trac-msb 0.2.4 → 0.2.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.dockerignore +16 -0
- package/.github/workflows/acceptance-tests.yml +7 -0
- package/.github/workflows/publish.yml +40 -0
- package/.github/workflows/{CI.yml → unit-tests.yml} +1 -1
- package/README.md +175 -50
- package/docker-compose.yml +16 -0
- package/dockerfile +41 -0
- package/docs/fee_distribution.md +89 -0
- package/msb.mjs +12 -14
- package/package.json +8 -4
- package/rpc/constants.mjs +4 -1
- package/rpc/handlers.mjs +109 -66
- package/rpc/routes/v1.mjs +3 -1
- package/rpc/rpc_services.js +126 -0
- package/rpc/utils/confirmedParameter.mjs +17 -0
- package/rpc/utils/url.mjs +38 -0
- package/src/core/network/Network.js +27 -10
- package/src/core/network/identity/NetworkWalletFactory.js +78 -0
- package/src/core/network/services/ConnectionManager.js +2 -2
- package/src/core/network/services/ValidatorObserverService.js +7 -4
- package/src/core/state/State.js +28 -22
- package/src/index.js +197 -385
- package/src/utils/cliCommands.js +280 -0
- package/src/utils/constants.js +3 -1
- package/tests/acceptance/v1/account/account.test.mjs +123 -0
- package/tests/acceptance/v1/balance/balance.test.mjs +55 -0
- package/tests/acceptance/v1/broadcast-transaction/broadcast-transaction.test.mjs +111 -0
- package/tests/acceptance/v1/confirmed-length/confirmed-length.test.mjs +19 -0
- package/tests/acceptance/v1/fee/fee.test.mjs +11 -0
- package/tests/acceptance/v1/rpc.test.mjs +62 -291
- package/tests/acceptance/v1/tx/tx.test.mjs +98 -0
- package/tests/acceptance/v1/tx-details/tx-details.test.mjs +195 -0
- package/tests/acceptance/v1/tx-hashes/tx-hashes.test.mjs +72 -0
- package/tests/acceptance/v1/tx-payloads-bulk/tx-payloads-bulk.test.mjs +27 -0
- package/tests/acceptance/v1/txv/txv.test.mjs +11 -0
- package/tests/acceptance/v1/unconfirmed-length/unconfirmed-length.test.mjs +11 -0
- package/tests/helpers/StateNetworkFactory.js +157 -0
- package/tests/helpers/autobaseTestHelpers.js +369 -0
- package/tests/helpers/createTestSignature.js +12 -0
- package/tests/helpers/transactionPayloads.mjs +78 -0
- package/tests/unit/network/NetworkWalletFactory.test.js +156 -0
- package/tests/unit/state/apply/addAdmin/addAdminHappyPathScenario.js +38 -0
- package/tests/unit/state/apply/addAdmin/addAdminScenarioHelpers.js +273 -0
- package/tests/unit/state/apply/addAdmin/adminEntryEncodingFailureScenario.js +30 -0
- package/tests/unit/state/apply/addAdmin/adminEntryExistsScenario.js +78 -0
- package/tests/unit/state/apply/addAdmin/nodeEntryInitializationFailureScenario.js +30 -0
- package/tests/unit/state/apply/addAdmin/nonBootstrapNodeScenario.js +68 -0
- package/tests/unit/state/apply/addAdmin/state.apply.addAdmin.test.js +155 -0
- package/tests/unit/state/apply/addIndexer/addIndexerHappyPathScenario.js +39 -0
- package/tests/unit/state/apply/addIndexer/addIndexerMultipleIndexersInTheNetworkScenario.js +167 -0
- package/tests/unit/state/apply/addIndexer/addIndexerPretenderAlreadyIndexerScenario.js +21 -0
- package/tests/unit/state/apply/addIndexer/addIndexerPretenderNotWriterScenario.js +21 -0
- package/tests/unit/state/apply/addIndexer/addIndexerRemoveAndReAddScenario.js +186 -0
- package/tests/unit/state/apply/addIndexer/addIndexerScenarioHelpers.js +445 -0
- package/tests/unit/state/apply/addIndexer/addIndexerWriterKeyAlreadyRegisteredScenario.js +32 -0
- package/tests/unit/state/apply/addIndexer/state.apply.addIndexer.test.js +297 -0
- package/tests/unit/state/apply/addWriter/addWriterHappyPathScenario.js +41 -0
- package/tests/unit/state/apply/addWriter/addWriterInvalidValidatorSignatureScenario.js +32 -0
- package/tests/unit/state/apply/addWriter/addWriterNewWkScenario.js +149 -0
- package/tests/unit/state/apply/addWriter/addWriterRequesterAlreadyWriterScenario.js +21 -0
- package/tests/unit/state/apply/addWriter/addWriterRequesterBalanceInsufficientScenario.js +21 -0
- package/tests/unit/state/apply/addWriter/addWriterRequesterEntryDecodeFailureScenario.js +19 -0
- package/tests/unit/state/apply/addWriter/addWriterRequesterEntryMissingScenario.js +19 -0
- package/tests/unit/state/apply/addWriter/addWriterRequesterIndexerScenario.js +21 -0
- package/tests/unit/state/apply/addWriter/addWriterRequesterNotWhitelistedScenario.js +21 -0
- package/tests/unit/state/apply/addWriter/addWriterScenarioHelpers.js +757 -0
- package/tests/unit/state/apply/addWriter/addWriterStakeBalanceUpdateFailureScenario.js +50 -0
- package/tests/unit/state/apply/addWriter/addWriterStakeInsufficientBalanceScenario.js +29 -0
- package/tests/unit/state/apply/addWriter/addWriterStakeInvalidBalanceScenario.js +29 -0
- package/tests/unit/state/apply/addWriter/addWriterStakeInvalidEntryScenario.js +21 -0
- package/tests/unit/state/apply/addWriter/addWriterStakeStakedBalanceFailureScenario.js +37 -0
- package/tests/unit/state/apply/addWriter/addWriterStakeSubtractFailureScenario.js +42 -0
- package/tests/unit/state/apply/addWriter/addWriterValidatorRewardScenario.js +105 -0
- package/tests/unit/state/apply/addWriter/addWriterWriterKeyMismatchScenario.js +54 -0
- package/tests/unit/state/apply/addWriter/addWriterWriterKeyOwnershipScenario.js +54 -0
- package/tests/unit/state/apply/addWriter/addWriterZeroWriterKeyScenario.js +29 -0
- package/tests/unit/state/apply/addWriter/state.apply.addWriter.test.js +309 -0
- package/tests/unit/state/apply/adminRecovery/adminRecoveryHappyPathScenario.js +30 -0
- package/tests/unit/state/apply/adminRecovery/adminRecoveryScenarioHelpers.js +866 -0
- package/tests/unit/state/apply/adminRecovery/state.apply.adminRecovery.test.js +439 -0
- package/tests/unit/state/apply/appendWhitelist/appendWhitelistBanAndReapplyScenario.js +78 -0
- package/tests/unit/state/apply/appendWhitelist/appendWhitelistExistingReaderHappyPathScenario.js +98 -0
- package/tests/unit/state/apply/appendWhitelist/appendWhitelistFeeAfterDisableScenario.js +66 -0
- package/tests/unit/state/apply/appendWhitelist/appendWhitelistHappyPathScenario.js +55 -0
- package/tests/unit/state/apply/appendWhitelist/appendWhitelistInsufficientAdminBalanceScenario.js +103 -0
- package/tests/unit/state/apply/appendWhitelist/appendWhitelistNodeAlreadyWhitelistedScenario.js +60 -0
- package/tests/unit/state/apply/appendWhitelist/appendWhitelistScenarioHelpers.js +191 -0
- package/tests/unit/state/apply/appendWhitelist/state.apply.appendWhitelist.test.js +220 -0
- package/tests/unit/state/apply/balanceInitialization/balanceInitializationHappyPathScenario.js +82 -0
- package/tests/unit/state/apply/balanceInitialization/balanceInitializationScenarioHelpers.js +106 -0
- package/tests/unit/state/apply/balanceInitialization/invalidAmountScenario.js +45 -0
- package/tests/unit/state/apply/balanceInitialization/nodeEntryBalanceUpdateFailureScenario.js +81 -0
- package/tests/unit/state/apply/balanceInitialization/state.apply.balanceInitialization.test.js +189 -0
- package/tests/unit/state/apply/banValidator/banValidatorBanAndReWhitelistScenario.js +155 -0
- package/tests/unit/state/apply/banValidator/banValidatorHappyPathScenario.js +36 -0
- package/tests/unit/state/apply/banValidator/banValidatorScenarioHelpers.js +534 -0
- package/tests/unit/state/apply/banValidator/banValidatorSequentialBansScenario.js +74 -0
- package/tests/unit/state/apply/banValidator/banValidatorTargetDecodeFailureScenario.js +19 -0
- package/tests/unit/state/apply/banValidator/banValidatorTargetIndexerScenario.js +32 -0
- package/tests/unit/state/apply/banValidator/banValidatorTargetNodeEntryMissingScenario.js +19 -0
- package/tests/unit/state/apply/banValidator/banValidatorTargetRoleUpdateFailureScenario.js +19 -0
- package/tests/unit/state/apply/banValidator/banValidatorWhitelistedNonWriterScenario.js +38 -0
- package/tests/unit/state/apply/banValidator/banValidatorWhitelistedZeroBalanceScenario.js +91 -0
- package/tests/unit/state/apply/banValidator/banValidatorWithdrawFailureScenario.js +19 -0
- package/tests/unit/state/apply/banValidator/state.apply.banValidator.test.js +266 -0
- package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentDuplicateRegistrationScenario.js +142 -0
- package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentHappyPathScenario.js +26 -0
- package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentIncompleteOperationScenario.js +94 -0
- package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentInvalidDeploymentEntryScenario.js +37 -0
- package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentMultipleBootstrapScenario.js +86 -0
- package/tests/unit/state/apply/bootstrapDeployment/bootstrapDeploymentScenarioHelpers.js +344 -0
- package/tests/unit/state/apply/bootstrapDeployment/invalidValidatorNodeEntryScenario.js +57 -0
- package/tests/unit/state/apply/bootstrapDeployment/state.apply.bootstrapDeployment.test.js +429 -0
- package/tests/unit/state/apply/common/access-control/adminConsistencyMismatchScenario.js +119 -0
- package/tests/unit/state/apply/common/access-control/adminEntryDecodeFailureScenario.js +130 -0
- package/tests/unit/state/apply/common/access-control/adminEntryExistsScenario.js +93 -0
- package/tests/unit/state/apply/common/access-control/adminEntryMissingScenario.js +108 -0
- package/tests/unit/state/apply/common/access-control/adminOnlyGuardScenario.js +126 -0
- package/tests/unit/state/apply/common/access-control/adminPublicKeyDecodeFailureScenario.js +120 -0
- package/tests/unit/state/apply/common/access-control/roleAccessOperationValidationScenario.js +50 -0
- package/tests/unit/state/apply/common/adminControlOperationValidationScenario.js +56 -0
- package/tests/unit/state/apply/common/balances/adminEntryUpdateFailureScenario.js +52 -0
- package/tests/unit/state/apply/common/balances/base/requesterBalanceScenarioBase.js +197 -0
- package/tests/unit/state/apply/common/balances/feeDecodeFailureScenario.js +52 -0
- package/tests/unit/state/apply/common/balances/requesterBalanceDecodeFailureScenario.js +15 -0
- package/tests/unit/state/apply/common/balances/requesterBalanceFeeApplicationFailureScenario.js +11 -0
- package/tests/unit/state/apply/common/balances/requesterBalanceInsufficientScenario.js +15 -0
- package/tests/unit/state/apply/common/balances/requesterBalanceUpdateFailureScenario.js +11 -0
- package/tests/unit/state/apply/common/balances/validatorEntryRewardFailureScenario.js +11 -0
- package/tests/unit/state/apply/common/balances/validatorEntryUpdateFailureScenario.js +11 -0
- package/tests/unit/state/apply/common/balances/validatorNodeEntryDecodeFailureScenario.js +40 -0
- package/tests/unit/state/apply/common/base/OperationValidationScenarioBase.js +114 -0
- package/tests/unit/state/apply/common/commonScenarioHelper.js +103 -0
- package/tests/unit/state/apply/common/indexer/indexerNodeEntryDecodeFailureScenario.js +36 -0
- package/tests/unit/state/apply/common/indexer/indexerNodeEntryMissingScenario.js +36 -0
- package/tests/unit/state/apply/common/indexer/indexerRoleUpdateFailureScenario.js +29 -0
- package/tests/unit/state/apply/common/indexer/indexerSequenceStateInvalidScenario.js +66 -0
- package/tests/unit/state/apply/common/invalidMessageComponentValidationScenario.js +84 -0
- package/tests/unit/state/apply/common/nodeEntryInitializationFailureScenario.js +47 -0
- package/tests/unit/state/apply/common/operationAlreadyAppliedScenario.js +85 -0
- package/tests/unit/state/apply/common/payload-structure/addressWithInvalidPublicKeyScenario.js +52 -0
- package/tests/unit/state/apply/common/payload-structure/initializationDisabledScenario.js +49 -0
- package/tests/unit/state/apply/common/payload-structure/invalidAddressValidationScenario.js +73 -0
- package/tests/unit/state/apply/common/payload-structure/invalidHashValidationScenario.js +71 -0
- package/tests/unit/state/apply/common/payload-structure/invalidPayloadValidationScenario.js +31 -0
- package/tests/unit/state/apply/common/payload-structure/invalidSignatureValidationScenario.js +142 -0
- package/tests/unit/state/apply/common/payload-structure/partialOperationValidationScenario.js +87 -0
- package/tests/unit/state/apply/common/requester/requesterNodeEntryBufferMissingScenario.js +70 -0
- package/tests/unit/state/apply/common/requester/requesterNodeEntryDecodeFailureScenario.js +72 -0
- package/tests/unit/state/apply/common/requester/requesterNodeEntryMissingScenario.js +36 -0
- package/tests/unit/state/apply/common/requesterAddressValidationScenario.js +44 -0
- package/tests/unit/state/apply/common/requesterPublicKeyValidationScenario.js +25 -0
- package/tests/unit/state/apply/common/transactionValidityMismatchScenario.js +98 -0
- package/tests/unit/state/apply/common/validatorConsistency/base/validatorConsistencyScenarioBase.js +201 -0
- package/tests/unit/state/apply/common/validatorConsistency/validatorEntryDecodeFailureScenario.js +17 -0
- package/tests/unit/state/apply/common/validatorConsistency/validatorEntryMissingScenario.js +44 -0
- package/tests/unit/state/apply/common/validatorConsistency/validatorInactiveScenario.js +19 -0
- package/tests/unit/state/apply/common/validatorConsistency/validatorWriterKeyMismatchScenario.js +18 -0
- package/tests/unit/state/apply/common/validatorEntryValidation/base/validatorEntryValidationScenarioBase.js +314 -0
- package/tests/unit/state/apply/common/validatorEntryValidation/validatorEntryInvalidBalanceScenario.js +18 -0
- package/tests/unit/state/apply/common/writerKeyExistsValidationScenario.js +43 -0
- package/tests/unit/state/apply/disableInitialization/disableInitializationAlreadyDisabledScenario.js +53 -0
- package/tests/unit/state/apply/disableInitialization/disableInitializationHappyPathScenario.js +24 -0
- package/tests/unit/state/apply/disableInitialization/disableInitializationScenarioHelpers.js +197 -0
- package/tests/unit/state/apply/disableInitialization/state.apply.disableInitialization.test.js +161 -0
- package/tests/unit/state/apply/missing-tests.md +18 -0
- package/tests/unit/state/apply/removeIndexer/removeIndexerHappyPathScenario.js +58 -0
- package/tests/unit/state/apply/removeIndexer/removeIndexerReAddAndRemoveAgainScenario.js +98 -0
- package/tests/unit/state/apply/removeIndexer/removeIndexerRemoveMultipleIndexersScenario.js +167 -0
- package/tests/unit/state/apply/removeIndexer/removeIndexerScenarioHelpers.js +428 -0
- package/tests/unit/state/apply/removeIndexer/removeIndexerTargetNotIndexerScenario.js +22 -0
- package/tests/unit/state/apply/removeIndexer/removeIndexerWriterKeyMissingScenario.js +20 -0
- package/tests/unit/state/apply/removeIndexer/state.apply.removeIndexer.test.js +291 -0
- package/tests/unit/state/apply/removeWriter/removeWriterAndAddWriterAgainScenario.js +87 -0
- package/tests/unit/state/apply/removeWriter/removeWriterHappyPathScenario.js +38 -0
- package/tests/unit/state/apply/removeWriter/removeWriterInvalidValidatorSignatureScenario.js +32 -0
- package/tests/unit/state/apply/removeWriter/removeWriterRequesterBalanceInsufficientScenario.js +21 -0
- package/tests/unit/state/apply/removeWriter/removeWriterRequesterEntryDecodeFailureScenario.js +19 -0
- package/tests/unit/state/apply/removeWriter/removeWriterRequesterEntryMissingScenario.js +19 -0
- package/tests/unit/state/apply/removeWriter/removeWriterRequesterIndexerScenario.js +21 -0
- package/tests/unit/state/apply/removeWriter/removeWriterRequesterNotWriterScenario.js +21 -0
- package/tests/unit/state/apply/removeWriter/removeWriterRequesterRoleUpdateFailureScenario.js +19 -0
- package/tests/unit/state/apply/removeWriter/removeWriterScenarioHelpers.js +344 -0
- package/tests/unit/state/apply/removeWriter/removeWriterThroughWriterValidatorScenario.js +113 -0
- package/tests/unit/state/apply/removeWriter/removeWriterUnstakeFailureScenario.js +33 -0
- package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyMismatchScenario.js +21 -0
- package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyOwnershipScenario.js +26 -0
- package/tests/unit/state/apply/removeWriter/removeWriterWriterKeyRegistryMissingScenario.js +22 -0
- package/tests/unit/state/apply/removeWriter/state.apply.removeWriter.test.js +307 -0
- package/tests/unit/state/apply/state.apply.test.js +24 -0
- package/tests/unit/state/apply/transfer/state.apply.transfer.test.js +819 -0
- package/tests/unit/state/apply/transfer/transferContractSchemaValidationScenario.js +22 -0
- package/tests/unit/state/apply/transfer/transferDoubleSpendAcrossValidatorsScenario.js +137 -0
- package/tests/unit/state/apply/transfer/transferDoubleSpendSameBatchScenario.js +63 -0
- package/tests/unit/state/apply/transfer/transferDoubleSpendSingleValidatorScenario.js +67 -0
- package/tests/unit/state/apply/transfer/transferExistingRecipientAmountScenario.js +31 -0
- package/tests/unit/state/apply/transfer/transferExistingRecipientZeroAmountScenario.js +31 -0
- package/tests/unit/state/apply/transfer/transferHandlerGuardScenarios.js +22 -0
- package/tests/unit/state/apply/transfer/transferHappyPathScenario.js +8 -0
- package/tests/unit/state/apply/transfer/transferInvalidIncomingDataScenario.js +66 -0
- package/tests/unit/state/apply/transfer/transferNewRecipientAmountScenario.js +31 -0
- package/tests/unit/state/apply/transfer/transferNewRecipientZeroAmountScenario.js +31 -0
- package/tests/unit/state/apply/transfer/transferScenarioHelpers.js +1167 -0
- package/tests/unit/state/apply/transfer/transferSelfTransferAmountScenario.js +38 -0
- package/tests/unit/state/apply/transfer/transferSelfTransferZeroAmountScenario.js +38 -0
- package/tests/unit/state/apply/transfer/transferValidatorRecipientAmountScenario.js +38 -0
- package/tests/unit/state/apply/transfer/transferValidatorRecipientZeroAmountScenario.js +38 -0
- package/tests/unit/state/apply/txOperation/state.apply.txOperation.test.js +318 -0
- package/tests/unit/state/apply/txOperation/txOperationBootstrapNotRegisteredScenario.js +70 -0
- package/tests/unit/state/apply/txOperation/txOperationDifferentValidatorCreatorHappyPathScenario.js +23 -0
- package/tests/unit/state/apply/txOperation/txOperationInvalidDeploymentEntryScenario.js +48 -0
- package/tests/unit/state/apply/txOperation/txOperationInvalidFeeAmountScenario.js +39 -0
- package/tests/unit/state/apply/txOperation/txOperationInvalidSubnetCreatorAddressScenario.js +46 -0
- package/tests/unit/state/apply/txOperation/txOperationRequesterCreatorHappyPathScenario.js +21 -0
- package/tests/unit/state/apply/txOperation/txOperationScenarioHelpers.js +429 -0
- package/tests/unit/state/apply/txOperation/txOperationStandardHappyPathScenario.js +21 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddCreatorBalanceFailureScenario.js +26 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddValidatorBalanceFailureScenario.js +25 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeAddValidatorBonusFailureScenario.js +27 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeCreatorEntryScenario.js +18 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeRequesterEntryScenario.js +17 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeDecodeValidatorEntryScenario.js +31 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeGuardBypassScenario.js +49 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeGuardScenarioFactory.js +92 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeInsufficientRequesterBalanceScenario.js +28 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidCreatorBalanceScenario.js +29 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidRequesterBalanceScenario.js +28 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidRequesterEntryScenario.js +17 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeInvalidValidatorBalanceScenario.js +33 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeMissingCreatorEntryScenario.js +18 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeSubtractFailureScenario.js +25 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateCreatorBalanceFailureScenario.js +26 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateFailureScenario.js +25 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateValidatorBalanceFailureScenario.js +26 -0
- package/tests/unit/state/apply/txOperation/txOperationTransferFeeUpdateValidatorBonusFailureScenario.js +27 -0
- package/tests/unit/state/apply/txOperation/txOperationValidatorCreatorHappyPathScenario.js +21 -0
- package/tests/unit/state/stateModule.test.js +1 -0
- package/tests/unit/state/stateTestUtils.js +5 -1
- package/.env +0 -3
package/tests/unit/state/apply/disableInitialization/state.apply.disableInitialization.test.js
ADDED
|
@@ -0,0 +1,161 @@
|
|
|
1
|
+
import InvalidPayloadValidationScenario from '../common/payload-structure/invalidPayloadValidationScenario.js';
|
|
2
|
+
import AdminEntryDecodeFailureScenario from '../common/access-control/adminEntryDecodeFailureScenario.js';
|
|
3
|
+
import AdminPublicKeyDecodeFailureScenario from '../common/access-control/adminPublicKeyDecodeFailureScenario.js';
|
|
4
|
+
import AdminOnlyGuardScenario from '../common/access-control/adminOnlyGuardScenario.js';
|
|
5
|
+
import AdminConsistencyMismatchScenario from '../common/access-control/adminConsistencyMismatchScenario.js';
|
|
6
|
+
import InvalidHashValidationScenario from '../common/payload-structure/invalidHashValidationScenario.js';
|
|
7
|
+
import InvalidSignatureValidationScenario, { SignatureMutationStrategy } from '../common/payload-structure/invalidSignatureValidationScenario.js';
|
|
8
|
+
import TransactionValidityMismatchScenario from '../common/transactionValidityMismatchScenario.js';
|
|
9
|
+
import OperationAlreadyAppliedScenario from '../common/operationAlreadyAppliedScenario.js';
|
|
10
|
+
import RequesterAddressValidationScenario from '../common/requesterAddressValidationScenario.js';
|
|
11
|
+
import createRequesterPublicKeyValidationScenario from '../common/requesterPublicKeyValidationScenario.js';
|
|
12
|
+
import IndexerSequenceStateInvalidScenario from '../common/indexer/indexerSequenceStateInvalidScenario.js';
|
|
13
|
+
import disableInitializationHappyPathScenario from './disableInitializationHappyPathScenario.js';
|
|
14
|
+
import disableInitializationAlreadyDisabledScenario from './disableInitializationAlreadyDisabledScenario.js';
|
|
15
|
+
import {
|
|
16
|
+
setupDisableInitializationScenario,
|
|
17
|
+
buildDisableInitializationPayload,
|
|
18
|
+
buildDisableInitializationPayloadWithTxValidity,
|
|
19
|
+
mutateDisableInitializationPayloadForInvalidSchema,
|
|
20
|
+
assertDisableInitializationFailureState,
|
|
21
|
+
assertInitializationDisabledState,
|
|
22
|
+
bypassDisableInitializationAlreadyDisabledGuardOnce
|
|
23
|
+
} from './disableInitializationScenarioHelpers.js';
|
|
24
|
+
|
|
25
|
+
disableInitializationHappyPathScenario();
|
|
26
|
+
|
|
27
|
+
new InvalidPayloadValidationScenario({
|
|
28
|
+
title: 'State.apply disableInitialization rejects payloads that fail schema validation',
|
|
29
|
+
setupScenario: setupDisableInitializationScenario,
|
|
30
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
31
|
+
mutatePayload: mutateDisableInitializationPayloadForInvalidSchema,
|
|
32
|
+
assertStateUnchanged: assertDisableInitializationFailureState,
|
|
33
|
+
expectedLogs: ['Schema validation failed.']
|
|
34
|
+
}).performScenario();
|
|
35
|
+
|
|
36
|
+
disableInitializationAlreadyDisabledScenario();
|
|
37
|
+
|
|
38
|
+
new RequesterAddressValidationScenario({
|
|
39
|
+
title: 'State.apply disableInitialization requester address is invalid',
|
|
40
|
+
setupScenario: setupDisableInitializationScenario,
|
|
41
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
42
|
+
assertStateUnchanged: assertDisableInitializationFailureState,
|
|
43
|
+
expectedLogs: ['Failed to validate requester address.']
|
|
44
|
+
}).performScenario();
|
|
45
|
+
|
|
46
|
+
createRequesterPublicKeyValidationScenario({
|
|
47
|
+
title: 'State.apply disableInitialization requester public key is invalid',
|
|
48
|
+
setupScenario: setupDisableInitializationScenario,
|
|
49
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
50
|
+
assertStateUnchanged: assertDisableInitializationFailureState,
|
|
51
|
+
expectedLogs: ['Failed to decode requester public key.']
|
|
52
|
+
}).performScenario();
|
|
53
|
+
|
|
54
|
+
new AdminEntryDecodeFailureScenario({
|
|
55
|
+
title: 'State.apply disableInitialization aborts when admin entry cannot be decoded',
|
|
56
|
+
setupScenario: setupDisableInitializationScenario,
|
|
57
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
58
|
+
assertStateUnchanged: (t, context, validPayload) =>
|
|
59
|
+
assertDisableInitializationFailureState(t, context, { skipSync: true, validPayload }),
|
|
60
|
+
expectedLogs: ['Failed to decode admin entry.']
|
|
61
|
+
}).performScenario();
|
|
62
|
+
|
|
63
|
+
new AdminOnlyGuardScenario({
|
|
64
|
+
title: 'State.apply disableInitialization rejects non-admin nodes',
|
|
65
|
+
setupScenario: setupDisableInitializationScenario,
|
|
66
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
67
|
+
assertStateUnchanged: (t, context, validPayload) =>
|
|
68
|
+
assertDisableInitializationFailureState(t, context, { skipSync: true, validPayload }),
|
|
69
|
+
expectedLogs: ['Node is not allowed to perform this operation. (ADMIN ONLY)']
|
|
70
|
+
}).performScenario();
|
|
71
|
+
|
|
72
|
+
new AdminPublicKeyDecodeFailureScenario({
|
|
73
|
+
title: 'State.apply disableInitialization aborts when admin public key cannot be decoded',
|
|
74
|
+
setupScenario: setupDisableInitializationScenario,
|
|
75
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
76
|
+
assertStateUnchanged: (t, context, validPayload) =>
|
|
77
|
+
assertDisableInitializationFailureState(t, context, { skipSync: true, validPayload }),
|
|
78
|
+
expectedLogs: ['Failed to decode admin public key.']
|
|
79
|
+
}).performScenario();
|
|
80
|
+
|
|
81
|
+
new AdminConsistencyMismatchScenario({
|
|
82
|
+
title: 'State.apply disableInitialization rejects when admin key mismatch occurs',
|
|
83
|
+
setupScenario: setupDisableInitializationScenario,
|
|
84
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
85
|
+
assertStateUnchanged: (t, context, validPayload) =>
|
|
86
|
+
assertDisableInitializationFailureState(t, context, { skipSync: true, validPayload }),
|
|
87
|
+
expectedLogs: ['System admin and node public keys do not match.']
|
|
88
|
+
}).performScenario();
|
|
89
|
+
|
|
90
|
+
new InvalidHashValidationScenario({
|
|
91
|
+
title: 'State.apply disableInitialization requester message hash mismatch',
|
|
92
|
+
setupScenario: setupDisableInitializationScenario,
|
|
93
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
94
|
+
assertStateUnchanged: assertDisableInitializationFailureState,
|
|
95
|
+
expectedLogs: ['Message hash does not match the tx_hash.']
|
|
96
|
+
}).performScenario();
|
|
97
|
+
|
|
98
|
+
new InvalidSignatureValidationScenario({
|
|
99
|
+
title: 'State.apply disableInitialization requester signature is invalid (foreign signature)',
|
|
100
|
+
setupScenario: setupDisableInitializationScenario,
|
|
101
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
102
|
+
assertStateUnchanged: assertDisableInitializationFailureState,
|
|
103
|
+
expectedLogs: ['Failed to verify message signature.']
|
|
104
|
+
}).performScenario();
|
|
105
|
+
|
|
106
|
+
new InvalidSignatureValidationScenario({
|
|
107
|
+
title: 'State.apply disableInitialization requester signature is invalid (zero fill)',
|
|
108
|
+
setupScenario: setupDisableInitializationScenario,
|
|
109
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
110
|
+
assertStateUnchanged: assertDisableInitializationFailureState,
|
|
111
|
+
strategy: SignatureMutationStrategy.ZERO_FILL,
|
|
112
|
+
expectedLogs: ['Failed to verify message signature.']
|
|
113
|
+
}).performScenario();
|
|
114
|
+
|
|
115
|
+
new InvalidSignatureValidationScenario({
|
|
116
|
+
title: 'State.apply disableInitialization requester signature is invalid (type mismatch)',
|
|
117
|
+
setupScenario: setupDisableInitializationScenario,
|
|
118
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
119
|
+
assertStateUnchanged: assertDisableInitializationFailureState,
|
|
120
|
+
strategy: SignatureMutationStrategy.TYPE_MISMATCH,
|
|
121
|
+
expectedLogs: ['Failed to verify message signature.']
|
|
122
|
+
}).performScenario();
|
|
123
|
+
|
|
124
|
+
new IndexerSequenceStateInvalidScenario({
|
|
125
|
+
title: 'State.apply disableInitialization rejects payload when indexer sequence state is invalid',
|
|
126
|
+
setupScenario: setupDisableInitializationScenario,
|
|
127
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
128
|
+
assertStateUnchanged: (t, context, validPayload, invalidPayload) =>
|
|
129
|
+
assertDisableInitializationFailureState(t, context, {
|
|
130
|
+
skipSync: true,
|
|
131
|
+
validPayload: invalidPayload ?? validPayload
|
|
132
|
+
}),
|
|
133
|
+
expectedLogs: ['Indexer sequence state is invalid.']
|
|
134
|
+
}).performScenario();
|
|
135
|
+
|
|
136
|
+
new TransactionValidityMismatchScenario({
|
|
137
|
+
title: 'State.apply disableInitialization rejects payload when tx validity mismatches indexer state',
|
|
138
|
+
setupScenario: setupDisableInitializationScenario,
|
|
139
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
140
|
+
assertStateUnchanged: assertDisableInitializationFailureState,
|
|
141
|
+
rebuildPayloadWithTxValidity: ({ context, mutatedTxValidity }) =>
|
|
142
|
+
buildDisableInitializationPayloadWithTxValidity(context, mutatedTxValidity),
|
|
143
|
+
expectedLogs: ['Transaction was not executed.']
|
|
144
|
+
}).performScenario();
|
|
145
|
+
|
|
146
|
+
new OperationAlreadyAppliedScenario({
|
|
147
|
+
title: 'State.apply disableInitialization rejects duplicate operations',
|
|
148
|
+
setupScenario: setupDisableInitializationScenario,
|
|
149
|
+
buildValidPayload: buildDisableInitializationPayload,
|
|
150
|
+
assertStateUnchanged: async (t, context, validPayload) => {
|
|
151
|
+
const adminNode = context.adminBootstrap;
|
|
152
|
+
const readerNode = context.peers?.[1];
|
|
153
|
+
await assertInitializationDisabledState(t, adminNode.base, validPayload);
|
|
154
|
+
if (readerNode) {
|
|
155
|
+
await context.sync();
|
|
156
|
+
await assertInitializationDisabledState(t, readerNode.base, validPayload);
|
|
157
|
+
}
|
|
158
|
+
},
|
|
159
|
+
beforeInvalidApply: ({ context }) => bypassDisableInitializationAlreadyDisabledGuardOnce(context),
|
|
160
|
+
expectedLogs: ['Operation has already been applied.']
|
|
161
|
+
}).performScenario();
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# Missing guard coverage in `src/core/state/State.js`
|
|
2
|
+
|
|
3
|
+
Unit tests under `tests/unit/state/apply` still lack scenarios for these guard logs:
|
|
4
|
+
|
|
5
|
+
- `handleApplyInitializeBalanceOperation`: “Invalid requester message.”
|
|
6
|
+
- `handleApplyDisableBalanceInitializationOperation`: “Invalid requester message.”
|
|
7
|
+
- `handleApplyAddAdminOperation`: “Invalid requester message.”, “Something went wrong while updating license index.”, “Something went wrong while updating writers index.”
|
|
8
|
+
- `handleApplyAddIndexerOperation`: “Invalid requester message.”
|
|
9
|
+
- `handleApplyRemoveIndexerOperation`: “Invalid requester message.”
|
|
10
|
+
- `handleApplyAddWriterOperation` / `#addWriter`: “Invalid requester message.”, “Invalid validator message.”, “Failed to add writer.”, “Add writer operation ignored.”, “Failed to update node entry with a writer role.”, “Something went wrong while updating writers index.”
|
|
11
|
+
- `handleApplyRemoveWriterOperation` / `#removeWriter`: “Invalid requester message.”, “Invalid validator message.”, “Failed to remove writer.”, “Remove writer operation ignored.”, “Failed to decode validator node entry.”
|
|
12
|
+
- `handleApplyBanValidatorOperation`: “Invalid requester message.”
|
|
13
|
+
- `handleApplyBootstrapDeploymentOperation`: “Invalid requester message.”, “Invalid validator message.”
|
|
14
|
+
- `handleApplyTxOperation`: “Invalid requester message.”, “Invalid validator message.”
|
|
15
|
+
- `handleApplyTransferOperation`: “Invalid requester message.”, “Invalid validator message.”
|
|
16
|
+
- `#withdrawStakedBalanceApply`: “Invalid staked balance.”, “No staked balance to unstake.”, “Invalid current balance.”, “Failed to add staked balance to current balance.”
|
|
17
|
+
- `#validatorPenaltyApply`: “Admin entry not found.”, “Admin cannot be penalized.”
|
|
18
|
+
- `#transferFeeTxOperation`: “Invalid incoming data.”
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
import b4a from 'b4a';
|
|
2
|
+
import { test } from 'brittle';
|
|
3
|
+
import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
|
|
4
|
+
import { EntryType } from '../../../../../src/utils/constants.js';
|
|
5
|
+
import { selectIndexerCandidatePeer } from '../addIndexer/addIndexerScenarioHelpers.js';
|
|
6
|
+
import {
|
|
7
|
+
setupRemoveIndexerScenario,
|
|
8
|
+
buildRemoveIndexerPayload,
|
|
9
|
+
assertRemoveIndexerSuccessState
|
|
10
|
+
} from './removeIndexerScenarioHelpers.js';
|
|
11
|
+
|
|
12
|
+
export default function removeIndexerHappyPathScenario() {
|
|
13
|
+
test('State.apply removeIndexer downgrades indexers to writers (happy path)', async t => {
|
|
14
|
+
const context = await setupRemoveIndexerScenario(t);
|
|
15
|
+
const adminPeer = context.adminBootstrap;
|
|
16
|
+
const indexerPeer =
|
|
17
|
+
context.removeIndexerScenario?.indexerPeer ?? selectIndexerCandidatePeer(context);
|
|
18
|
+
|
|
19
|
+
const indexerEntryBefore =
|
|
20
|
+
context.removeIndexerScenario?.indexerEntryBeforeRemoval ??
|
|
21
|
+
(await adminPeer.base.view.get(indexerPeer.wallet.address));
|
|
22
|
+
t.ok(indexerEntryBefore, 'indexer entry exists before removeIndexer');
|
|
23
|
+
|
|
24
|
+
const adminEntryBefore =
|
|
25
|
+
context.removeIndexerScenario?.adminEntryBeforeRemoval ??
|
|
26
|
+
(await adminPeer.base.view.get(adminPeer.wallet.address));
|
|
27
|
+
t.ok(adminEntryBefore, 'admin entry exists before removeIndexer');
|
|
28
|
+
|
|
29
|
+
const writersLengthBefore =
|
|
30
|
+
context.removeIndexerScenario?.writersLengthBeforeRemoval ??
|
|
31
|
+
(await readWritersLength(adminPeer.base));
|
|
32
|
+
|
|
33
|
+
const payload = await buildRemoveIndexerPayload(context, {
|
|
34
|
+
indexerPeer,
|
|
35
|
+
adminPeer
|
|
36
|
+
});
|
|
37
|
+
|
|
38
|
+
await adminPeer.base.append(payload);
|
|
39
|
+
await adminPeer.base.update();
|
|
40
|
+
await eventFlush();
|
|
41
|
+
|
|
42
|
+
await assertRemoveIndexerSuccessState(t, context, {
|
|
43
|
+
indexerPeer,
|
|
44
|
+
adminPeer,
|
|
45
|
+
indexerEntryBefore: { value: b4a.from(indexerEntryBefore.value) },
|
|
46
|
+
adminEntryBefore: { value: b4a.from(adminEntryBefore.value) },
|
|
47
|
+
payload,
|
|
48
|
+
writersLengthBefore,
|
|
49
|
+
skipSync: true
|
|
50
|
+
});
|
|
51
|
+
});
|
|
52
|
+
}
|
|
53
|
+
|
|
54
|
+
async function readWritersLength(base) {
|
|
55
|
+
const entry = await base.view.get(EntryType.WRITERS_LENGTH);
|
|
56
|
+
if (!entry?.value) return 0;
|
|
57
|
+
return entry.value.readUInt32BE();
|
|
58
|
+
}
|
|
@@ -0,0 +1,98 @@
|
|
|
1
|
+
import b4a from 'b4a';
|
|
2
|
+
import { test } from 'brittle';
|
|
3
|
+
import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
|
|
4
|
+
import { EntryType } from '../../../../../src/utils/constants.js';
|
|
5
|
+
import {
|
|
6
|
+
setupRemoveIndexerScenario,
|
|
7
|
+
buildRemoveIndexerPayload,
|
|
8
|
+
assertRemoveIndexerSuccessState
|
|
9
|
+
} from './removeIndexerScenarioHelpers.js';
|
|
10
|
+
import {
|
|
11
|
+
buildAddIndexerPayload,
|
|
12
|
+
assertAddIndexerSuccessState,
|
|
13
|
+
selectIndexerCandidatePeer
|
|
14
|
+
} from '../addIndexer/addIndexerScenarioHelpers.js';
|
|
15
|
+
|
|
16
|
+
export default function removeIndexerReAddAndRemoveAgainScenario() {
|
|
17
|
+
test('State.apply removeIndexer can re-downgrade a re-promoted indexer without index drift', async t => {
|
|
18
|
+
const context = await setupRemoveIndexerScenario(t, { nodes: 4 });
|
|
19
|
+
const adminPeer = context.adminBootstrap;
|
|
20
|
+
const indexerPeer =
|
|
21
|
+
context.removeIndexerScenario?.indexerPeer ?? selectIndexerCandidatePeer(context);
|
|
22
|
+
|
|
23
|
+
// First removeIndexer
|
|
24
|
+
const writersLengthBeforeFirstRemove =
|
|
25
|
+
context.removeIndexerScenario?.writersLengthBeforeRemoval ??
|
|
26
|
+
(await readWritersLength(adminPeer.base));
|
|
27
|
+
const indexerEntryBeforeFirstRemove =
|
|
28
|
+
context.removeIndexerScenario?.indexerEntryBeforeRemoval ??
|
|
29
|
+
(await adminPeer.base.view.get(indexerPeer.wallet.address));
|
|
30
|
+
const adminEntryBeforeFirstRemove =
|
|
31
|
+
context.removeIndexerScenario?.adminEntryBeforeRemoval ??
|
|
32
|
+
(await adminPeer.base.view.get(adminPeer.wallet.address));
|
|
33
|
+
|
|
34
|
+
const firstRemovePayload = await buildRemoveIndexerPayload(context, {
|
|
35
|
+
indexerPeer,
|
|
36
|
+
adminPeer
|
|
37
|
+
});
|
|
38
|
+
await adminPeer.base.append(firstRemovePayload);
|
|
39
|
+
await adminPeer.base.update();
|
|
40
|
+
await eventFlush();
|
|
41
|
+
|
|
42
|
+
await assertRemoveIndexerSuccessState(t, context, {
|
|
43
|
+
indexerPeer,
|
|
44
|
+
adminPeer,
|
|
45
|
+
indexerEntryBefore: { value: b4a.from(indexerEntryBeforeFirstRemove.value) },
|
|
46
|
+
adminEntryBefore: { value: b4a.from(adminEntryBeforeFirstRemove.value) },
|
|
47
|
+
payload: firstRemovePayload,
|
|
48
|
+
writersLengthBefore: writersLengthBeforeFirstRemove,
|
|
49
|
+
skipSync: true
|
|
50
|
+
});
|
|
51
|
+
|
|
52
|
+
// Re-add as indexer
|
|
53
|
+
const writerEntryBeforeReAdd = await adminPeer.base.view.get(indexerPeer.wallet.address);
|
|
54
|
+
const adminEntryBeforeReAdd = await adminPeer.base.view.get(adminPeer.wallet.address);
|
|
55
|
+
const reAddPayload = await buildAddIndexerPayload(context, { writerPeer: indexerPeer, adminPeer });
|
|
56
|
+
await adminPeer.base.append(reAddPayload);
|
|
57
|
+
await adminPeer.base.update();
|
|
58
|
+
await eventFlush();
|
|
59
|
+
|
|
60
|
+
await assertAddIndexerSuccessState(t, context, {
|
|
61
|
+
writerPeer: indexerPeer,
|
|
62
|
+
adminPeer,
|
|
63
|
+
writerEntryBefore: { value: b4a.from(writerEntryBeforeReAdd.value) },
|
|
64
|
+
adminEntryBefore: { value: b4a.from(adminEntryBeforeReAdd.value) },
|
|
65
|
+
payload: reAddPayload,
|
|
66
|
+
skipSync: true
|
|
67
|
+
});
|
|
68
|
+
|
|
69
|
+
// Second removeIndexer
|
|
70
|
+
const writersLengthBeforeSecondRemove = await readWritersLength(adminPeer.base);
|
|
71
|
+
const indexerEntryBeforeSecondRemove = await adminPeer.base.view.get(indexerPeer.wallet.address);
|
|
72
|
+
const adminEntryBeforeSecondRemove = await adminPeer.base.view.get(adminPeer.wallet.address);
|
|
73
|
+
const secondRemovePayload = await buildRemoveIndexerPayload(context, {
|
|
74
|
+
indexerPeer,
|
|
75
|
+
adminPeer
|
|
76
|
+
});
|
|
77
|
+
|
|
78
|
+
await adminPeer.base.append(secondRemovePayload);
|
|
79
|
+
await adminPeer.base.update();
|
|
80
|
+
await eventFlush();
|
|
81
|
+
|
|
82
|
+
await assertRemoveIndexerSuccessState(t, context, {
|
|
83
|
+
indexerPeer,
|
|
84
|
+
adminPeer,
|
|
85
|
+
indexerEntryBefore: { value: b4a.from(indexerEntryBeforeSecondRemove.value) },
|
|
86
|
+
adminEntryBefore: { value: b4a.from(adminEntryBeforeSecondRemove.value) },
|
|
87
|
+
payload: secondRemovePayload,
|
|
88
|
+
writersLengthBefore: writersLengthBeforeSecondRemove,
|
|
89
|
+
skipSync: true
|
|
90
|
+
});
|
|
91
|
+
});
|
|
92
|
+
}
|
|
93
|
+
|
|
94
|
+
async function readWritersLength(base) {
|
|
95
|
+
const entry = await base.view.get(EntryType.WRITERS_LENGTH);
|
|
96
|
+
if (!entry?.value) return 0;
|
|
97
|
+
return entry.value.readUInt32BE();
|
|
98
|
+
}
|
|
@@ -0,0 +1,167 @@
|
|
|
1
|
+
import b4a from 'b4a';
|
|
2
|
+
import { test } from 'brittle';
|
|
3
|
+
import nodeEntryUtils from '../../../../../src/core/state/utils/nodeEntry.js';
|
|
4
|
+
import { EntryType } from '../../../../../src/utils/constants.js';
|
|
5
|
+
import lengthEntryUtils from '../../../../../src/core/state/utils/lengthEntry.js';
|
|
6
|
+
import { eventFlush } from '../../../../helpers/autobaseTestHelpers.js';
|
|
7
|
+
import { initializeBalances, whitelistAddress } from '../common/commonScenarioHelper.js';
|
|
8
|
+
import { promotePeerToWriter } from '../addWriter/addWriterScenarioHelpers.js';
|
|
9
|
+
import {
|
|
10
|
+
setupAddIndexerScenario,
|
|
11
|
+
selectIndexerCandidatePeer,
|
|
12
|
+
buildAddIndexerPayload,
|
|
13
|
+
assertAddIndexerSuccessState,
|
|
14
|
+
ensureIndexerRegistration
|
|
15
|
+
} from '../addIndexer/addIndexerScenarioHelpers.js';
|
|
16
|
+
import { buildRemoveIndexerPayload, assertRemoveIndexerSuccessState } from './removeIndexerScenarioHelpers.js';
|
|
17
|
+
|
|
18
|
+
export default function removeIndexerRemoveMultipleIndexersScenario() {
|
|
19
|
+
test('State.apply removeIndexer removes multiple indexers sequentially, leaving only admin', async t => {
|
|
20
|
+
const context = await setupAddIndexerScenario(t, { nodes: 4 });
|
|
21
|
+
const adminPeer = context.adminBootstrap;
|
|
22
|
+
const initialIndexerCount = getIndexerCount(adminPeer.base);
|
|
23
|
+
|
|
24
|
+
const candidates = [
|
|
25
|
+
selectIndexerCandidatePeer(context, 0),
|
|
26
|
+
selectIndexerCandidatePeer(context, 1),
|
|
27
|
+
selectIndexerCandidatePeer(context, 2)
|
|
28
|
+
];
|
|
29
|
+
|
|
30
|
+
for (const peer of candidates.slice(1)) {
|
|
31
|
+
await prepareWriterCandidate(t, context, peer);
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
for (const peer of candidates) {
|
|
35
|
+
await promoteWriterToIndexer(t, context, peer);
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
for (const peer of candidates) {
|
|
39
|
+
const writersLengthBefore = await readWritersLength(adminPeer.base);
|
|
40
|
+
const indexerEntryBefore = await adminPeer.base.view.get(peer.wallet.address);
|
|
41
|
+
const adminEntryBefore = await adminPeer.base.view.get(adminPeer.wallet.address);
|
|
42
|
+
|
|
43
|
+
ensureIndexerRegistration(adminPeer.base, peer.base.local.key);
|
|
44
|
+
|
|
45
|
+
const payload = await buildRemoveIndexerPayload(context, {
|
|
46
|
+
indexerPeer: peer,
|
|
47
|
+
adminPeer
|
|
48
|
+
});
|
|
49
|
+
|
|
50
|
+
await adminPeer.base.append(payload);
|
|
51
|
+
await adminPeer.base.update();
|
|
52
|
+
await eventFlush();
|
|
53
|
+
|
|
54
|
+
await assertRemoveIndexerSuccessState(t, context, {
|
|
55
|
+
indexerPeer: peer,
|
|
56
|
+
adminPeer,
|
|
57
|
+
indexerEntryBefore: { value: b4a.from(indexerEntryBefore.value) },
|
|
58
|
+
adminEntryBefore: { value: b4a.from(adminEntryBefore.value) },
|
|
59
|
+
payload,
|
|
60
|
+
writersLengthBefore,
|
|
61
|
+
skipSync: true
|
|
62
|
+
});
|
|
63
|
+
|
|
64
|
+
}
|
|
65
|
+
|
|
66
|
+
assertIndexerCount(t, context, 1);
|
|
67
|
+
await assertOnlyAdminIsIndexer(t, context);
|
|
68
|
+
});
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
async function prepareWriterCandidate(t, context, peer) {
|
|
72
|
+
const funding = context.addWriterScenario?.writerInitialBalance;
|
|
73
|
+
if (!funding) {
|
|
74
|
+
throw new Error('addIndexer scenarios require writerInitialBalance buffer.');
|
|
75
|
+
}
|
|
76
|
+
const expectedWriterIndex = await deriveNextWriterIndex(context.adminBootstrap.base);
|
|
77
|
+
await initializeBalances(context, [[peer.wallet.address, funding]]);
|
|
78
|
+
await whitelistAddress(context, peer.wallet.address);
|
|
79
|
+
await promotePeerToWriter(t, context, { readerPeer: peer, expectedWriterIndex });
|
|
80
|
+
}
|
|
81
|
+
|
|
82
|
+
async function promoteWriterToIndexer(t, context, writerPeer) {
|
|
83
|
+
const adminPeer = context.adminBootstrap;
|
|
84
|
+
const writerAddress = writerPeer.wallet.address;
|
|
85
|
+
|
|
86
|
+
const writerEntryBefore = await adminPeer.base.view.get(writerAddress);
|
|
87
|
+
t.ok(writerEntryBefore, 'writer entry exists before addIndexer');
|
|
88
|
+
const adminEntryBefore = await adminPeer.base.view.get(adminPeer.wallet.address);
|
|
89
|
+
t.ok(adminEntryBefore, 'admin entry exists before addIndexer');
|
|
90
|
+
|
|
91
|
+
const payload = await buildAddIndexerPayload(context, {
|
|
92
|
+
writerPeer,
|
|
93
|
+
adminPeer
|
|
94
|
+
});
|
|
95
|
+
|
|
96
|
+
await adminPeer.base.append(payload);
|
|
97
|
+
await adminPeer.base.update();
|
|
98
|
+
await eventFlush();
|
|
99
|
+
|
|
100
|
+
await assertAddIndexerSuccessState(t, context, {
|
|
101
|
+
writerPeer,
|
|
102
|
+
adminPeer,
|
|
103
|
+
writerEntryBefore: { value: b4a.from(writerEntryBefore.value) },
|
|
104
|
+
adminEntryBefore: { value: b4a.from(adminEntryBefore.value) },
|
|
105
|
+
payload,
|
|
106
|
+
skipSync: true
|
|
107
|
+
});
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
function getIndexerCount(base) {
|
|
111
|
+
return Object.values(base.system.indexers ?? {}).length;
|
|
112
|
+
}
|
|
113
|
+
|
|
114
|
+
function assertIndexerCount(t, context, expectedCount) {
|
|
115
|
+
const base = context.adminBootstrap.base;
|
|
116
|
+
const count = getIndexerCount(base);
|
|
117
|
+
t.is(count, expectedCount, 'admin observes expected indexer count');
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
async function assertOnlyAdminIsIndexer(t, context) {
|
|
121
|
+
const adminKey = context.adminBootstrap.base.local.key;
|
|
122
|
+
const membership = Object.values(context.adminBootstrap.base.system.indexers ?? {});
|
|
123
|
+
t.is(membership.length, 1, 'admin retains a single indexer');
|
|
124
|
+
const onlyEntry = membership[0]?.key;
|
|
125
|
+
t.ok(onlyEntry && b4a.equals(onlyEntry, adminKey), 'admin stays sole indexer');
|
|
126
|
+
|
|
127
|
+
// Removed indexers should now be writers without validator membership (admin view).
|
|
128
|
+
for (const candidate of context.peers.slice(1, 4)) {
|
|
129
|
+
await assertNodeIsWriterNonIndexer(t, candidate, [context.adminBootstrap]);
|
|
130
|
+
}
|
|
131
|
+
}
|
|
132
|
+
|
|
133
|
+
async function assertNodeIsWriterNonIndexer(t, targetPeer, allPeers) {
|
|
134
|
+
const writingKey = targetPeer.base.local.key;
|
|
135
|
+
for (const peer of allPeers) {
|
|
136
|
+
const entry = await peer.base.view.get(targetPeer.wallet.address);
|
|
137
|
+
t.ok(entry, `${peer.name} sees downgraded entry for ${targetPeer.wallet.address}`);
|
|
138
|
+
const decoded = nodeEntryUtils.decode(entry?.value);
|
|
139
|
+
t.ok(decoded, `${peer.name} decodes downgraded entry for ${targetPeer.wallet.address}`);
|
|
140
|
+
if (!decoded) continue;
|
|
141
|
+
t.is(decoded.isIndexer, false, `${peer.name} marks ${targetPeer.wallet.address} as non-indexer`);
|
|
142
|
+
t.is(decoded.isWriter, true, `${peer.name} keeps ${targetPeer.wallet.address} as writer`);
|
|
143
|
+
t.is(decoded.isWhitelisted, true, `${peer.name} keeps ${targetPeer.wallet.address} whitelisted`);
|
|
144
|
+
const hasMembership = indexerMembershipIncludes(peer.base, writingKey);
|
|
145
|
+
t.is(hasMembership, false, `${peer.name} does not keep ${targetPeer.wallet.address} in validator set`);
|
|
146
|
+
}
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
async function readWritersLength(base) {
|
|
150
|
+
const entry = await base.view.get(EntryType.WRITERS_LENGTH);
|
|
151
|
+
if (!entry?.value) return 0;
|
|
152
|
+
return entry.value.readUInt32BE();
|
|
153
|
+
}
|
|
154
|
+
|
|
155
|
+
async function deriveNextWriterIndex(base) {
|
|
156
|
+
const entry = await base.view.get(EntryType.WRITERS_LENGTH);
|
|
157
|
+
if (!entry?.value) {
|
|
158
|
+
return 0;
|
|
159
|
+
}
|
|
160
|
+
return lengthEntryUtils.decodeBE(entry.value);
|
|
161
|
+
}
|
|
162
|
+
|
|
163
|
+
function indexerMembershipIncludes(base, writingKey) {
|
|
164
|
+
const entries = base?.system?.indexers;
|
|
165
|
+
if (!entries) return false;
|
|
166
|
+
return Object.values(entries).some(entry => entry?.key && b4a.equals(entry.key, writingKey));
|
|
167
|
+
}
|