openethereum/ethcore/src/json_tests/executive.rs

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

428 lines
13 KiB
Rust
Raw Normal View History

2020-09-22 14:53:52 +02:00
// Copyright 2015-2020 Parity Technologies (UK) Ltd.
// This file is part of OpenEthereum.
2016-02-05 13:40:41 +01:00
2020-09-22 14:53:52 +02:00
// OpenEthereum is free software: you can redistribute it and/or modify
2016-02-05 13:40:41 +01:00
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
2020-09-22 14:53:52 +02:00
// OpenEthereum is distributed in the hope that it will be useful,
2016-02-05 13:40:41 +01:00
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
2020-09-22 14:53:52 +02:00
// along with OpenEthereum. If not, see <http://www.gnu.org/licenses/>.
2016-02-05 13:40:41 +01:00
2016-01-13 01:23:01 +01:00
use super::test_common::*;
use bytes::Bytes;
use ethjson;
use ethtrie;
2020-09-08 02:48:09 +02:00
use evm::Finalize;
2016-01-13 01:23:01 +01:00
use executive::*;
2016-01-15 14:22:46 +01:00
use externalities::*;
use hash::keccak;
use machine::EthereumMachine as Machine;
use rlp::RlpStream;
2017-02-22 10:52:58 +01:00
use state::{Backend as StateBackend, State, Substate};
use std::{path::Path, sync::Arc};
Private transactions integration pr (#6422) * Private transaction message added * Empty line removed * Private transactions logic removed from client into the separate module * Fixed compilation after merge with head * Signed private transaction message added as well * Comments after the review fixed * Private tx execution * Test update * Renamed some methods * Fixed some tests * Reverted submodules * Fixed build * Private transaction message added * Empty line removed * Private transactions logic removed from client into the separate module * Fixed compilation after merge with head * Signed private transaction message added as well * Comments after the review fixed * Encrypted private transaction message and signed reply added * Private tx execution * Test update * Main scenario completed * Merged with the latest head * Private transactions API * Comments after review fixed * Parameters for private transactions added to parity arguments * New files added * New API methods added * Do not process packets from unconfirmed peers * Merge with ptm_ss branch * Encryption and permissioning with key server added * Fixed compilation after merge * Version of Parity protocol incremented in order to support private transactions * Doc strings for constants added * Proper format for doc string added * fixed some encryptor.rs grumbles * Private transactions functionality moved to the separate crate * Refactoring in order to remove late initialisation * Tests fixed after moving to the separate crate * Fetch method removed * Sync test helpers refactored * Interaction with encryptor refactored * Contract address retrieving via substate removed * Sensible gas limit for private transactions implemented * New private contract with nonces added * Parsing of the response from key server fixed * Build fixed after the merge, native contracts removed * Crate renamed * Tests moved to the separate directory * Handling of errors reworked in order to use error chain * Encodable macro added, new constructor replaced with default * Native ethabi usage removed * Couple conversions optimized * Interactions with client reworked * Errors omitting removed * Fix after merge * Fix after the merge * private transactions improvements in progress * private_transactions -> ethcore/private-tx * making private transactions more idiomatic * private-tx encryptor uses shared FetchClient and is more idiomatic * removed redundant tests, moved integration tests to tests/ dir * fixed failing service test * reenable add_notify on private tx provider * removed private_tx tests from sync module * removed commented out code * Use plain password instead of unlocking account manager * remove dead code * Link to the contract changed * Transaction signature chain replay protection module created * Redundant type conversion removed * Contract address returned by private provider * Test fixed * Addressing grumbles in PrivateTransactions (#8249) * Tiny fixes part 1. * A bunch of additional comments and todos. * Fix ethsync tests. * resolved merge conflicts * final private tx pr (#8318) * added cli option that enables private transactions * fixed failing test * fixed failing test * fixed failing test * fixed failing test
2018-04-09 16:14:33 +02:00
use test_helpers::get_temp_state;
use trace::{NoopTracer, NoopVMTracer, Tracer, VMTracer};
use vm::{
self, ActionParams, CallType, ContractCreateResult, CreateContractAddress, EnvInfo, Ext,
2018-10-02 16:33:19 +02:00
MessageCallResult, ReturnData, Schedule,
2020-08-05 06:08:03 +02:00
};
2016-01-13 01:23:01 +01:00
use super::HookType;
#[derive(Debug, PartialEq, Clone)]
2016-01-13 13:16:53 +01:00
struct CallCreate {
data: Bytes,
2016-01-14 23:36:35 +01:00
destination: Option<Address>,
2016-01-16 20:11:12 +01:00
gas_limit: U256,
2016-01-13 13:16:53 +01:00
value: U256,
}
impl From<ethjson::vm::Call> for CallCreate {
fn from(c: ethjson::vm::Call) -> Self {
let dst: Option<ethjson::hash::Address> = c.destination.into();
CallCreate {
data: c.data.into(),
destination: dst.map(Into::into),
gas_limit: c.gas_limit.into(),
value: c.value.into(),
}
}
}
2016-01-13 13:16:53 +01:00
/// Tiny wrapper around executive externalities.
/// Stores callcreates.
struct TestExt<'a, T: 'a, V: 'a, B: 'a>
where
T: Tracer,
V: VMTracer,
B: StateBackend,
2017-02-22 10:52:58 +01:00
{
ext: Externalities<'a, T, V, B>,
2016-01-16 20:11:12 +01:00
callcreates: Vec<CallCreate>,
nonce: U256,
sender: Address,
2016-01-13 13:16:53 +01:00
}
impl<'a, T: 'a, V: 'a, B: 'a> TestExt<'a, T, V, B>
where
T: Tracer,
V: VMTracer,
B: StateBackend,
2017-02-22 10:52:58 +01:00
{
fn new(
2017-02-22 10:52:58 +01:00
state: &'a mut State<B>,
info: &'a EnvInfo,
machine: &'a Machine,
schedule: &'a Schedule,
depth: usize,
2018-10-02 16:33:19 +02:00
origin_info: &'a OriginInfo,
substate: &'a mut Substate,
output: OutputPolicy,
address: Address,
tracer: &'a mut T,
vm_tracer: &'a mut V,
) -> ethtrie::Result<Self> {
2017-06-19 11:41:46 +02:00
let static_call = false;
Ok(TestExt {
nonce: state.nonce(&address)?,
2018-10-02 16:33:19 +02:00
ext: Externalities::new(
state,
info,
machine,
schedule,
depth,
0,
origin_info,
substate,
output,
tracer,
vm_tracer,
static_call,
),
callcreates: vec![],
sender: address,
})
2016-01-13 13:16:53 +01:00
}
}
impl<'a, T: 'a, V: 'a, B: 'a> Ext for TestExt<'a, T, V, B>
where
T: Tracer,
V: VMTracer,
B: StateBackend,
2017-02-22 10:52:58 +01:00
{
fn storage_at(&self, key: &H256) -> vm::Result<H256> {
2016-01-15 18:56:28 +01:00
self.ext.storage_at(key)
2016-01-13 13:16:53 +01:00
}
2020-08-05 06:08:03 +02:00
fn initial_storage_at(&self, key: &H256) -> vm::Result<H256> {
self.ext.initial_storage_at(key)
}
2020-08-05 06:08:03 +02:00
fn set_storage(&mut self, key: H256, value: H256) -> vm::Result<()> {
2016-01-16 20:11:12 +01:00
self.ext.set_storage(key, value)
}
2020-08-05 06:08:03 +02:00
fn exists(&self, address: &Address) -> vm::Result<bool> {
2016-01-16 20:11:12 +01:00
self.ext.exists(address)
2016-01-13 13:16:53 +01:00
}
2020-08-05 06:08:03 +02:00
fn exists_and_not_null(&self, address: &Address) -> vm::Result<bool> {
self.ext.exists_and_not_null(address)
}
2020-08-05 06:08:03 +02:00
fn balance(&self, address: &Address) -> vm::Result<U256> {
2016-01-13 13:16:53 +01:00
self.ext.balance(address)
}
2020-08-05 06:08:03 +02:00
fn origin_balance(&self) -> vm::Result<U256> {
self.ext.origin_balance()
}
2020-08-05 06:08:03 +02:00
fn blockhash(&mut self, number: &U256) -> H256 {
2016-01-13 13:16:53 +01:00
self.ext.blockhash(number)
}
2020-08-05 06:08:03 +02:00
2018-10-02 16:33:19 +02:00
fn create(
&mut self,
gas: &U256,
value: &U256,
code: &[u8],
address: CreateContractAddress,
_trap: bool,
) -> Result<ContractCreateResult, vm::TrapKind> {
2016-01-16 20:11:12 +01:00
self.callcreates.push(CallCreate {
data: code.to_vec(),
destination: None,
gas_limit: *gas,
value: *value,
});
2017-06-30 11:30:32 +02:00
let contract_address = contract_address(address, &self.sender, &self.nonce, &code).0;
2018-10-02 16:33:19 +02:00
Ok(ContractCreateResult::Created(contract_address, *gas))
2016-01-13 13:16:53 +01:00
}
2020-08-05 06:08:03 +02:00
2020-11-04 19:11:05 +01:00
fn calc_address(&self, code: &[u8], address: CreateContractAddress) -> Option<Address> {
Some(contract_address(address, &self.sender, &self.nonce, &code).0)
}
2018-10-02 16:33:19 +02:00
fn call(
&mut self,
gas: &U256,
_sender_address: &Address,
receive_address: &Address,
value: Option<U256>,
data: &[u8],
_code_address: &Address,
2018-10-02 16:33:19 +02:00
_call_type: CallType,
_trap: bool,
) -> Result<MessageCallResult, vm::TrapKind> {
2016-01-16 20:11:12 +01:00
self.callcreates.push(CallCreate {
data: data.to_vec(),
destination: Some(receive_address.clone()),
gas_limit: *gas,
2016-01-25 23:59:50 +01:00
value: value.unwrap(),
2016-01-20 16:52:22 +01:00
});
2018-10-02 16:33:19 +02:00
Ok(MessageCallResult::Success(*gas, ReturnData::empty()))
2016-01-20 16:52:22 +01:00
}
2020-08-05 06:08:03 +02:00
fn extcode(&self, address: &Address) -> vm::Result<Option<Arc<Bytes>>> {
2016-01-13 13:16:53 +01:00
self.ext.extcode(address)
}
2020-08-05 06:08:03 +02:00
fn extcodesize(&self, address: &Address) -> vm::Result<Option<usize>> {
self.ext.extcodesize(address)
}
2020-08-05 06:08:03 +02:00
fn extcodehash(&self, address: &Address) -> vm::Result<Option<H256>> {
self.ext.extcodehash(address)
}
2020-08-05 06:08:03 +02:00
fn log(&mut self, topics: Vec<H256>, data: &[u8]) -> vm::Result<()> {
2016-01-13 13:16:53 +01:00
self.ext.log(topics, data)
}
2020-08-05 06:08:03 +02:00
fn ret(self, gas: &U256, data: &ReturnData, apply_state: bool) -> Result<U256, vm::Error> {
self.ext.ret(gas, data, apply_state)
2016-01-13 13:16:53 +01:00
}
2020-08-05 06:08:03 +02:00
fn suicide(&mut self, refund_address: &Address) -> vm::Result<()> {
2016-01-13 16:16:21 +01:00
self.ext.suicide(refund_address)
2016-01-13 13:16:53 +01:00
}
2020-08-05 06:08:03 +02:00
2016-01-13 13:16:53 +01:00
fn schedule(&self) -> &Schedule {
self.ext.schedule()
}
2020-08-05 06:08:03 +02:00
2016-01-13 13:16:53 +01:00
fn env_info(&self) -> &EnvInfo {
self.ext.env_info()
}
2020-08-05 06:08:03 +02:00
fn chain_id(&self) -> u64 {
0
}
2020-08-05 06:08:03 +02:00
2016-01-16 20:11:12 +01:00
fn depth(&self) -> usize {
0
}
2020-08-05 06:08:03 +02:00
fn is_static(&self) -> bool {
false
}
2020-08-05 06:08:03 +02:00
fn add_sstore_refund(&mut self, value: usize) {
self.ext.add_sstore_refund(value)
}
2020-08-05 06:08:03 +02:00
fn sub_sstore_refund(&mut self, value: usize) {
self.ext.sub_sstore_refund(value)
2016-01-16 20:11:12 +01:00
}
2020-11-04 19:11:05 +01:00
fn al_is_enabled(&self) -> bool {
self.ext.al_is_enabled()
}
fn al_contains_storage_key(&self, address: &Address, key: &H256) -> bool {
self.ext.al_contains_storage_key(address, key)
}
fn al_insert_storage_key(&mut self, address: Address, key: H256) {
self.ext.al_insert_storage_key(address, key)
}
fn al_contains_address(&self, address: &Address) -> bool {
self.ext.al_contains_address(address)
}
fn al_insert_address(&mut self, address: Address) {
self.ext.al_insert_address(address)
}
2016-01-13 13:16:53 +01:00
}
2020-09-30 13:10:54 +02:00
/// run an json executive test
2020-09-08 02:48:09 +02:00
pub fn json_executive_test<H: FnMut(&str, HookType)>(
path: &Path,
json_data: &[u8],
start_stop_hook: &mut H,
) -> Vec<String> {
2020-09-08 02:48:09 +02:00
let tests = ethjson::vm::Test::load(json_data).expect(&format!(
"Could not parse JSON executive test data from {}",
path.display()
));
2016-01-13 01:23:01 +01:00
let mut failed = Vec::new();
2020-08-05 06:08:03 +02:00
for (name, vm) in tests.into_iter() {
2020-09-10 08:04:14 +02:00
if !super::debug_include_test(&name) {
continue;
}
2020-09-08 02:48:09 +02:00
start_stop_hook(&format!("{}", name), HookType::OnStart);
2020-08-05 06:08:03 +02:00
2016-01-13 01:23:01 +01:00
let mut fail = false;
2020-08-05 06:08:03 +02:00
2016-02-10 00:20:36 +01:00
let mut fail_unless = |cond: bool, s: &str| {
if !cond && !fail {
2020-09-08 02:48:09 +02:00
failed.push(format!("{}: {}", name, s));
2016-02-10 00:20:36 +01:00
fail = true
2020-08-05 06:08:03 +02:00
}
2016-01-14 18:29:18 +01:00
};
2020-08-05 06:08:03 +02:00
macro_rules! try_fail {
($e: expr) => {
match $e {
Ok(x) => x,
Err(e) => {
let msg = format!("Internal error: {}", e);
fail_unless(false, &msg);
continue;
}
}
2020-08-05 06:08:03 +02:00
};
}
let out_of_gas = vm.out_of_gas();
2017-04-06 19:26:17 +02:00
let mut state = get_temp_state();
state.populate_from(From::from(vm.pre_state.clone()));
let info: EnvInfo = From::from(vm.env);
let machine = {
let mut machine = ::ethereum::new_frontier_test_machine();
machine.set_schedule_creation_rules(Box::new(move |s, _| s.max_depth = 1));
machine
};
2020-08-05 06:08:03 +02:00
let params = ActionParams::from(vm.transaction);
2020-08-05 06:08:03 +02:00
2016-04-08 11:48:37 +02:00
let mut substate = Substate::new();
let mut tracer = NoopTracer;
let mut vm_tracer = NoopVMTracer;
let vm_factory = state.vm_factory();
2018-10-02 16:33:19 +02:00
let origin_info = OriginInfo::from(&params);
2020-08-05 06:08:03 +02:00
2016-01-13 01:23:01 +01:00
// execute
2016-01-13 17:26:04 +01:00
let (res, callcreates) = {
let schedule = machine.schedule(info.number);
let mut ex = try_fail!(TestExt::new(
2016-03-19 14:10:32 +01:00
&mut state,
&info,
&machine,
&schedule,
2016-03-19 14:10:32 +01:00
0,
2018-10-02 16:33:19 +02:00
&origin_info,
2016-03-19 14:10:32 +01:00
&mut substate,
OutputPolicy::Return,
2016-04-08 11:48:37 +02:00
params.address.clone(),
&mut tracer,
&mut vm_tracer,
));
2020-07-29 11:00:04 +02:00
let evm = vm_factory.create(params, &schedule, 0);
2018-10-02 16:33:19 +02:00
let res = evm
.exec(&mut ex)
.ok()
.expect("TestExt never trap; resume error never happens; qed");
// a return in finalize will not alter callcreates
let callcreates = ex.callcreates.clone();
(res.finalize(ex), callcreates)
2016-01-13 01:23:01 +01:00
};
2020-08-05 06:08:03 +02:00
let output = match &res {
Ok(res) => res.return_data.to_vec(),
Err(_) => Vec::new(),
};
2020-08-05 06:08:03 +02:00
let log_hash = {
let mut rlp = RlpStream::new_list(substate.logs.len());
for l in &substate.logs {
rlp.append(l);
}
keccak(&rlp.drain())
};
2020-08-05 06:08:03 +02:00
2016-01-13 01:23:01 +01:00
match res {
Err(_) => fail_unless(out_of_gas, "didn't expect to run out of gas."),
2017-05-23 15:49:17 +02:00
Ok(res) => {
2016-01-13 01:23:01 +01:00
fail_unless(!out_of_gas, "expected to run out of gas.");
2017-05-23 15:49:17 +02:00
fail_unless(
Some(res.gas_left) == vm.gas_left.map(Into::into),
"gas_left is incorrect",
);
let vm_output: Option<Vec<u8>> = vm.output.map(Into::into);
fail_unless(Some(output) == vm_output, "output is incorrect");
fail_unless(Some(log_hash) == vm.logs.map(|h| h.0), "logs are incorrect");
2020-08-05 06:08:03 +02:00
for (address, account) in vm.post_state.unwrap().into_iter() {
let address = address.into();
2020-09-08 02:48:09 +02:00
if let Some(code) = account.code {
let code: Vec<u8> = code.into();
let found_code = try_fail!(state.code(&address));
fail_unless(
found_code
.as_ref()
.map_or_else(|| code.is_empty(), |c| &**c == &code),
"code is incorrect",
);
}
let found_balance = try_fail!(state.balance(&address));
let found_nonce = try_fail!(state.nonce(&address));
2020-09-08 02:48:09 +02:00
if let Some(balance) = account.balance {
fail_unless(found_balance == balance.into(), "balance is incorrect");
}
if let Some(nonce) = account.nonce {
fail_unless(found_nonce == nonce.into(), "nonce is incorrect");
}
if let Some(storage) = account.storage {
for (k, v) in storage {
let key: U256 = k.into();
let value: U256 = v.into();
let found_storage =
try_fail!(state.storage_at(&address, &From::from(&key)));
fail_unless(
found_storage == From::from(&value),
"storage is incorrect",
);
}
}
2020-08-05 06:08:03 +02:00
}
let calls: Option<Vec<CallCreate>> =
vm.calls.map(|c| c.into_iter().map(From::from).collect());
fail_unless(Some(callcreates) == calls, "callcreates does not match");
2016-01-13 01:23:01 +01:00
}
};
2020-08-05 06:08:03 +02:00
2020-09-08 02:48:09 +02:00
if fail {
println!(" - vm: {:?}...FAILED", name);
} else {
println!(" - vm: {:?}...OK", name);
}
2020-08-05 06:08:03 +02:00
2020-09-08 02:48:09 +02:00
start_stop_hook(&format!("{}", name), HookType::OnStop);
2016-01-13 01:23:01 +01:00
}
2020-08-05 06:08:03 +02:00
2016-01-13 01:23:01 +01:00
failed
}