2023-01-16 04:33:01 -08:00
|
|
|
package db
|
|
|
|
|
|
|
|
import (
|
2023-09-29 08:42:44 -07:00
|
|
|
"bytes"
|
|
|
|
"encoding/binary"
|
|
|
|
"os"
|
|
|
|
"sort"
|
2023-01-16 04:33:01 -08:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/certusone/wormhole/node/pkg/common"
|
|
|
|
"github.com/wormhole-foundation/wormhole/sdk/vaa"
|
|
|
|
|
|
|
|
"github.com/dgraph-io/badger/v3"
|
|
|
|
eth_common "github.com/ethereum/go-ethereum/common"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
|
|
|
"go.uber.org/zap"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestAcctPendingTransferMsgID(t *testing.T) {
|
|
|
|
tokenBridgeAddr, err := vaa.StringToAddress("0x0290fb167208af455bb137780163b7b7a9a10c16")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
msg1 := &common.MessagePublication{
|
|
|
|
TxHash: eth_common.HexToHash("0x06f541f5ecfc43407c31587aa6ac3a689e8960f36dc23c332db5510dfc6a4063"),
|
|
|
|
Timestamp: time.Unix(int64(1654516425), 0),
|
|
|
|
Nonce: 123456,
|
|
|
|
Sequence: 789101112131415,
|
|
|
|
EmitterChain: vaa.ChainIDEthereum,
|
|
|
|
EmitterAddress: tokenBridgeAddr,
|
|
|
|
Payload: []byte{},
|
|
|
|
ConsistencyLevel: 16,
|
|
|
|
}
|
|
|
|
|
2023-09-29 08:42:44 -07:00
|
|
|
assert.Equal(t, []byte("ACCT:PXFER:"+"2/0000000000000000000000000290fb167208af455bb137780163b7b7a9a10c16/789101112131415"), acctOldPendingTransferMsgID(msg1.MessageIDString()))
|
|
|
|
assert.Equal(t, []byte("ACCT:PXFER2:"+"2/0000000000000000000000000290fb167208af455bb137780163b7b7a9a10c16/789101112131415"), acctPendingTransferMsgID(msg1.MessageIDString()))
|
2023-01-16 04:33:01 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAcctIsPendingTransfer(t *testing.T) {
|
2023-09-29 08:42:44 -07:00
|
|
|
assert.Equal(t, true, acctIsPendingTransfer([]byte("ACCT:PXFER2:"+"2/0000000000000000000000000290fb167208af455bb137780163b7b7a9a10c16/789101112131415")))
|
|
|
|
assert.Equal(t, false, acctIsPendingTransfer([]byte("ACCT:PXFER2:")))
|
|
|
|
assert.Equal(t, false, acctIsPendingTransfer([]byte("ACCT:PXFER2:1")))
|
|
|
|
assert.Equal(t, false, acctIsPendingTransfer([]byte("ACCT:PXFER2:1/1/1")))
|
|
|
|
assert.Equal(t, false, acctIsPendingTransfer([]byte("ACCT:PXFER2:"+"1/0000000000000000000000000290fb167208af455bb137780163b7b7a9a10c16/")))
|
|
|
|
assert.Equal(t, true, acctIsPendingTransfer([]byte("ACCT:PXFER2:"+"1/0000000000000000000000000290fb167208af455bb137780163b7b7a9a10c16/0")))
|
2023-01-16 04:33:01 -08:00
|
|
|
assert.Equal(t, false, acctIsPendingTransfer([]byte("GOV:PENDING:"+"2/0000000000000000000000000290fb167208af455bb137780163b7b7a9a10c16/789101112131415")))
|
|
|
|
assert.Equal(t, false, acctIsPendingTransfer([]byte{0x01, 0x02, 0x03, 0x04}))
|
|
|
|
assert.Equal(t, false, acctIsPendingTransfer([]byte{}))
|
2023-09-29 08:42:44 -07:00
|
|
|
assert.Equal(t, true, acctIsOldPendingTransfer([]byte("ACCT:PXFER:"+"2/0000000000000000000000000290fb167208af455bb137780163b7b7a9a10c16/789101112131415")))
|
|
|
|
assert.Equal(t, false, acctIsOldPendingTransfer([]byte("ACCT:PXFER2:"+"2/0000000000000000000000000290fb167208af455bb137780163b7b7a9a10c16/789101112131415")))
|
2023-01-16 04:33:01 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAcctStoreAndDeletePendingTransfers(t *testing.T) {
|
|
|
|
dbPath := t.TempDir()
|
|
|
|
db, err := Open(dbPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to open database")
|
|
|
|
}
|
|
|
|
defer db.Close()
|
|
|
|
|
|
|
|
tokenBridgeAddr, _ := vaa.StringToAddress("0x0290fb167208af455bb137780163b7b7a9a10c16")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
msg1 := &common.MessagePublication{
|
|
|
|
TxHash: eth_common.HexToHash("0x06f541f5ecfc43407c31587aa6ac3a689e8960f36dc23c332db5510dfc6a4063"),
|
|
|
|
Timestamp: time.Unix(int64(1654516425), 0),
|
|
|
|
Nonce: 123456,
|
|
|
|
Sequence: 789101112131415,
|
|
|
|
EmitterChain: vaa.ChainIDEthereum,
|
|
|
|
EmitterAddress: tokenBridgeAddr,
|
|
|
|
Payload: []byte{},
|
|
|
|
ConsistencyLevel: 16,
|
|
|
|
}
|
|
|
|
|
|
|
|
msg2 := &common.MessagePublication{
|
|
|
|
TxHash: eth_common.HexToHash("0x06f541f5ecfc43407c31587aa6ac3a689e8960f36dc23c332db5510dfc6a4064"),
|
|
|
|
Timestamp: time.Unix(int64(1654516425), 0),
|
|
|
|
Nonce: 123457,
|
|
|
|
Sequence: 789101112131416,
|
|
|
|
EmitterChain: vaa.ChainIDEthereum,
|
|
|
|
EmitterAddress: tokenBridgeAddr,
|
|
|
|
Payload: []byte{},
|
|
|
|
ConsistencyLevel: 16,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = db.AcctStorePendingTransfer(msg1)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.NoError(t, db.rowExistsInDB(acctPendingTransferMsgID(msg1.MessageIDString())))
|
|
|
|
|
|
|
|
err = db.AcctStorePendingTransfer(msg2)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.NoError(t, db.rowExistsInDB(acctPendingTransferMsgID(msg2.MessageIDString())))
|
|
|
|
|
|
|
|
err = db.AcctDeletePendingTransfer(msg1.MessageIDString())
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Error(t, db.rowExistsInDB(acctPendingTransferMsgID(msg1.MessageIDString())))
|
|
|
|
|
|
|
|
err = db.AcctDeletePendingTransfer(msg2.MessageIDString())
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Error(t, db.rowExistsInDB(acctPendingTransferMsgID(msg2.MessageIDString())))
|
|
|
|
|
|
|
|
// Delete something that doesn't exist.
|
|
|
|
msg3 := &common.MessagePublication{
|
|
|
|
TxHash: eth_common.HexToHash("0x06f541f5ecfc43407c31587aa6ac3a689e8960f36dc23c332db5510dfc6a4064"),
|
|
|
|
Timestamp: time.Unix(int64(1654516425), 0),
|
|
|
|
Nonce: 123457,
|
|
|
|
Sequence: 789101112131417,
|
|
|
|
EmitterChain: vaa.ChainIDEthereum,
|
|
|
|
EmitterAddress: tokenBridgeAddr,
|
|
|
|
Payload: []byte{},
|
|
|
|
ConsistencyLevel: 16,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = db.AcctDeletePendingTransfer(msg3.MessageIDString())
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Error(t, db.rowExistsInDB(acctPendingTransferMsgID(msg3.MessageIDString())))
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAcctGetEmptyData(t *testing.T) {
|
|
|
|
dbPath := t.TempDir()
|
|
|
|
db, err := Open(dbPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to open database")
|
|
|
|
}
|
|
|
|
defer db.Close()
|
|
|
|
|
|
|
|
logger, _ := zap.NewDevelopment()
|
|
|
|
|
2023-09-29 08:42:44 -07:00
|
|
|
pendings, err := db.AcctGetData(logger)
|
2023-01-16 04:33:01 -08:00
|
|
|
require.NoError(t, err)
|
2023-09-29 08:42:44 -07:00
|
|
|
assert.Equal(t, 0, len(pendings))
|
2023-01-16 04:33:01 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAcctGetData(t *testing.T) {
|
|
|
|
dbPath := t.TempDir()
|
|
|
|
db, err := Open(dbPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to open database")
|
|
|
|
}
|
|
|
|
defer db.Close()
|
|
|
|
|
|
|
|
logger, _ := zap.NewDevelopment()
|
|
|
|
|
|
|
|
// Store some unrelated junk in the db to make sure it gets skipped.
|
|
|
|
junk := []byte("ABC123")
|
|
|
|
err = db.db.Update(func(txn *badger.Txn) error {
|
|
|
|
if err := txn.Set(junk, junk); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, db.rowExistsInDB(junk))
|
|
|
|
|
|
|
|
tokenBridgeAddr, _ := vaa.StringToAddress("0x0290fb167208af455bb137780163b7b7a9a10c16")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
msg1 := &common.MessagePublication{
|
|
|
|
TxHash: eth_common.HexToHash("0x06f541f5ecfc43407c31587aa6ac3a689e8960f36dc23c332db5510dfc6a4063"),
|
|
|
|
Timestamp: time.Unix(int64(1654516425), 0),
|
|
|
|
Nonce: 123456,
|
|
|
|
Sequence: 789101112131415,
|
|
|
|
EmitterChain: vaa.ChainIDEthereum,
|
|
|
|
EmitterAddress: tokenBridgeAddr,
|
|
|
|
Payload: []byte{},
|
|
|
|
ConsistencyLevel: 16,
|
|
|
|
}
|
|
|
|
|
|
|
|
msg2 := &common.MessagePublication{
|
|
|
|
TxHash: eth_common.HexToHash("0x06f541f5ecfc43407c31587aa6ac3a689e8960f36dc23c332db5510dfc6a4064"),
|
|
|
|
Timestamp: time.Unix(int64(1654516425), 0),
|
|
|
|
Nonce: 123457,
|
|
|
|
Sequence: 789101112131416,
|
|
|
|
EmitterChain: vaa.ChainIDEthereum,
|
|
|
|
EmitterAddress: tokenBridgeAddr,
|
|
|
|
Payload: []byte{},
|
|
|
|
ConsistencyLevel: 16,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = db.AcctStorePendingTransfer(msg1)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, db.rowExistsInDB(acctPendingTransferMsgID(msg1.MessageIDString())))
|
|
|
|
|
|
|
|
err = db.AcctStorePendingTransfer(msg2)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, db.rowExistsInDB(acctPendingTransferMsgID(msg2.MessageIDString())))
|
|
|
|
|
|
|
|
// Store the same transfer again with an update.
|
|
|
|
msg1a := *msg1
|
|
|
|
msg1a.ConsistencyLevel = 17
|
|
|
|
err = db.AcctStorePendingTransfer(&msg1a)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2023-09-29 08:42:44 -07:00
|
|
|
pendings, err := db.AcctGetData(logger)
|
2023-01-16 04:33:01 -08:00
|
|
|
require.NoError(t, err)
|
2023-09-29 08:42:44 -07:00
|
|
|
require.Equal(t, 2, len(pendings))
|
2023-01-16 04:33:01 -08:00
|
|
|
|
2023-09-29 08:42:44 -07:00
|
|
|
assert.Equal(t, msg1a, *pendings[0])
|
|
|
|
assert.Equal(t, *msg2, *pendings[1])
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAcctLoadingOldPendings(t *testing.T) {
|
|
|
|
dbPath := t.TempDir()
|
|
|
|
db, err := Open(dbPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("failed to open database")
|
|
|
|
}
|
|
|
|
defer db.Close()
|
|
|
|
defer os.Remove(dbPath)
|
|
|
|
|
|
|
|
tokenBridgeAddr, err := vaa.StringToAddress("0x0290fb167208af455bb137780163b7b7a9a10c16")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
now := time.Unix(time.Now().Unix(), 0)
|
|
|
|
|
|
|
|
// Write the first pending event in the old format.
|
|
|
|
pending1 := &common.MessagePublication{
|
|
|
|
TxHash: eth_common.HexToHash("0x06f541f5ecfc43407c31587aa6ac3a689e8960f36dc23c332db5510dfc6a4063"),
|
|
|
|
Timestamp: now,
|
|
|
|
Nonce: 123456,
|
|
|
|
Sequence: 789101112131417,
|
|
|
|
EmitterChain: vaa.ChainIDEthereum,
|
|
|
|
EmitterAddress: tokenBridgeAddr,
|
|
|
|
Payload: []byte{4, 0, 0, 0, 0, 0, 0, 0, 0, 0},
|
|
|
|
ConsistencyLevel: 16,
|
|
|
|
// IsReobservation will not be serialized. It should be set to false on reload.
|
|
|
|
}
|
|
|
|
|
|
|
|
db.acctStoreOldPendingTransfer(t, pending1)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
now2 := now.Add(time.Second * 5)
|
|
|
|
|
|
|
|
// Write the second one in the new format.
|
|
|
|
pending2 := &common.MessagePublication{
|
|
|
|
TxHash: eth_common.HexToHash("0x06f541f5ecfc43407c31587aa6ac3a689e8960f36dc23c332db5510dfc6a4063"),
|
|
|
|
Timestamp: now2,
|
|
|
|
Nonce: 123456,
|
|
|
|
Sequence: 789101112131418,
|
|
|
|
EmitterChain: vaa.ChainIDEthereum,
|
|
|
|
EmitterAddress: tokenBridgeAddr,
|
|
|
|
Payload: []byte{4, 0, 0, 0, 0, 0, 0, 0, 0, 0},
|
|
|
|
ConsistencyLevel: 16,
|
|
|
|
IsReobservation: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = db.AcctStorePendingTransfer(pending2)
|
|
|
|
require.Nil(t, err)
|
|
|
|
|
|
|
|
logger := zap.NewNop()
|
|
|
|
pendings, err := db.AcctGetData(logger)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, 2, len(pendings))
|
|
|
|
|
|
|
|
// Updated old pending events get placed at the end, so we need to sort into timestamp order.
|
|
|
|
sort.SliceStable(pendings, func(i, j int) bool {
|
|
|
|
return pendings[i].Timestamp.Before(pendings[j].Timestamp)
|
|
|
|
})
|
|
|
|
|
|
|
|
assert.Equal(t, *pending1, *pendings[0])
|
|
|
|
assert.Equal(t, *pending2, *pendings[1])
|
|
|
|
|
|
|
|
// Make sure we can reload the updated pendings.
|
|
|
|
pendings2, err := db.AcctGetData(logger)
|
|
|
|
|
|
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 2, len(pendings2))
|
|
|
|
|
|
|
|
assert.Equal(t, pending1, pendings2[0])
|
|
|
|
assert.Equal(t, pending2, pendings2[1])
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *Database) acctStoreOldPendingTransfer(t *testing.T, msg *common.MessagePublication) {
|
|
|
|
buf := new(bytes.Buffer)
|
|
|
|
|
|
|
|
b := marshalOldMessagePublication(msg)
|
|
|
|
|
|
|
|
vaa.MustWrite(buf, binary.BigEndian, b)
|
|
|
|
|
|
|
|
err := d.db.Update(func(txn *badger.Txn) error {
|
|
|
|
if err := txn.Set(acctOldPendingTransferMsgID(msg.MessageIDString()), buf.Bytes()); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
require.NoError(t, err)
|
2023-01-16 04:33:01 -08:00
|
|
|
}
|