mirror of https://github.com/certusone/wasmd.git
259 lines
9.2 KiB
Go
259 lines
9.2 KiB
Go
package app
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/cosmos/cosmos-sdk/baseapp"
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
"github.com/cosmos/cosmos-sdk/simapp"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
"github.com/cosmos/cosmos-sdk/types/kv"
|
|
"github.com/cosmos/cosmos-sdk/types/module"
|
|
simtypes "github.com/cosmos/cosmos-sdk/types/simulation"
|
|
authtypes "github.com/cosmos/cosmos-sdk/x/auth/types"
|
|
authzkeeper "github.com/cosmos/cosmos-sdk/x/authz/keeper"
|
|
banktypes "github.com/cosmos/cosmos-sdk/x/bank/types"
|
|
capabilitytypes "github.com/cosmos/cosmos-sdk/x/capability/types"
|
|
distrtypes "github.com/cosmos/cosmos-sdk/x/distribution/types"
|
|
evidencetypes "github.com/cosmos/cosmos-sdk/x/evidence/types"
|
|
"github.com/cosmos/cosmos-sdk/x/feegrant"
|
|
govtypes "github.com/cosmos/cosmos-sdk/x/gov/types"
|
|
minttypes "github.com/cosmos/cosmos-sdk/x/mint/types"
|
|
paramstypes "github.com/cosmos/cosmos-sdk/x/params/types"
|
|
"github.com/cosmos/cosmos-sdk/x/simulation"
|
|
slashingtypes "github.com/cosmos/cosmos-sdk/x/slashing/types"
|
|
stakingtypes "github.com/cosmos/cosmos-sdk/x/staking/types"
|
|
ibctransfertypes "github.com/cosmos/ibc-go/v4/modules/apps/transfer/types"
|
|
ibchost "github.com/cosmos/ibc-go/v4/modules/core/24-host"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/tendermint/tendermint/libs/log"
|
|
tmproto "github.com/tendermint/tendermint/proto/tendermint/types"
|
|
dbm "github.com/tendermint/tm-db"
|
|
|
|
"github.com/CosmWasm/wasmd/x/wasm"
|
|
wasmtypes "github.com/CosmWasm/wasmd/x/wasm/types"
|
|
)
|
|
|
|
// Get flags every time the simulator is run
|
|
func init() {
|
|
simapp.GetSimulatorFlags()
|
|
}
|
|
|
|
type StoreKeysPrefixes struct {
|
|
A sdk.StoreKey
|
|
B sdk.StoreKey
|
|
Prefixes [][]byte
|
|
}
|
|
|
|
// SetupSimulation wraps simapp.SetupSimulation in order to create any export directory if they do not exist yet
|
|
func SetupSimulation(dirPrefix, dbName string) (simtypes.Config, dbm.DB, string, log.Logger, bool, error) {
|
|
config, db, dir, logger, skip, err := simapp.SetupSimulation(dirPrefix, dbName)
|
|
if err != nil {
|
|
return simtypes.Config{}, nil, "", nil, false, err
|
|
}
|
|
|
|
paths := []string{config.ExportParamsPath, config.ExportStatePath, config.ExportStatsPath}
|
|
for _, path := range paths {
|
|
if len(path) == 0 {
|
|
continue
|
|
}
|
|
|
|
path = filepath.Dir(path)
|
|
if _, err := os.Stat(path); os.IsNotExist(err) {
|
|
if err := os.MkdirAll(path, os.ModePerm); err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return config, db, dir, logger, skip, err
|
|
}
|
|
|
|
// GetSimulationLog unmarshals the KVPair's Value to the corresponding type based on the
|
|
// each's module store key and the prefix bytes of the KVPair's key.
|
|
func GetSimulationLog(storeName string, sdr sdk.StoreDecoderRegistry, kvAs, kvBs []kv.Pair) (log string) {
|
|
for i := 0; i < len(kvAs); i++ {
|
|
if len(kvAs[i].Value) == 0 && len(kvBs[i].Value) == 0 {
|
|
// skip if the value doesn't have any bytes
|
|
continue
|
|
}
|
|
|
|
decoder, ok := sdr[storeName]
|
|
if ok {
|
|
log += decoder(kvAs[i], kvBs[i])
|
|
} else {
|
|
log += fmt.Sprintf("store A %q => %q\nstore B %q => %q\n", kvAs[i].Key, kvAs[i].Value, kvBs[i].Key, kvBs[i].Value)
|
|
}
|
|
}
|
|
|
|
return log
|
|
}
|
|
|
|
// fauxMerkleModeOpt returns a BaseApp option to use a dbStoreAdapter instead of
|
|
// an IAVLStore for faster simulation speed.
|
|
func fauxMerkleModeOpt(bapp *baseapp.BaseApp) {
|
|
bapp.SetFauxMerkleMode()
|
|
}
|
|
|
|
func TestAppImportExport(t *testing.T) {
|
|
config, db, dir, logger, skip, err := SetupSimulation("leveldb-app-sim", "Simulation")
|
|
if skip {
|
|
t.Skip("skipping application import/export simulation")
|
|
}
|
|
require.NoError(t, err, "simulation setup failed")
|
|
|
|
defer func() {
|
|
db.Close()
|
|
require.NoError(t, os.RemoveAll(dir))
|
|
}()
|
|
|
|
encConf := MakeEncodingConfig()
|
|
app := NewWasmApp(logger, db, nil, true, map[int64]bool{}, dir, simapp.FlagPeriodValue, encConf, wasm.EnableAllProposals, EmptyBaseAppOptions{}, nil, fauxMerkleModeOpt)
|
|
require.Equal(t, appName, app.Name())
|
|
|
|
// Run randomized simulation
|
|
_, simParams, simErr := simulation.SimulateFromSeed(
|
|
t,
|
|
os.Stdout,
|
|
app.BaseApp,
|
|
AppStateFn(app.AppCodec(), app.SimulationManager()),
|
|
simtypes.RandomAccounts,
|
|
simapp.SimulationOperations(app, app.AppCodec(), config),
|
|
app.ModuleAccountAddrs(),
|
|
config,
|
|
app.AppCodec(),
|
|
)
|
|
|
|
// export state and simParams before the simulation error is checked
|
|
err = simapp.CheckExportSimulation(app, config, simParams)
|
|
require.NoError(t, err)
|
|
require.NoError(t, simErr)
|
|
|
|
if config.Commit {
|
|
simapp.PrintStats(db)
|
|
}
|
|
|
|
t.Log("exporting genesis...")
|
|
|
|
exported, err := app.ExportAppStateAndValidators(false, []string{})
|
|
require.NoError(t, err)
|
|
|
|
t.Log("importing genesis...")
|
|
|
|
_, newDB, newDir, _, _, err := SetupSimulation("leveldb-app-sim-2", "Simulation-2")
|
|
require.NoError(t, err, "simulation setup failed")
|
|
|
|
defer func() {
|
|
newDB.Close()
|
|
require.NoError(t, os.RemoveAll(newDir))
|
|
}()
|
|
newApp := NewWasmApp(logger, newDB, nil, true, map[int64]bool{}, newDir, simapp.FlagPeriodValue, encConf, wasm.EnableAllProposals, EmptyBaseAppOptions{}, nil, fauxMerkleModeOpt)
|
|
require.Equal(t, appName, newApp.Name())
|
|
|
|
var genesisState GenesisState
|
|
err = json.Unmarshal(exported.AppState, &genesisState)
|
|
require.NoError(t, err)
|
|
|
|
ctxA := app.NewContext(true, tmproto.Header{Height: app.LastBlockHeight()})
|
|
ctxB := newApp.NewContext(true, tmproto.Header{Height: app.LastBlockHeight()})
|
|
newApp.mm.InitGenesis(ctxB, app.AppCodec(), genesisState)
|
|
newApp.StoreConsensusParams(ctxB, exported.ConsensusParams)
|
|
|
|
t.Log("comparing stores...")
|
|
|
|
storeKeysPrefixes := []StoreKeysPrefixes{
|
|
{app.keys[authtypes.StoreKey], newApp.keys[authtypes.StoreKey], [][]byte{}},
|
|
{
|
|
app.keys[stakingtypes.StoreKey], newApp.keys[stakingtypes.StoreKey],
|
|
[][]byte{
|
|
stakingtypes.UnbondingQueueKey, stakingtypes.RedelegationQueueKey, stakingtypes.ValidatorQueueKey,
|
|
stakingtypes.HistoricalInfoKey,
|
|
},
|
|
},
|
|
{app.keys[slashingtypes.StoreKey], newApp.keys[slashingtypes.StoreKey], [][]byte{}},
|
|
{app.keys[minttypes.StoreKey], newApp.keys[minttypes.StoreKey], [][]byte{}},
|
|
{app.keys[distrtypes.StoreKey], newApp.keys[distrtypes.StoreKey], [][]byte{}},
|
|
{app.keys[banktypes.StoreKey], newApp.keys[banktypes.StoreKey], [][]byte{banktypes.BalancesPrefix}},
|
|
{app.keys[paramstypes.StoreKey], newApp.keys[paramstypes.StoreKey], [][]byte{}},
|
|
{app.keys[govtypes.StoreKey], newApp.keys[govtypes.StoreKey], [][]byte{}},
|
|
{app.keys[evidencetypes.StoreKey], newApp.keys[evidencetypes.StoreKey], [][]byte{}},
|
|
{app.keys[capabilitytypes.StoreKey], newApp.keys[capabilitytypes.StoreKey], [][]byte{}},
|
|
{app.keys[ibchost.StoreKey], newApp.keys[ibchost.StoreKey], [][]byte{}},
|
|
{app.keys[ibctransfertypes.StoreKey], newApp.keys[ibctransfertypes.StoreKey], [][]byte{}},
|
|
{app.keys[authzkeeper.StoreKey], newApp.keys[authzkeeper.StoreKey], [][]byte{}},
|
|
{app.keys[feegrant.StoreKey], newApp.keys[feegrant.StoreKey], [][]byte{}},
|
|
{app.keys[wasm.StoreKey], newApp.keys[wasm.StoreKey], [][]byte{}},
|
|
}
|
|
|
|
// delete persistent tx counter value
|
|
ctxA.KVStore(app.keys[wasm.StoreKey]).Delete(wasmtypes.TXCounterPrefix)
|
|
|
|
// diff both stores
|
|
for _, skp := range storeKeysPrefixes {
|
|
storeA := ctxA.KVStore(skp.A)
|
|
storeB := ctxB.KVStore(skp.B)
|
|
|
|
failedKVAs, failedKVBs := sdk.DiffKVStores(storeA, storeB, skp.Prefixes)
|
|
require.Equal(t, len(failedKVAs), len(failedKVBs), "unequal sets of key-values to compare")
|
|
|
|
t.Logf("compared %d different key/value pairs between %s and %s\n", len(failedKVAs), skp.A, skp.B)
|
|
require.Len(t, failedKVAs, 0, GetSimulationLog(skp.A.Name(), app.SimulationManager().StoreDecoders, failedKVAs, failedKVBs))
|
|
}
|
|
}
|
|
|
|
func TestFullAppSimulation(t *testing.T) {
|
|
config, db, dir, logger, skip, err := SetupSimulation("leveldb-app-sim", "Simulation")
|
|
if skip {
|
|
t.Skip("skipping application simulation")
|
|
}
|
|
require.NoError(t, err, "simulation setup failed")
|
|
|
|
defer func() {
|
|
db.Close()
|
|
require.NoError(t, os.RemoveAll(dir))
|
|
}()
|
|
encConf := MakeEncodingConfig()
|
|
app := NewWasmApp(logger, db, nil, true, map[int64]bool{}, t.TempDir(), simapp.FlagPeriodValue,
|
|
encConf, wasm.EnableAllProposals, simapp.EmptyAppOptions{}, nil, fauxMerkleModeOpt)
|
|
require.Equal(t, "WasmApp", app.Name())
|
|
|
|
// run randomized simulation
|
|
_, simParams, simErr := simulation.SimulateFromSeed(
|
|
t,
|
|
os.Stdout,
|
|
app.BaseApp,
|
|
AppStateFn(app.appCodec, app.SimulationManager()),
|
|
simtypes.RandomAccounts, // Replace with own random account function if using keys other than secp256k1
|
|
simapp.SimulationOperations(app, app.AppCodec(), config),
|
|
app.ModuleAccountAddrs(),
|
|
config,
|
|
app.AppCodec(),
|
|
)
|
|
|
|
// export state and simParams before the simulation error is checked
|
|
err = simapp.CheckExportSimulation(app, config, simParams)
|
|
require.NoError(t, err)
|
|
require.NoError(t, simErr)
|
|
|
|
if config.Commit {
|
|
simapp.PrintStats(db)
|
|
}
|
|
}
|
|
|
|
// AppStateFn returns the initial application state using a genesis or the simulation parameters.
|
|
// It panics if the user provides files for both of them.
|
|
// If a file is not given for the genesis or the sim params, it creates a randomized one.
|
|
func AppStateFn(codec codec.Codec, manager *module.SimulationManager) simtypes.AppStateFn {
|
|
// quick hack to setup app state genesis with our app modules
|
|
simapp.ModuleBasics = ModuleBasics
|
|
if simapp.FlagGenesisTimeValue == 0 { // always set to have a block time
|
|
simapp.FlagGenesisTimeValue = time.Now().Unix()
|
|
}
|
|
return simapp.AppStateFn(codec, manager)
|
|
}
|