2018-03-30 10:43:38 -07:00
|
|
|
//! The `accountant` module tracks client balances, and the progress of pending
|
2018-03-29 11:20:54 -07:00
|
|
|
//! transactions. It offers a high-level public API that signs transactions
|
2018-03-30 10:43:38 -07:00
|
|
|
//! on behalf of the caller, and a private low-level API for when they have
|
2018-03-29 11:20:54 -07:00
|
|
|
//! already been signed and verified.
|
2018-02-23 13:08:19 -08:00
|
|
|
|
2018-03-26 21:07:11 -07:00
|
|
|
extern crate libc;
|
|
|
|
|
2018-03-26 21:03:26 -07:00
|
|
|
use chrono::prelude::*;
|
2018-03-06 11:18:17 -08:00
|
|
|
use event::Event;
|
2018-03-26 21:03:26 -07:00
|
|
|
use hash::Hash;
|
|
|
|
use mint::Mint;
|
2018-04-02 12:51:44 -07:00
|
|
|
use plan::{Payment, Plan, Witness};
|
2018-03-26 21:03:26 -07:00
|
|
|
use signature::{KeyPair, PublicKey, Signature};
|
2018-03-20 17:07:54 -07:00
|
|
|
use std::collections::hash_map::Entry::Occupied;
|
2018-04-04 16:03:18 -07:00
|
|
|
use std::collections::{HashMap, HashSet, VecDeque};
|
2018-03-02 09:16:39 -08:00
|
|
|
use std::result;
|
2018-04-04 11:33:00 -07:00
|
|
|
use std::sync::RwLock;
|
2018-03-26 21:03:26 -07:00
|
|
|
use transaction::Transaction;
|
2018-03-02 09:16:39 -08:00
|
|
|
|
2018-04-05 09:26:43 -07:00
|
|
|
const MAX_ENTRY_IDS: usize = 1024 * 4;
|
|
|
|
|
2018-03-02 09:16:39 -08:00
|
|
|
#[derive(Debug, PartialEq, Eq)]
|
|
|
|
pub enum AccountingError {
|
2018-04-05 20:00:08 -07:00
|
|
|
AccountNotFound,
|
2018-03-02 09:16:39 -08:00
|
|
|
InsufficientFunds,
|
2018-03-06 10:43:53 -08:00
|
|
|
InvalidTransferSignature,
|
2018-03-02 09:16:39 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
pub type Result<T> = result::Result<T, AccountingError>;
|
2018-02-23 13:08:19 -08:00
|
|
|
|
2018-03-20 16:47:55 -07:00
|
|
|
/// Commit funds to the 'to' party.
|
2018-04-04 15:31:11 -07:00
|
|
|
fn apply_payment(balances: &RwLock<HashMap<PublicKey, RwLock<i64>>>, payment: &Payment) {
|
|
|
|
if balances.read().unwrap().contains_key(&payment.to) {
|
|
|
|
let bals = balances.read().unwrap();
|
|
|
|
*bals[&payment.to].write().unwrap() += payment.tokens;
|
|
|
|
} else {
|
|
|
|
let mut bals = balances.write().unwrap();
|
|
|
|
bals.insert(payment.to, RwLock::new(payment.tokens));
|
|
|
|
}
|
2018-03-20 16:47:55 -07:00
|
|
|
}
|
|
|
|
|
2018-02-23 13:08:19 -08:00
|
|
|
pub struct Accountant {
|
2018-04-04 15:31:11 -07:00
|
|
|
balances: RwLock<HashMap<PublicKey, RwLock<i64>>>,
|
2018-04-04 11:33:00 -07:00
|
|
|
pending: RwLock<HashMap<Signature, Plan>>,
|
2018-04-04 16:03:18 -07:00
|
|
|
last_ids: RwLock<VecDeque<(Hash, RwLock<HashSet<Signature>>)>>,
|
2018-04-04 11:33:00 -07:00
|
|
|
time_sources: RwLock<HashSet<PublicKey>>,
|
|
|
|
last_time: RwLock<DateTime<Utc>>,
|
2018-02-23 13:08:19 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
impl Accountant {
|
2018-04-02 12:51:44 -07:00
|
|
|
/// Create an Accountant using a deposit.
|
2018-04-02 13:41:07 -07:00
|
|
|
pub fn new_from_deposit(deposit: &Payment) -> Self {
|
2018-04-04 15:31:11 -07:00
|
|
|
let balances = RwLock::new(HashMap::new());
|
|
|
|
apply_payment(&balances, deposit);
|
2018-04-02 12:51:44 -07:00
|
|
|
Accountant {
|
2018-04-04 15:31:11 -07:00
|
|
|
balances,
|
2018-04-04 11:33:00 -07:00
|
|
|
pending: RwLock::new(HashMap::new()),
|
2018-04-04 16:03:18 -07:00
|
|
|
last_ids: RwLock::new(VecDeque::new()),
|
2018-04-04 11:33:00 -07:00
|
|
|
time_sources: RwLock::new(HashSet::new()),
|
|
|
|
last_time: RwLock::new(Utc.timestamp(0, 0)),
|
2018-04-02 12:51:44 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Create an Accountant with only a Mint. Typically used by unit tests.
|
2018-04-02 13:41:07 -07:00
|
|
|
pub fn new(mint: &Mint) -> Self {
|
2018-04-02 12:51:44 -07:00
|
|
|
let deposit = Payment {
|
|
|
|
to: mint.pubkey(),
|
|
|
|
tokens: mint.tokens,
|
|
|
|
};
|
2018-04-05 08:53:58 -07:00
|
|
|
let acc = Self::new_from_deposit(&deposit);
|
|
|
|
acc.register_entry_id(&mint.last_id());
|
|
|
|
acc
|
2018-04-02 12:51:44 -07:00
|
|
|
}
|
|
|
|
|
2018-04-04 16:03:18 -07:00
|
|
|
fn reserve_signature(signatures: &RwLock<HashSet<Signature>>, sig: &Signature) -> bool {
|
|
|
|
if signatures.read().unwrap().contains(sig) {
|
2018-04-02 08:36:22 -07:00
|
|
|
return false;
|
|
|
|
}
|
2018-04-04 16:03:18 -07:00
|
|
|
signatures.write().unwrap().insert(*sig);
|
|
|
|
true
|
|
|
|
}
|
|
|
|
|
|
|
|
fn reserve_signature_with_last_id(&self, sig: &Signature, last_id: &Hash) -> bool {
|
|
|
|
if let Some(entry) = self.last_ids
|
|
|
|
.read()
|
|
|
|
.unwrap()
|
|
|
|
.iter()
|
|
|
|
.rev()
|
|
|
|
.find(|x| x.0 == *last_id)
|
|
|
|
{
|
|
|
|
return Self::reserve_signature(&entry.1, sig);
|
|
|
|
}
|
2018-04-05 08:53:58 -07:00
|
|
|
false
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Tell the accountant which Entry IDs exist on the ledger. This function
|
|
|
|
/// assumes subsequent calls correspond to later entries, and will boot
|
|
|
|
/// the oldest ones once its internal cache is full. Once boot, the
|
|
|
|
/// accountant will reject transactions using that `last_id`.
|
|
|
|
pub fn register_entry_id(&self, last_id: &Hash) {
|
2018-04-05 09:26:43 -07:00
|
|
|
let mut last_ids = self.last_ids.write().unwrap();
|
|
|
|
if last_ids.len() >= MAX_ENTRY_IDS {
|
|
|
|
last_ids.pop_front();
|
|
|
|
}
|
|
|
|
last_ids.push_back((*last_id, RwLock::new(HashSet::new())));
|
2018-04-02 08:36:22 -07:00
|
|
|
}
|
|
|
|
|
2018-04-05 19:05:37 -07:00
|
|
|
/// Deduct tokens from the 'from' address the account has sufficient
|
|
|
|
/// funds and isn't a duplicate.
|
|
|
|
pub fn process_verified_transaction_debits(&self, tr: &Transaction) -> Result<()> {
|
2018-04-05 20:00:08 -07:00
|
|
|
let bals = self.balances.read().unwrap();
|
|
|
|
|
|
|
|
// Hold a write lock before the condition check, so that a debit can't occur
|
|
|
|
// between checking the balance and the withdraw.
|
|
|
|
let option = bals.get(&tr.from);
|
|
|
|
if option.is_none() {
|
|
|
|
return Err(AccountingError::AccountNotFound);
|
|
|
|
}
|
|
|
|
let mut bal = option.unwrap().write().unwrap();
|
|
|
|
|
|
|
|
if *bal < tr.data.tokens {
|
2018-04-02 13:14:49 -07:00
|
|
|
return Err(AccountingError::InsufficientFunds);
|
|
|
|
}
|
|
|
|
|
2018-03-26 21:07:11 -07:00
|
|
|
if !self.reserve_signature_with_last_id(&tr.sig, &tr.data.last_id) {
|
2018-03-06 10:43:53 -08:00
|
|
|
return Err(AccountingError::InvalidTransferSignature);
|
2018-03-04 21:26:46 -08:00
|
|
|
}
|
2018-03-03 21:25:37 -08:00
|
|
|
|
2018-04-05 19:05:37 -07:00
|
|
|
*bal -= tr.data.tokens;
|
2018-03-03 21:25:37 -08:00
|
|
|
|
2018-04-05 19:05:37 -07:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn process_verified_transaction_credits(&self, tr: &Transaction) {
|
2018-03-26 21:07:11 -07:00
|
|
|
let mut plan = tr.data.plan.clone();
|
2018-04-04 11:33:00 -07:00
|
|
|
plan.apply_witness(&Witness::Timestamp(*self.last_time.read().unwrap()));
|
2018-03-10 23:30:01 -08:00
|
|
|
|
2018-04-02 12:51:44 -07:00
|
|
|
if let Some(ref payment) = plan.final_payment() {
|
2018-04-04 15:31:11 -07:00
|
|
|
apply_payment(&self.balances, payment);
|
2018-03-20 15:52:47 -07:00
|
|
|
} else {
|
2018-04-05 19:05:37 -07:00
|
|
|
let mut pending = self.pending.write().unwrap();
|
|
|
|
pending.insert(tr.sig, plan);
|
2018-03-07 21:25:45 -08:00
|
|
|
}
|
2018-04-05 19:05:37 -07:00
|
|
|
}
|
2018-03-07 21:25:45 -08:00
|
|
|
|
2018-04-05 19:05:37 -07:00
|
|
|
/// Process a Transaction that has already been verified.
|
|
|
|
pub fn process_verified_transaction(&self, tr: &Transaction) -> Result<()> {
|
|
|
|
self.process_verified_transaction_debits(tr)?;
|
|
|
|
self.process_verified_transaction_credits(tr);
|
2018-03-04 21:26:46 -08:00
|
|
|
Ok(())
|
2018-02-23 13:08:19 -08:00
|
|
|
}
|
|
|
|
|
2018-03-29 11:20:54 -07:00
|
|
|
/// Process a Witness Signature that has already been verified.
|
2018-04-04 11:33:00 -07:00
|
|
|
fn process_verified_sig(&self, from: PublicKey, tx_sig: Signature) -> Result<()> {
|
|
|
|
if let Occupied(mut e) = self.pending.write().unwrap().entry(tx_sig) {
|
2018-03-22 13:38:06 -07:00
|
|
|
e.get_mut().apply_witness(&Witness::Signature(from));
|
2018-04-02 12:51:44 -07:00
|
|
|
if let Some(ref payment) = e.get().final_payment() {
|
2018-04-04 15:31:11 -07:00
|
|
|
apply_payment(&self.balances, payment);
|
2018-03-20 17:07:54 -07:00
|
|
|
e.remove_entry();
|
2018-03-20 16:47:55 -07:00
|
|
|
}
|
2018-03-10 23:11:08 -08:00
|
|
|
};
|
2018-03-07 21:25:45 -08:00
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-03-29 11:20:54 -07:00
|
|
|
/// Process a Witness Timestamp that has already been verified.
|
2018-04-04 11:33:00 -07:00
|
|
|
fn process_verified_timestamp(&self, from: PublicKey, dt: DateTime<Utc>) -> Result<()> {
|
2018-03-08 09:05:00 -08:00
|
|
|
// If this is the first timestamp we've seen, it probably came from the genesis block,
|
|
|
|
// so we'll trust it.
|
2018-04-04 11:33:00 -07:00
|
|
|
if *self.last_time.read().unwrap() == Utc.timestamp(0, 0) {
|
|
|
|
self.time_sources.write().unwrap().insert(from);
|
2018-03-08 09:05:00 -08:00
|
|
|
}
|
|
|
|
|
2018-04-04 11:33:00 -07:00
|
|
|
if self.time_sources.read().unwrap().contains(&from) {
|
|
|
|
if dt > *self.last_time.read().unwrap() {
|
|
|
|
*self.last_time.write().unwrap() = dt;
|
2018-03-08 09:05:00 -08:00
|
|
|
}
|
2018-03-08 10:06:52 -08:00
|
|
|
} else {
|
|
|
|
return Ok(());
|
2018-03-08 09:05:00 -08:00
|
|
|
}
|
2018-03-07 21:25:45 -08:00
|
|
|
|
2018-03-08 10:06:52 -08:00
|
|
|
// Check to see if any timelocked transactions can be completed.
|
|
|
|
let mut completed = vec![];
|
2018-04-04 11:33:00 -07:00
|
|
|
|
|
|
|
// Hold 'pending' write lock until the end of this function. Otherwise another thread can
|
|
|
|
// double-spend if it enters before the modified plan is removed from 'pending'.
|
|
|
|
let mut pending = self.pending.write().unwrap();
|
|
|
|
for (key, plan) in pending.iter_mut() {
|
|
|
|
plan.apply_witness(&Witness::Timestamp(*self.last_time.read().unwrap()));
|
2018-04-02 12:51:44 -07:00
|
|
|
if let Some(ref payment) = plan.final_payment() {
|
2018-04-04 15:31:11 -07:00
|
|
|
apply_payment(&self.balances, payment);
|
2018-03-10 23:30:01 -08:00
|
|
|
completed.push(key.clone());
|
2018-03-08 10:06:52 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for key in completed {
|
2018-04-04 11:33:00 -07:00
|
|
|
pending.remove(&key);
|
2018-03-08 10:06:52 -08:00
|
|
|
}
|
|
|
|
|
2018-03-07 21:25:45 -08:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-03-29 11:20:54 -07:00
|
|
|
/// Process an Transaction or Witness that has already been verified.
|
2018-04-04 11:33:00 -07:00
|
|
|
pub fn process_verified_event(&self, event: &Event) -> Result<()> {
|
2018-03-06 10:43:53 -08:00
|
|
|
match *event {
|
2018-04-02 13:00:42 -07:00
|
|
|
Event::Transaction(ref tr) => self.process_verified_transaction(tr),
|
2018-03-07 21:25:45 -08:00
|
|
|
Event::Signature { from, tx_sig, .. } => self.process_verified_sig(from, tx_sig),
|
|
|
|
Event::Timestamp { from, dt, .. } => self.process_verified_timestamp(from, dt),
|
2018-03-06 10:43:53 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-29 11:20:54 -07:00
|
|
|
/// Create, sign, and process a Transaction from `keypair` to `to` of
|
|
|
|
/// `n` tokens where `last_id` is the last Entry ID observed by the client.
|
2018-02-23 13:08:19 -08:00
|
|
|
pub fn transfer(
|
2018-04-04 11:33:00 -07:00
|
|
|
&self,
|
2018-03-05 16:29:32 -08:00
|
|
|
n: i64,
|
2018-03-07 10:05:06 -08:00
|
|
|
keypair: &KeyPair,
|
2018-02-28 09:07:54 -08:00
|
|
|
to: PublicKey,
|
2018-03-20 22:15:44 -07:00
|
|
|
last_id: Hash,
|
2018-03-02 09:16:39 -08:00
|
|
|
) -> Result<Signature> {
|
2018-03-20 22:15:44 -07:00
|
|
|
let tr = Transaction::new(keypair, to, n, last_id);
|
2018-03-06 15:34:14 -08:00
|
|
|
let sig = tr.sig;
|
2018-04-02 20:45:17 -07:00
|
|
|
self.process_verified_transaction(&tr).map(|_| sig)
|
2018-02-23 13:08:19 -08:00
|
|
|
}
|
|
|
|
|
2018-03-29 11:20:54 -07:00
|
|
|
/// Create, sign, and process a postdated Transaction from `keypair`
|
|
|
|
/// to `to` of `n` tokens on `dt` where `last_id` is the last Entry ID
|
|
|
|
/// observed by the client.
|
2018-03-07 20:55:49 -08:00
|
|
|
pub fn transfer_on_date(
|
2018-04-04 11:33:00 -07:00
|
|
|
&self,
|
2018-03-07 20:55:49 -08:00
|
|
|
n: i64,
|
|
|
|
keypair: &KeyPair,
|
|
|
|
to: PublicKey,
|
|
|
|
dt: DateTime<Utc>,
|
2018-03-20 22:15:44 -07:00
|
|
|
last_id: Hash,
|
2018-03-07 20:55:49 -08:00
|
|
|
) -> Result<Signature> {
|
2018-03-20 22:15:44 -07:00
|
|
|
let tr = Transaction::new_on_date(keypair, to, dt, n, last_id);
|
2018-03-07 20:55:49 -08:00
|
|
|
let sig = tr.sig;
|
2018-04-02 20:45:17 -07:00
|
|
|
self.process_verified_transaction(&tr).map(|_| sig)
|
2018-03-07 20:55:49 -08:00
|
|
|
}
|
|
|
|
|
2018-04-02 13:00:42 -07:00
|
|
|
pub fn get_balance(&self, pubkey: &PublicKey) -> Option<i64> {
|
2018-04-04 15:31:11 -07:00
|
|
|
let bals = self.balances.read().unwrap();
|
|
|
|
bals.get(pubkey).map(|x| *x.read().unwrap())
|
2018-02-23 13:08:19 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
2018-03-26 21:03:26 -07:00
|
|
|
use signature::KeyPairUtil;
|
2018-04-05 09:26:43 -07:00
|
|
|
use hash::hash;
|
|
|
|
use bincode::serialize;
|
2018-02-23 13:08:19 -08:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_accountant() {
|
2018-03-07 16:08:12 -08:00
|
|
|
let alice = Mint::new(10_000);
|
2018-03-07 14:32:22 -08:00
|
|
|
let bob_pubkey = KeyPair::new().pubkey();
|
2018-04-04 11:33:00 -07:00
|
|
|
let acc = Accountant::new(&alice);
|
2018-04-02 14:02:23 -07:00
|
|
|
acc.transfer(1_000, &alice.keypair(), bob_pubkey, alice.last_id())
|
2018-03-20 22:15:44 -07:00
|
|
|
.unwrap();
|
2018-03-07 10:05:06 -08:00
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey).unwrap(), 1_000);
|
2018-02-23 13:08:19 -08:00
|
|
|
|
2018-04-02 14:02:23 -07:00
|
|
|
acc.transfer(500, &alice.keypair(), bob_pubkey, alice.last_id())
|
2018-03-20 22:15:44 -07:00
|
|
|
.unwrap();
|
2018-02-23 13:08:19 -08:00
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey).unwrap(), 1_500);
|
|
|
|
}
|
2018-02-27 10:28:10 -08:00
|
|
|
|
2018-04-05 20:00:08 -07:00
|
|
|
#[test]
|
|
|
|
fn test_account_not_found() {
|
|
|
|
let mint = Mint::new(1);
|
|
|
|
let acc = Accountant::new(&mint);
|
|
|
|
assert_eq!(
|
|
|
|
acc.transfer(1, &KeyPair::new(), mint.pubkey(), mint.last_id()),
|
|
|
|
Err(AccountingError::AccountNotFound)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2018-02-27 10:28:10 -08:00
|
|
|
#[test]
|
|
|
|
fn test_invalid_transfer() {
|
2018-03-07 16:08:12 -08:00
|
|
|
let alice = Mint::new(11_000);
|
2018-04-04 11:33:00 -07:00
|
|
|
let acc = Accountant::new(&alice);
|
2018-03-07 14:32:22 -08:00
|
|
|
let bob_pubkey = KeyPair::new().pubkey();
|
2018-04-02 14:02:23 -07:00
|
|
|
acc.transfer(1_000, &alice.keypair(), bob_pubkey, alice.last_id())
|
2018-03-20 22:15:44 -07:00
|
|
|
.unwrap();
|
2018-03-02 09:16:39 -08:00
|
|
|
assert_eq!(
|
2018-04-02 14:02:23 -07:00
|
|
|
acc.transfer(10_001, &alice.keypair(), bob_pubkey, alice.last_id()),
|
2018-03-02 09:16:39 -08:00
|
|
|
Err(AccountingError::InsufficientFunds)
|
|
|
|
);
|
2018-03-01 11:23:27 -08:00
|
|
|
|
2018-03-07 14:32:22 -08:00
|
|
|
let alice_pubkey = alice.keypair().pubkey();
|
2018-02-27 10:28:10 -08:00
|
|
|
assert_eq!(acc.get_balance(&alice_pubkey).unwrap(), 10_000);
|
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey).unwrap(), 1_000);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_transfer_to_newb() {
|
2018-03-07 16:08:12 -08:00
|
|
|
let alice = Mint::new(10_000);
|
2018-04-04 11:33:00 -07:00
|
|
|
let acc = Accountant::new(&alice);
|
2018-03-07 14:32:22 -08:00
|
|
|
let alice_keypair = alice.keypair();
|
|
|
|
let bob_pubkey = KeyPair::new().pubkey();
|
2018-04-02 14:02:23 -07:00
|
|
|
acc.transfer(500, &alice_keypair, bob_pubkey, alice.last_id())
|
2018-03-20 22:15:44 -07:00
|
|
|
.unwrap();
|
2018-02-27 10:28:10 -08:00
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey).unwrap(), 500);
|
|
|
|
}
|
2018-03-08 07:58:01 -08:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_transfer_on_date() {
|
|
|
|
let alice = Mint::new(1);
|
2018-04-04 11:33:00 -07:00
|
|
|
let acc = Accountant::new(&alice);
|
2018-03-08 07:58:01 -08:00
|
|
|
let alice_keypair = alice.keypair();
|
|
|
|
let bob_pubkey = KeyPair::new().pubkey();
|
|
|
|
let dt = Utc::now();
|
2018-04-02 14:02:23 -07:00
|
|
|
acc.transfer_on_date(1, &alice_keypair, bob_pubkey, dt, alice.last_id())
|
2018-03-08 07:58:01 -08:00
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
// Alice's balance will be zero because all funds are locked up.
|
|
|
|
assert_eq!(acc.get_balance(&alice.pubkey()), Some(0));
|
|
|
|
|
|
|
|
// Bob's balance will be None because the funds have not been
|
|
|
|
// sent.
|
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey), None);
|
|
|
|
|
|
|
|
// Now, acknowledge the time in the condition occurred and
|
|
|
|
// that bob's funds are now available.
|
|
|
|
acc.process_verified_timestamp(alice.pubkey(), dt).unwrap();
|
2018-03-08 10:06:52 -08:00
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey), Some(1));
|
|
|
|
|
|
|
|
acc.process_verified_timestamp(alice.pubkey(), dt).unwrap(); // <-- Attack! Attempt to process completed transaction.
|
|
|
|
assert_ne!(acc.get_balance(&bob_pubkey), Some(2));
|
|
|
|
}
|
|
|
|
|
2018-03-08 14:39:03 -08:00
|
|
|
#[test]
|
|
|
|
fn test_transfer_after_date() {
|
|
|
|
let alice = Mint::new(1);
|
2018-04-04 11:33:00 -07:00
|
|
|
let acc = Accountant::new(&alice);
|
2018-03-08 14:39:03 -08:00
|
|
|
let alice_keypair = alice.keypair();
|
|
|
|
let bob_pubkey = KeyPair::new().pubkey();
|
|
|
|
let dt = Utc::now();
|
|
|
|
acc.process_verified_timestamp(alice.pubkey(), dt).unwrap();
|
|
|
|
|
|
|
|
// It's now past now, so this transfer should be processed immediately.
|
2018-04-02 14:02:23 -07:00
|
|
|
acc.transfer_on_date(1, &alice_keypair, bob_pubkey, dt, alice.last_id())
|
2018-03-08 14:39:03 -08:00
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
assert_eq!(acc.get_balance(&alice.pubkey()), Some(0));
|
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey), Some(1));
|
|
|
|
}
|
|
|
|
|
2018-03-08 10:06:52 -08:00
|
|
|
#[test]
|
|
|
|
fn test_cancel_transfer() {
|
|
|
|
let alice = Mint::new(1);
|
2018-04-04 11:33:00 -07:00
|
|
|
let acc = Accountant::new(&alice);
|
2018-03-08 10:06:52 -08:00
|
|
|
let alice_keypair = alice.keypair();
|
|
|
|
let bob_pubkey = KeyPair::new().pubkey();
|
|
|
|
let dt = Utc::now();
|
2018-04-02 14:02:23 -07:00
|
|
|
let sig = acc.transfer_on_date(1, &alice_keypair, bob_pubkey, dt, alice.last_id())
|
2018-03-08 10:06:52 -08:00
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
// Alice's balance will be zero because all funds are locked up.
|
|
|
|
assert_eq!(acc.get_balance(&alice.pubkey()), Some(0));
|
|
|
|
|
|
|
|
// Bob's balance will be None because the funds have not been
|
|
|
|
// sent.
|
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey), None);
|
|
|
|
|
|
|
|
// Now, cancel the trancaction. Alice gets her funds back, Bob never sees them.
|
|
|
|
acc.process_verified_sig(alice.pubkey(), sig).unwrap();
|
|
|
|
assert_eq!(acc.get_balance(&alice.pubkey()), Some(1));
|
|
|
|
assert_eq!(acc.get_balance(&bob_pubkey), None);
|
2018-03-08 07:58:01 -08:00
|
|
|
|
2018-03-08 10:06:52 -08:00
|
|
|
acc.process_verified_sig(alice.pubkey(), sig).unwrap(); // <-- Attack! Attempt to cancel completed transaction.
|
|
|
|
assert_ne!(acc.get_balance(&alice.pubkey()), Some(2));
|
2018-03-08 07:58:01 -08:00
|
|
|
}
|
2018-04-02 08:36:22 -07:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_duplicate_event_signature() {
|
|
|
|
let alice = Mint::new(1);
|
2018-04-04 11:33:00 -07:00
|
|
|
let acc = Accountant::new(&alice);
|
2018-04-02 08:36:22 -07:00
|
|
|
let sig = Signature::default();
|
2018-04-05 08:53:58 -07:00
|
|
|
assert!(acc.reserve_signature_with_last_id(&sig, &alice.last_id()));
|
|
|
|
assert!(!acc.reserve_signature_with_last_id(&sig, &alice.last_id()));
|
2018-04-02 08:36:22 -07:00
|
|
|
}
|
2018-04-05 09:26:43 -07:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_max_entry_ids() {
|
|
|
|
let alice = Mint::new(1);
|
|
|
|
let acc = Accountant::new(&alice);
|
|
|
|
let sig = Signature::default();
|
|
|
|
for i in 0..MAX_ENTRY_IDS {
|
|
|
|
let last_id = hash(&serialize(&i).unwrap()); // Unique hash
|
|
|
|
acc.register_entry_id(&last_id);
|
|
|
|
}
|
|
|
|
// Assert we're no longer able to use the oldest entry ID.
|
|
|
|
assert!(!acc.reserve_signature_with_last_id(&sig, &alice.last_id()));
|
|
|
|
}
|
2018-02-23 13:08:19 -08:00
|
|
|
}
|
2018-04-04 09:28:12 -07:00
|
|
|
|
|
|
|
#[cfg(all(feature = "unstable", test))]
|
|
|
|
mod bench {
|
|
|
|
extern crate test;
|
|
|
|
use self::test::Bencher;
|
|
|
|
use accountant::*;
|
|
|
|
use rayon::prelude::*;
|
|
|
|
use signature::KeyPairUtil;
|
2018-04-04 16:29:22 -07:00
|
|
|
use hash::hash;
|
|
|
|
use bincode::serialize;
|
2018-04-04 09:28:12 -07:00
|
|
|
|
|
|
|
#[bench]
|
|
|
|
fn process_verified_event_bench(bencher: &mut Bencher) {
|
2018-04-04 15:01:43 -07:00
|
|
|
let mint = Mint::new(100_000_000);
|
|
|
|
let acc = Accountant::new(&mint);
|
|
|
|
// Create transactions between unrelated parties.
|
2018-04-04 09:28:12 -07:00
|
|
|
let transactions: Vec<_> = (0..4096)
|
|
|
|
.into_par_iter()
|
2018-04-04 16:29:22 -07:00
|
|
|
.map(|i| {
|
2018-04-04 15:31:11 -07:00
|
|
|
// Seed the 'from' account.
|
2018-04-04 15:01:43 -07:00
|
|
|
let rando0 = KeyPair::new();
|
|
|
|
let tr = Transaction::new(&mint.keypair(), rando0.pubkey(), 1_000, mint.last_id());
|
|
|
|
acc.process_verified_transaction(&tr).unwrap();
|
2018-04-04 15:31:11 -07:00
|
|
|
|
2018-04-04 16:29:22 -07:00
|
|
|
// Seed the 'to' account and a cell for its signature.
|
|
|
|
let last_id = hash(&serialize(&i).unwrap()); // Unique hash
|
2018-04-05 08:53:58 -07:00
|
|
|
acc.register_entry_id(&last_id);
|
|
|
|
|
2018-04-04 15:01:43 -07:00
|
|
|
let rando1 = KeyPair::new();
|
2018-04-04 16:29:22 -07:00
|
|
|
let tr = Transaction::new(&rando0, rando1.pubkey(), 1, last_id);
|
2018-04-04 15:31:11 -07:00
|
|
|
acc.process_verified_transaction(&tr).unwrap();
|
|
|
|
|
|
|
|
// Finally, return a transaction that's unique
|
2018-04-04 16:29:22 -07:00
|
|
|
Transaction::new(&rando0, rando1.pubkey(), 1, last_id)
|
2018-04-04 09:28:12 -07:00
|
|
|
})
|
|
|
|
.collect();
|
|
|
|
bencher.iter(|| {
|
2018-04-04 15:31:11 -07:00
|
|
|
// Since benchmarker runs this multiple times, we need to clear the signatures.
|
2018-04-04 16:29:22 -07:00
|
|
|
for (_, sigs) in acc.last_ids.read().unwrap().iter() {
|
|
|
|
sigs.write().unwrap().clear();
|
|
|
|
}
|
2018-04-04 15:31:11 -07:00
|
|
|
|
2018-04-04 15:01:43 -07:00
|
|
|
transactions.par_iter().for_each(|tr| {
|
2018-04-04 09:28:12 -07:00
|
|
|
acc.process_verified_transaction(tr).unwrap();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|