfter = nodeEntryUtils.decode(validatorEntryAfter?.value);
127
+ t.ok(decodedAfter, 'validator entry decodes after banValidator');
128
+ if (!decodedAfter || !balanceBefore || !stakedBefore) return;
129
+
130
+ t.is(decodedAfter.isWhitelisted, false, 'validator whitelist flag cleared');
131
+ t.is(decodedAfter.isWriter, false, 'validator writer flag cleared');
132
+ t.is(decodedAfter.isIndexer, false, 'validator indexer flag remains cleared');
133
+ t.ok(b4a.equals(decodedAfter.wk, decodedBefore.wk), 'validator writing key preserved');
134
+
135
+ const expectedBalance = balanceBefore.add(stakedBefore);
136
+ t.ok(expectedBalance, 'validator balance after unstaking computed');
137
+ if (expectedBalance) {
138
+ t.ok(
139
+ b4a.equals(decodedAfter.balance, expectedBalance.value),
140
+ 'validator balance includes unstaked amount'
141
+ );
142
+ }
143
+ t.ok(
144
+ b4a.equals(decodedAfter.stakedBalance, BALANCE_ZERO.value),
145
+ 'validator staked balance cleared after ban'
146
+ );
147
+
148
+ t.ok(!b4a.equals(decodedAfter.license, ZERO_LICENSE), 'validator license retained after ban');
149
+ t.ok(
150
+ b4a.equals(decodedAfter.license, decodedBefore.license),
151
+ 'validator license unchanged after ban'
152
+ );
153
+
154
+ const licenseId = lengthEntryUtils.decodeBE(decodedAfter.license);
155
+ const licenseIndexEntry = await adminPeer.base.view.get(`${EntryType.LICENSE_INDEX}${licenseId}`);
156
+ t.ok(licenseIndexEntry, 'license index entry persists after banValidator');
157
+ if (licenseIndexEntry?.value) {
158
+ const validatorAddressBuffer = addressUtils.addressToBuffer(validatorPeer.wallet.address);
159
+ t.ok(
160
+ b4a.equals(licenseIndexEntry.value, validatorAddressBuffer),
161
+ 'license index still maps to validator address'
162
+ );
163
+ }
164
+
165
+ const shouldCheckRegistry = expectWriterRegistry ?? expectWriterBefore;
166
+ if (shouldCheckRegistry) {
167
+ const registryKey = EntryType.WRITER_ADDRESS + decodedBefore.wk.toString('hex');
168
+ const registryEntry = await adminPeer.base.view.get(registryKey);
169
+ t.ok(registryEntry, 'writer registry entry persists after banValidator');
170
+ if (registryEntry?.value) {
171
+ const validatorAddressBuffer = addressUtils.addressToBuffer(validatorPeer.wallet.address);
172
+ t.ok(
173
+ b4a.equals(registryEntry.value, validatorAddressBuffer),
174
+ 'writer registry maps writing key to validator address'
175
+ );
176
+ }
177
+ }
178
+
179
+ const decodedAdminBefore = nodeEntryUtils.decode(adminEntryBefore.value);
180
+ t.ok(decodedAdminBefore, 'admin entry before banValidator decodes');
181
+ const adminBalanceBefore = toBalance(decodedAdminBefore?.balance);
182
+ t.ok(adminBalanceBefore, 'admin balance before banValidator decodes');
183
+ if (decodedAdminBefore && adminBalanceBefore) {
184
+ const adminEntryAfter = await adminPeer.base.view.get(adminPeer.wallet.address);
185
+ t.ok(adminEntryAfter, 'admin entry exists after banValidator');
186
+ const decodedAdminAfter = nodeEntryUtils.decode(adminEntryAfter?.value);
187
+ t.ok(decodedAdminAfter, 'admin entry decodes after banValidator');
188
+ if (decodedAdminAfter) {
189
+ const expectedAdminBalance = adminBalanceBefore.sub(BALANCE_FEE);
190
+ t.ok(expectedAdminBalance, 'admin balance after fee computation succeeds');
191
+ if (expectedAdminBalance) {
192
+ t.ok(
193
+ b4a.equals(decodedAdminAfter.balance, expectedAdminBalance.value),
194
+ 'admin balance reduced by banValidator fee'
195
+ );
196
+ }
197
+ t.ok(
198
+ b4a.equals(decodedAdminAfter.stakedBalance, decodedAdminBefore.stakedBalance),
199
+ 'admin staked balance unchanged after banValidator'
200
+ );
201
+ }
202
+ }
203
+
204
+ await assertBanValidatorPayloadMetadata(t, adminPeer.base, payload, {
205
+ adminAddress: adminPeer.wallet.address,
206
+ targetAddress: validatorPeer.wallet.address
207
+ });
208
+
209
+ if (!skipSync) {
210
+ await context.sync();
211
+ await assertBannedValidatorReplicated(t, validatorPeer.base, {
212
+ address: validatorPeer.wallet.address,
213
+ writingKey: decodedBefore.wk,
214
+ expectedBalance: expectedBalance?.value,
215
+ expectedLicense: decodedBefore.license
216
+ });
217
+ }
218
+ }
219
+
220
+ export async function assertBanValidatorFailureState(
221
+ t,
222
+ context,
223
+ {
224
+ validatorPeer = selectWriterPeer(context),
225
+ adminPeer = context.adminBootstrap,
226
+ validatorEntryBefore = null,
227
+ adminEntryBefore = null,
228
+ expectedRoles = null,
229
+ allowEntryMutation = false,
230
+ skipSync = false
231
+ } = {}
232
+ ) {
233
+ const validatorSnapshot = validatorEntryBefore ?? context.banValidatorScenario?.validatorEntryBefore ?? null;
234
+ const adminSnapshot = adminEntryBefore ?? context.banValidatorScenario?.adminEntryBefore ?? null;
235
+
236
+ const entry = await adminPeer.base.view.get(validatorPeer.wallet.address);
237
+ t.ok(entry, 'validator entry persists after failed banValidator');
238
+ const decoded = nodeEntryUtils.decode(entry?.value);
239
+ t.ok(decoded, 'validator entry decodes after failed banValidator');
240
+ if (decoded) {
241
+ let expectedWhitelisted = expectedRoles?.isWhitelisted ?? true;
242
+ let expectedWriter = expectedRoles?.isWriter ?? true;
243
+ let expectedIndexer = expectedRoles?.isIndexer ?? false;
244
+
245
+ if (validatorSnapshot?.value) {
246
+ const decodedBefore = nodeEntryUtils.decode(validatorSnapshot.value);
247
+ if (decodedBefore) {
248
+ expectedWhitelisted =
249
+ expectedRoles?.isWhitelisted !== undefined
250
+ ? expectedRoles.isWhitelisted
251
+ : decodedBefore.isWhitelisted;
252
+ expectedWriter =
253
+ expectedRoles?.isWriter !== undefined ? expectedRoles.isWriter : decodedBefore.isWriter;
254
+ expectedIndexer =
255
+ expectedRoles?.isIndexer !== undefined ? expectedRoles.isIndexer : decodedBefore.isIndexer;
256
+ }
257
+ }
258
+
259
+ t.is(decoded.isWhitelisted, expectedWhitelisted, 'validator remains whitelisted after failure');
260
+ t.is(decoded.isWriter, expectedWriter, 'validator retains writer role after failure');
261
+ t.is(decoded.isIndexer, expectedIndexer, 'validator not promoted to indexer after failure');
262
+ }
263
+ if (validatorSnapshot?.value && !allowEntryMutation) {
264
+ t.ok(
265
+ b4a.equals(entry?.value, validatorSnapshot.value),
266
+ 'validator entry remains unchanged after failure'
267
+ );
268
+ }
269
+
270
+ if (adminSnapshot?.value && !allowEntryMutation) {
271
+ const adminEntryAfter = await adminPeer.base.view.get(adminPeer.wallet.address);
272
+ if (adminEntryAfter?.value) {
273
+ t.ok(
274
+ b4a.equals(adminEntryAfter.value, adminSnapshot.value),
275
+ 'admin entry remains unchanged after failure'
276
+ );
277
+ }
278
+ }
279
+
280
+ if (!skipSync) {
281
+ await context.sync();
282
+ const peerEntry = await validatorPeer.base.view.get(validatorPeer.wallet.address);
283
+ t.ok(peerEntry, 'validator entry replicated after failed banValidator');
284
+ if (validatorEntryBefore?.value && peerEntry?.value) {
285
+ t.ok(
286
+ b4a.equals(peerEntry.value, validatorEntryBefore.value),
287
+ 'validator peer sees unchanged entry after failure'
288
+ );
289
+ }
290
+ }
291
+ }
292
+
293
+ export async function applyWithTargetNodeEntryRemoval(context, invalidPayload, { peer = null } = {}) {
294
+ const targetPeer = peer ?? context.banValidatorScenario?.validatorPeer ?? selectWriterPeer(context);
295
+ await applyWithRequesterEntryRemoval(context, invalidPayload, { peer: targetPeer });
296
+ }
297
+
298
+ export async function applyInvalidTargetAddressPayload(context, validPayload) {
299
+ const adminPeer = context.adminBootstrap;
300
+ const decoded = safeDecodeApplyOperation(validPayload);
301
+ if (!decoded?.aco) return;
302
+
303
+ const invalidAddress = b4a.from(decoded.aco.ia); // preserve length
304
+ invalidAddress[0] ^= 0xff; // corrupt address buffer without changing shape
305
+ decoded.aco.ia = invalidAddress;
306
+
307
+ const message = createMessage(
308
+ NETWORK_ID,
309
+ decoded.aco.txv,
310
+ decoded.aco.ia,
311
+ decoded.aco.in,
312
+ OperationType.BAN_VALIDATOR
313
+ );
314
+ const newHash = await blake3Hash(message);
315
+ decoded.aco.tx = newHash;
316
+ decoded.aco.is = adminPeer.wallet.sign(newHash);
317
+
318
+ const invalidPayload = safeEncodeApplyOperation(decoded);
319
+ await adminPeer.base.append(invalidPayload);
320
+ await adminPeer.base.update();
321
+ await eventFlush();
322
+ }
323
+
324
+ export async function applyInvalidIndexerSequenceStatePayload(context, validPayload) {
325
+ const adminPeer = context.adminBootstrap;
326
+ const base = adminPeer.base;
327
+ const originalIndexers = base.system?.indexers;
328
+
329
+ base.system.indexers = null;
330
+ try {
331
+ await adminPeer.base.append(validPayload);
332
+ await adminPeer.base.update();
333
+ await eventFlush();
334
+ } finally {
335
+ base.system.indexers = originalIndexers;
336
+ }
337
+ }
338
+
339
+ export async function promoteValidatorToIndexer(
340
+ context,
341
+ { adminPeer = context.adminBootstrap, validatorPeer = selectWriterPeer(context) } = {}
342
+ ) {
343
+ const txValidity = await deriveIndexerSequenceState(adminPeer.base);
344
+ const payload = await CompleteStateMessageOperations.assembleAddIndexerMessage(
345
+ adminPeer.wallet,
346
+ validatorPeer.wallet.address,
347
+ txValidity
348
+ );
349
+
350
+ await adminPeer.base.append(payload);
351
+ await adminPeer.base.update();
352
+ await eventFlush();
353
+
354
+ const updatedEntry = await adminPeer.base.view.get(validatorPeer.wallet.address);
355
+ if (updatedEntry?.value) {
356
+ context.banValidatorScenario = {
357
+ ...(context.banValidatorScenario ?? {}),
358
+ validatorEntryBefore: { ...updatedEntry, value: b4a.from(updatedEntry.value) }
359
+ };
360
+ }
361
+
362
+ const adminEntry = await adminPeer.base.view.get(adminPeer.wallet.address);
363
+ if (adminEntry?.value) {
364
+ context.banValidatorScenario = {
365
+ ...(context.banValidatorScenario ?? {}),
366
+ adminEntryBefore: { ...adminEntry, value: b4a.from(adminEntry.value) }
367
+ };
368
+ }
369
+
370
+ return payload;
371
+ }
372
+
373
+ export async function applyWithBanValidatorRoleUpdateFailure(context, invalidPayload) {
374
+ const node = context.adminBootstrap ?? context.bootstrap ?? context.peers?.[0] ?? null;
375
+ if (!node?.base) {
376
+ throw new Error('Ban validator role update failure scenario requires a writable node.');
377
+ }
378
+
379
+ const originalSetRole = nodeEntryUtils.setRole;
380
+ let shouldFailNextCall = true;
381
+
382
+ nodeEntryUtils.setRole = function patchedSetRole(...args) {
383
+ if (shouldFailNextCall) {
384
+ shouldFailNextCall = false;
385
+ return null;
386
+ }
387
+ return originalSetRole.apply(this, args);
388
+ };
389
+
390
+ try {
391
+ await node.base.append(invalidPayload);
392
+ await node.base.update();
393
+ await eventFlush();
394
+ } finally {
395
+ nodeEntryUtils.setRole = originalSetRole;
396
+ }
397
+ }
398
+
399
+ export async function applyWithBanValidatorRoleDecodeFailure(context, invalidPayload) {
400
+ const node = context.adminBootstrap ?? context.bootstrap ?? context.peers?.[0] ?? null;
401
+ if (!node?.base) {
402
+ throw new Error('Ban validator role decode failure scenario requires a writable node.');
403
+ }
404
+
405
+ const originalSetRole = nodeEntryUtils.setRole;
406
+ nodeEntryUtils.setRole = function patchedSetRole(...args) {
407
+ // return an intentionally undecodable buffer to hit the decode guard
408
+ return b4a.alloc(1);
409
+ };
410
+
411
+ try {
412
+ await node.base.append(invalidPayload);
413
+ await node.base.update();
414
+ await eventFlush();
415
+ } finally {
416
+ nodeEntryUtils.setRole = originalSetRole;
417
+ }
418
+ }
419
+
420
+ export async function applyWithBanValidatorWithdrawFailure(context, invalidPayload) {
421
+ const targetPeer = context.banValidatorScenario?.validatorPeer ?? selectWriterPeer(context);
422
+ const targetAddress = targetPeer.wallet.address;
423
+ const targetBuffer = addressUtils.addressToBuffer(targetAddress);
424
+ const adminPeer = context.adminBootstrap;
425
+ const base = adminPeer.base;
426
+ const originalApply = base._handlers.apply;
427
+
428
+ base._handlers.apply = async function patchedApply(nodes, view, baseCtx) {
429
+ const originalBatch = view.batch;
430
+ view.batch = function patchedBatch(...args) {
431
+ const batch = originalBatch.apply(this, args);
432
+ if (!batch?.get) return batch;
433
+
434
+ const originalGet = batch.get.bind(batch);
435
+ batch.get = async key => {
436
+ const entry = await originalGet(key);
437
+ if (!entry || !entry.value) return entry;
438
+ if (isTargetKey(key, targetAddress, targetBuffer)) {
439
+ const mutatedValue = nodeEntryUtils.setStakedBalance(
440
+ b4a.from(entry.value),
441
+ BALANCE_ZERO.value
442
+ );
443
+ if (mutatedValue) {
444
+ return { ...entry, value: mutatedValue };
445
+ }
446
+ }
447
+ return entry;
448
+ };
449
+
450
+ return batch;
451
+ };
452
+
453
+ try {
454
+ return await originalApply.call(this, nodes, view, baseCtx);
455
+ } finally {
456
+ view.batch = originalBatch;
457
+ }
458
+ };
459
+
460
+ try {
461
+ await adminPeer.base.append(invalidPayload);
462
+ await adminPeer.base.update();
463
+ await eventFlush();
464
+ } finally {
465
+ base._handlers.apply = originalApply;
466
+ }
467
+ }
468
+
469
+ function isTargetKey(key, targetAddressString, targetAddressBuffer) {
470
+ if (typeof key === 'string') {
471
+ return key === targetAddressString;
472
+ }
473
+ if (b4a.isBuffer(key) && targetAddressBuffer) {
474
+ return b4a.equals(key, targetAddressBuffer);
475
+ }
476
+ return false;
477
+ }
478
+
479
+ async function assertBanValidatorPayloadMetadata(t, base, payload, { adminAddress, targetAddress }) {
480
+ const decodedPayload = safeDecodeApplyOperation(payload);
481
+ t.ok(decodedPayload, 'banValidator payload decodes');
482
+ if (!decodedPayload) return;
483
+
484
+ const requesterAddress = addressUtils.bufferToAddress(decodedPayload.address);
485
+ t.ok(requesterAddress, 'banValidator requester address decodes');
486
+ if (requesterAddress) {
487
+ t.is(requesterAddress, adminAddress, 'banValidator payload signed by admin');
488
+ }
489
+
490
+ const targetAddressDecoded = addressUtils.bufferToAddress(decodedPayload?.aco?.ia);
491
+ t.ok(targetAddressDecoded, 'banValidator target address decodes');
492
+ if (targetAddressDecoded) {
493
+ t.is(targetAddressDecoded, targetAddress, 'banValidator payload targets expected validator');
494
+ }
495
+
496
+ const txHashBuffer = decodedPayload?.aco?.tx;
497
+ t.ok(txHashBuffer, 'banValidator tx hash extracted');
498
+ if (txHashBuffer) {
499
+ const txEntry = await base.view.get(txHashBuffer.toString('hex'));
500
+ t.ok(txEntry, 'banValidator transaction recorded for replay protection');
501
+ }
502
+ }
503
+
504
+ async function assertBannedValidatorReplicated(
505
+ t,
506
+ base,
507
+ { address, writingKey, expectedBalance, expectedLicense }
508
+ ) {
509
+ const entry = await base.view.get(address);
510
+ t.ok(entry, 'validator entry replicated to peer after banValidator');
511
+ const decoded = nodeEntryUtils.decode(entry?.value);
512
+ t.ok(decoded, 'replicated validator entry decodes');
513
+ if (!decoded) return;
514
+ t.is(decoded.isWhitelisted, false, 'replicated entry not whitelisted');
515
+ t.is(decoded.isWriter, false, 'replicated entry writer flag cleared');
516
+ t.is(decoded.isIndexer, false, 'replicated entry indexer flag cleared');
517
+ t.ok(b4a.equals(decoded.wk, writingKey), 'replicated entry preserves writing key');
518
+ t.ok(
519
+ b4a.equals(decoded.stakedBalance, BALANCE_ZERO.value),
520
+ 'replicated entry staked balance cleared'
521
+ );
522
+ if (expectedBalance) {
523
+ t.ok(
524
+ b4a.equals(decoded.balance, expectedBalance),
525
+ 'replicated entry balance matches expected amount'
526
+ );
527
+ }
528
+ if (expectedLicense) {
529
+ t.ok(
530
+ b4a.equals(decoded.license, expectedLicense),
531
+ 'replicated entry license preserved'
532
+ );
533
+ }
534
+ }
@@ -0,0 +1,74 @@
1
+ import { test } from 'brittle';
2
+ import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
3
+ import {
4
+ selectWriterPeer,
5
+ promotePeerToWriter,
6
+ defaultWriterFunding
7
+ } from '../addWriter/addWriterScenarioHelpers.js';
8
+ import {
9
+ setupBanValidatorScenario,
10
+ buildBanValidatorPayload,
11
+ assertBanValidatorSuccessState
12
+ } from './banValidatorScenarioHelpers.js';
13
+ import { initializeBalances, whitelistAddress } from '../common/commonScenarioHelper.js';
14
+
15
+ export default function banValidatorSequentialBansScenario() {
16
+ test('State.apply banValidator processes two sequential bans', async t => {
17
+ const context = await setupBanValidatorScenario(t, { nodes: 3 });
18
+ const adminPeer = context.adminBootstrap;
19
+
20
+ const firstValidator = context.banValidatorScenario?.validatorPeer ?? selectWriterPeer(context);
21
+
22
+ const secondValidator =
23
+ context.peers.find(
24
+ p =>
25
+ p.wallet.address !== adminPeer.wallet.address &&
26
+ p.wallet.address !== firstValidator.wallet.address
27
+ ) ?? null;
28
+ t.ok(secondValidator, 'second validator peer available');
29
+ if (!secondValidator) return;
30
+
31
+ const funding = context.addWriterScenario?.writerInitialBalance ?? defaultWriterFunding;
32
+ await initializeBalances(context, [[secondValidator.wallet.address, funding]]);
33
+ await whitelistAddress(context, secondValidator.wallet.address);
34
+ await promotePeerToWriter(t, context, { readerPeer: secondValidator, expectedWriterIndex: 2 });
35
+
36
+ const firstEntryBefore = await adminPeer.base.view.get(firstValidator.wallet.address);
37
+ const adminEntryBeforeFirst = await adminPeer.base.view.get(adminPeer.wallet.address);
38
+ const payload1 = await buildBanValidatorPayload(context, {
39
+ adminPeer,
40
+ validatorPeer: firstValidator
41
+ });
42
+
43
+ await adminPeer.base.append(payload1);
44
+ await adminPeer.base.update();
45
+ await eventFlush();
46
+
47
+ await assertBanValidatorSuccessState(t, context, {
48
+ validatorPeer: firstValidator,
49
+ adminPeer,
50
+ validatorEntryBefore: firstEntryBefore,
51
+ adminEntryBefore: adminEntryBeforeFirst,
52
+ payload: payload1
53
+ });
54
+
55
+ const secondEntryBefore = await adminPeer.base.view.get(secondValidator.wallet.address);
56
+ const adminEntryBeforeSecond = await adminPeer.base.view.get(adminPeer.wallet.address);
57
+ const payload2 = await buildBanValidatorPayload(context, {
58
+ adminPeer,
59
+ validatorPeer: secondValidator
60
+ });
61
+
62
+ await adminPeer.base.append(payload2);
63
+ await adminPeer.base.update();
64
+ await eventFlush();
65
+
66
+ await assertBanValidatorSuccessState(t, context, {
67
+ validatorPeer: secondValidator,
68
+ adminPeer,
69
+ validatorEntryBefore: secondEntryBefore,
70
+ adminEntryBefore: adminEntryBeforeSecond,
71
+ payload: payload2
72
+ });
73
+ });
74
+ }
@@ -0,0 +1,19 @@
1
+ import OperationValidationScenarioBase from '../common/base/OperationValidationScenarioBase.js';
2
+ import {
3
+ setupBanValidatorScenario,
4
+ buildBanValidatorPayload,
5
+ assertBanValidatorFailureState,
6
+ applyWithBanValidatorRoleDecodeFailure
7
+ } from './banValidatorScenarioHelpers.js';
8
+
9
+ export default function banValidatorTargetDecodeFailureScenario() {
10
+ new OperationValidationScenarioBase({
11
+ title: 'State.apply banValidator rejects payloads when target node entry cannot be decoded after role update',
12
+ setupScenario: setupBanValidatorScenario,
13
+ buildValidPayload: context => buildBanValidatorPayload(context),
14
+ mutatePayload: (_t, payload) => payload,
15
+ applyInvalidPayload: applyWithBanValidatorRoleDecodeFailure,
16
+ assertStateUnchanged: (t, context) => assertBanValidatorFailureState(t, context, { skipSync: true }),
17
+ expectedLogs: ['Failed to decode target node entry.']
18
+ }).performScenario();
19
+ }
@@ -0,0 +1,32 @@
1
+ import OperationValidationScenarioBase from '../common/base/OperationValidationScenarioBase.js';
2
+ import {
3
+ setupBanValidatorScenario,
4
+ buildBanValidatorPayload,
5
+ assertBanValidatorFailureState,
6
+ promoteValidatorToIndexer
7
+ } from './banValidatorScenarioHelpers.js';
8
+ import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
9
+
10
+ export default function banValidatorTargetIndexerScenario() {
11
+ new OperationValidationScenarioBase({
12
+ title: 'State.apply banValidator rejects payloads when target node is an indexer',
13
+ setupScenario: async t => {
14
+ const context = await setupBanValidatorScenario(t);
15
+ await promoteValidatorToIndexer(context);
16
+ return context;
17
+ },
18
+ buildValidPayload: context => buildBanValidatorPayload(context),
19
+ mutatePayload: (_t, payload) => payload,
20
+ applyInvalidPayload: async (context, payload) => {
21
+ await context.adminBootstrap.base.append(payload);
22
+ await context.adminBootstrap.base.update();
23
+ await eventFlush();
24
+ },
25
+ assertStateUnchanged: (t, context) =>
26
+ assertBanValidatorFailureState(t, context, {
27
+ expectedRoles: { isWhitelisted: true, isWriter: true, isIndexer: true },
28
+ skipSync: true
29
+ }),
30
+ expectedLogs: ['Only writer/whitelisted node can be banned.']
31
+ }).performScenario();
32
+ }