This adds the most important updates to Graphene from BitShares. Most notably, https://github.com/bitshares/bitshares-core/issues/1506 Second most notably, it updates Peerplays' FC to be in sync with BitShares FC. This is a squash commit of several subcommits. The subcommit messages are reproduced below: Replace fc::uint128 with boost::multiprecision::uint128_t replace smart_ref with shared_ptr Fixes/Remove Unused Remove NTP time Remove old macro This macro is now in FC, so no need to define it here anymore Replaced fc::array with std::array Separate exception declaration and implementation Adapted to fc promise changes Fixes Add back in some of Peter's fixes that got lost in the cherry pick _hash endianness fixes Remove all uses of fc/smart_ref It's gone, can't use it anymore Replace improper static_variant operator overloads with comparators Fixes Remove boost::signals from build system; it's header-only so it's not listed in cmake anymore. Also remove some unused hashing code Impl. pack/unpack functions for extension class Ref #1506: Isolate chain/protocol to its own library Ref #1506: Add object_downcast_t Allows the more concise expression `object_downcast_t<xyz>` instead of the old `typename object_downcast<xyz>::type` Ref #1506: Move ID types from db to protocol The ID types, object_id and object_id_type, were defined in the db library, and the protocol library depends on db to get these types. Technically, the ID types are defined by the protocol and used by the database, and not vice versa. Therefore these types should be in the protocol library, and db should depend on protocol to get them. This commit makes it so. Ref #1506: Isolate chain/protocol to its own library Remove commented-out index code Wrap overlength line Remove unused key types Probably fix Docker build Fix build after rebase Ref #1506/#1737: Some requested changes Ref #1506/#1737: Macro-fy ID type definitions Define macros to fully de-boilerplate ID type definitions. Externalities: - Rename transaction_object -> transaction_history_object - Rename impl_asset_dynamic_data_type -> impl_asset_dynamic_data_object_type - Rename impl_asset_bitasset_data_type -> impl_asset_bitasset_data_object_type The first is to avoid a naming collision on transaction_id_type, and the other two are to maintain consistency with the naming of the other types. Ref #1506/#1737: Fix clean_name() Ref #1506/#1737: Oops Fix .gitignore Externalized serialization in protocol library Fix compile sets Delete a couple of ghost files that were in the tree but not part of the project (I accidentally added them to CMakeLists while merging, but they're broken and not part of the Peerplays code), and add several files that got dropped from the build during merge. General fixes Fix warnings, build issues, unused code, etc. Fix #1772 by decprecating cli_wallet -H More fixes Fix errors and warnings and generally coax it to build Fix test I'm pretty sure this didn't break from what I did... But I can't build the original code, so I can't tell. Anyways, this one now passes... Others still fail... Small fix Fix crash in auth checks Final fixes Last round of fixes following the rebase to Beatrice Rename project in CMakeLists.txt The CMakeLists.txt declared this project as BitShares and not Peerplays, which makes it confusing in IDEs. Rename it to be clear which project is open. Resolve #374 Replace all object refs in macros with IDs, and fix affected tests to look up objects by ID rather than using invalidated refs. A full audit of all tests should be performed to eliminate any further usage of invalidated object references. Resolve #373: Add object notifiers Various fixes Fixes to various issues, primarily reflections, that cropped up during merge conflict resolution Fix startup bug in Bookie plugin Bookie plugin was preventing the node from starting up because it registered its secondary indexes to create objects in its own primary indexes to track objects being created in other primary indexes, and did so during its `initialize()` step, which is to say, before the database was loaded from disk at startup. This caused the secondary indexes to create tracker objects when the observed indexes were loading objects from disk. This then caused a failure when these tracker indexes were later loaded from disk, and the first object IDs collided. This is fixed by refraining from defining secondary indexes until the `startup()` stage rather than the `initialize()` stage. Primary indexes are registered in `initialize()`, secondary indexes are registered in `startup()`. This also involved adding a new method, "add_secondary_index()", to `object_database`, as before there was no way to do this because you couldn't get a non-const index from a non-const database. I have no idea how this was working before I got here... Fix egenesis install Fixes after updates Rebase on updated develop branch and fix conflicts
1651 lines
61 KiB
C++
1651 lines
61 KiB
C++
#include <graphene/chain/hardfork.hpp>
|
|
#include <graphene/chain/database.hpp>
|
|
#include <graphene/protocol/protocol.hpp>
|
|
#include <graphene/chain/exceptions.hpp>
|
|
|
|
#include <graphene/chain/account_object.hpp>
|
|
#include <graphene/chain/asset_object.hpp>
|
|
#include <graphene/chain/committee_member_object.hpp>
|
|
#include <graphene/chain/proposal_object.hpp>
|
|
#include <graphene/chain/custom_permission_object.hpp>
|
|
#include <graphene/chain/custom_account_authority_object.hpp>
|
|
|
|
#include <graphene/db/simple_index.hpp>
|
|
|
|
#include <graphene/protocol/protocol.hpp>
|
|
|
|
#include <fc/crypto/digest.hpp>
|
|
|
|
#include <boost/test/unit_test.hpp>
|
|
|
|
#include "../common/database_fixture.hpp"
|
|
|
|
using namespace graphene::chain;
|
|
using namespace graphene::chain::test;
|
|
|
|
BOOST_FIXTURE_TEST_SUITE(custom_permission_tests, database_fixture)
|
|
|
|
BOOST_AUTO_TEST_CASE(permission_create_fail_test)
|
|
{
|
|
try
|
|
{
|
|
ACTORS((alice)(bob));
|
|
upgrade_to_lifetime_member(alice);
|
|
upgrade_to_lifetime_member(bob);
|
|
transfer(committee_account, alice_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
transfer(committee_account, bob_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
{
|
|
custom_permission_create_operation op;
|
|
op.permission_name = "abc";
|
|
op.owner_account = alice_id;
|
|
op.auth = authority(1, bob_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
// Fail, not RBAC HF time yet
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 0);
|
|
}
|
|
// alice fails to create custom permission
|
|
generate_blocks(HARDFORK_NFT_TIME);
|
|
generate_block();
|
|
set_expiration(db, trx);
|
|
{
|
|
custom_permission_create_operation op;
|
|
op.owner_account = alice_id;
|
|
op.auth = authority(1, bob_id, 1);
|
|
op.permission_name = "123";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "1ab";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = ".abc";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "abc.";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "ABC";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "active";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "owner";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "abcdefghijk";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "ab";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "***";
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
op.permission_name = "a12";
|
|
BOOST_CHECK_NO_THROW(op.validate());
|
|
op.permission_name = "a1b";
|
|
BOOST_CHECK_NO_THROW(op.validate());
|
|
op.permission_name = "abc";
|
|
BOOST_CHECK_NO_THROW(op.validate());
|
|
op.permission_name = "abc123defg";
|
|
BOOST_CHECK_NO_THROW(op.validate());
|
|
BOOST_REQUIRE(pidx.size() == 0);
|
|
}
|
|
{
|
|
custom_permission_create_operation op;
|
|
op.permission_name = "abc";
|
|
// No valid auth
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
const fc::ecc::private_key tpvk = fc::ecc::private_key::regenerate(fc::sha256::hash(std::string("test")));
|
|
const public_key_type tpbk(tpvk.get_public_key());
|
|
op.auth = authority(1, address(tpbk), 1);
|
|
// Address auth not supported
|
|
BOOST_CHECK_THROW(op.validate(), fc::exception);
|
|
BOOST_REQUIRE(pidx.size() == 0);
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(permission_create_success_test)
|
|
{
|
|
try
|
|
{
|
|
generate_blocks(HARDFORK_NFT_TIME);
|
|
generate_block();
|
|
set_expiration(db, trx);
|
|
ACTORS((alice)(bob)(charlie)(dave)(erin));
|
|
upgrade_to_lifetime_member(alice);
|
|
upgrade_to_lifetime_member(bob);
|
|
upgrade_to_lifetime_member(charlie);
|
|
upgrade_to_lifetime_member(dave);
|
|
upgrade_to_lifetime_member(erin);
|
|
transfer(committee_account, alice_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
transfer(committee_account, bob_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
transfer(committee_account, charlie_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
transfer(committee_account, dave_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
transfer(committee_account, erin_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
// Alice creates a permission abc
|
|
{
|
|
custom_permission_create_operation op;
|
|
op.permission_name = "abc";
|
|
op.owner_account = alice_id;
|
|
op.auth = authority(1, bob_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 1);
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).permission_name == "abc");
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).auth == authority(1, bob_id, 1));
|
|
}
|
|
// Alice tries to create a permission with same name but fails
|
|
{
|
|
custom_permission_create_operation op;
|
|
op.permission_name = "abc";
|
|
op.owner_account = alice_id;
|
|
op.auth = authority(1, bob_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 1);
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).permission_name == "abc");
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).auth == authority(1, bob_id, 1));
|
|
}
|
|
// Alice creates a permission def
|
|
{
|
|
custom_permission_create_operation op;
|
|
op.permission_name = "def";
|
|
op.owner_account = alice_id;
|
|
op.auth = authority(1, charlie_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
BOOST_REQUIRE(custom_permission_id_type(1)(db).permission_name == "def");
|
|
BOOST_REQUIRE(custom_permission_id_type(1)(db).auth == authority(1, charlie_id, 1));
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(permission_update_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(permission_create_success_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
GET_ACTOR(charlie);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
// Alice tries to update permission with same auth but fails
|
|
{
|
|
custom_permission_update_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.owner_account = alice_id;
|
|
op.new_auth = authority(1, bob_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
}
|
|
// Alice tries to update permission with no auth but fails
|
|
{
|
|
custom_permission_update_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
}
|
|
// Alice tries to update permission with charlie onwer_account but fails
|
|
{
|
|
custom_permission_update_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.owner_account = charlie_id;
|
|
op.new_auth = authority(1, charlie_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, charlie_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
}
|
|
// Alice updates permission abc with wrong permission_id
|
|
{
|
|
custom_permission_update_operation op;
|
|
op.permission_id = custom_permission_id_type(1);
|
|
op.owner_account = alice_id;
|
|
op.new_auth = authority(1, charlie_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
}
|
|
// Alice updates permission abc with new auth
|
|
{
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).permission_name == "abc");
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).auth == authority(1, bob_id, 1));
|
|
custom_permission_update_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.owner_account = alice_id;
|
|
op.new_auth = authority(1, charlie_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).permission_name == "abc");
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).auth == authority(1, charlie_id, 1));
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(account_authority_create_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(permission_create_success_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
generate_block();
|
|
// Alice creates a new account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = db.head_block_time();
|
|
op.valid_to = db.head_block_time() + fc::seconds(10 * db.block_interval());
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
generate_block();
|
|
}
|
|
// Alice creates the same account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = db.head_block_time();
|
|
op.valid_to = db.head_block_time() + fc::seconds(11 * db.block_interval());
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(account_authority_update_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(account_authority_create_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
generate_block();
|
|
// Alice update the account auth linking with permission abc
|
|
{
|
|
custom_account_authority_update_operation op;
|
|
op.auth_id = custom_account_authority_id_type(0);
|
|
fc::time_point_sec expiry = db.head_block_time() + fc::seconds(50 * db.block_interval());
|
|
op.new_valid_to = expiry;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
BOOST_REQUIRE(custom_account_authority_id_type(0)(db).valid_to == expiry);
|
|
BOOST_REQUIRE(custom_account_authority_id_type(1)(db).valid_to < expiry);
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(account_authority_delete_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(account_authority_create_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
generate_block();
|
|
// Alice deletes account auth linking with permission abc
|
|
{
|
|
custom_account_authority_delete_operation op;
|
|
op.auth_id = custom_account_authority_id_type(0);
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
}
|
|
// Alice deletes the account auth linking with permission abc
|
|
{
|
|
custom_account_authority_delete_operation op;
|
|
op.auth_id = custom_account_authority_id_type(1);
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
BOOST_REQUIRE(cidx.size() == 0);
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(permission_delete_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(account_authority_create_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).permission_name == "abc");
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).auth == authority(1, bob_id, 1));
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
// Alice tries to delete permission abc with wrong owner_account
|
|
{
|
|
custom_permission_delete_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.owner_account = bob_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
}
|
|
// Alice tries to delete permission abc with wrong permission_id
|
|
{
|
|
custom_permission_delete_operation op;
|
|
op.permission_id = custom_permission_id_type(2);
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
}
|
|
// Alice deletes permission abc
|
|
{
|
|
custom_permission_delete_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 1);
|
|
BOOST_REQUIRE(cidx.size() == 0);
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(authority_validity_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(permission_create_success_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
generate_block();
|
|
time_point_sec valid_from = db.head_block_time() + fc::seconds(20 * db.block_interval());
|
|
time_point_sec valid_to = db.head_block_time() + fc::seconds(30 * db.block_interval());
|
|
// Alice creates a new account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = valid_from;
|
|
op.valid_to = valid_to;
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
set_expiration(db, trx);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
generate_block();
|
|
}
|
|
// alice->bob transfer_operation op with active auth, success
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
set_expiration(db, trx);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// alice->bob fail as block time < valid_from
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
set_expiration(db, trx);
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
generate_blocks(valid_from);
|
|
// alice->bob fail as block time < valid_from
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
set_expiration(db, trx);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// time >= valid_from
|
|
// alice->bob transfer_operation op with bob active auth sig, success
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
set_expiration(db, trx);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
generate_blocks(valid_to);
|
|
// alice->bob fail as block time >= valid_to
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
set_expiration(db, trx);
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// alice->bob fail as block time > valid_to
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
set_expiration(db, trx);
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(transfer_op_custom_permission_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(account_authority_create_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
// alice->bob transfer_operation op with active auth, success
|
|
generate_block();
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// alice->bob transfer_operation op with the created custom account auth, success
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// alice->bob transfer_operation op with extra unnecessary sigs (both active and the custom auth), fails
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// bob->alice transfer_operation op with alice active auth sig, fails
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = bob_id;
|
|
op.to = alice_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// bob->alice transfer_operation op with bob active auth sig, success
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = bob_id;
|
|
op.to = alice_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Alice deletes permission abc
|
|
{
|
|
custom_permission_delete_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 1);
|
|
BOOST_REQUIRE(cidx.size() == 0);
|
|
generate_block();
|
|
}
|
|
// alice->bob transfer_operation op with active auth, success
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// alice->bob transfer_operation op with the deleted custom account auth, fail
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(transfer_op_auhtorized_auth_change_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(account_authority_create_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
// alice->bob transfer_operation op with the created custom account auth, success
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// bob changes his auth by changing his auth key
|
|
fc::ecc::private_key test_private_key = generate_private_key("test");
|
|
public_key_type test_public_key = public_key_type(test_private_key.get_public_key());
|
|
{
|
|
account_update_operation op;
|
|
op.account = bob.get_id();
|
|
op.active = authority(1, test_public_key, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// alice->bob transfer_operation op with bob first private key, fails
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// alice->bob transfer_operation op with bob first private key, fails
|
|
{
|
|
transfer_operation op;
|
|
op.amount.asset_id = asset_id_type(0);
|
|
op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
op.from = alice_id;
|
|
op.to = bob_id;
|
|
op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(op);
|
|
sign(trx, test_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(transfer_op_multi_ops_in_single_trx_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(account_authority_create_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
GET_ACTOR(charlie);
|
|
{
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
// bob->alice xfer op
|
|
transfer_operation bob_to_alice_xfer_op;
|
|
bob_to_alice_xfer_op.amount.asset_id = asset_id_type(0);
|
|
bob_to_alice_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
bob_to_alice_xfer_op.from = bob_id;
|
|
bob_to_alice_xfer_op.to = alice_id;
|
|
bob_to_alice_xfer_op.fee.asset_id = asset_id_type(0);
|
|
// Change bob's active auth to alice's auth
|
|
{
|
|
account_update_operation op;
|
|
op.account = bob_id;
|
|
op.active = authority(1, alice_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Success -> alice active key
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Fail -> custom account auth is bob active auth which is alice active key
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> bob's active key is alice's auth active key
|
|
trx.operations = {bob_to_alice_xfer_op};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> bob's owner key
|
|
trx.operations = {bob_to_alice_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> alice active key is auth for both alice and bob
|
|
trx.operations = {alice_to_bob_xfer_op, bob_to_alice_xfer_op};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Fail -> custom account auth is bob active auth which is alice active key
|
|
trx.operations = {alice_to_bob_xfer_op, bob_to_alice_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
// Fail -> alice active auth satisfies everything, bob owner key is not used
|
|
trx.operations = {alice_to_bob_xfer_op, bob_to_alice_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
// Fail -> extra unnecessary signature of charlie
|
|
trx.operations = {alice_to_bob_xfer_op, bob_to_alice_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
sign(trx, alice_private_key);
|
|
sign(trx, charlie_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(transfer_op_multi_sig_with_common_auth_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(account_authority_create_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
GET_ACTOR(charlie);
|
|
GET_ACTOR(dave);
|
|
{
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
// Change alice's active auth to multisig 2-of-3 bob, charlie, dave
|
|
{
|
|
account_update_operation op;
|
|
op.account = alice_id;
|
|
op.active = authority(2, bob_id, 1, charlie_id, 1, dave_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Success -> alice owner key
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> alice custom auth is bob
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> 2-of-3 auth satisfied
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, charlie_private_key);
|
|
sign(trx, dave_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Fail -> Custom auth(bob private key) itself satisfies
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
sign(trx, charlie_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
// Fail -> Custom auth(bob private key) itself satisfies
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
sign(trx, dave_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(transfer_op_multi_sig_with_out_common_auth_test)
|
|
{
|
|
try
|
|
{
|
|
generate_blocks(HARDFORK_NFT_TIME);
|
|
generate_block();
|
|
set_expiration(db, trx);
|
|
ACTORS((alice)(bob)(charlie)(dave));
|
|
upgrade_to_lifetime_member(alice);
|
|
upgrade_to_lifetime_member(bob);
|
|
upgrade_to_lifetime_member(charlie);
|
|
upgrade_to_lifetime_member(dave);
|
|
transfer(committee_account, alice_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
transfer(committee_account, bob_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
transfer(committee_account, charlie_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
transfer(committee_account, dave_id, asset(1000 * GRAPHENE_BLOCKCHAIN_PRECISION));
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
fc::ecc::private_key test_private_key = generate_private_key("test");
|
|
public_key_type test_public_key = public_key_type(test_private_key.get_public_key());
|
|
{
|
|
custom_permission_create_operation op;
|
|
op.permission_name = "abc";
|
|
op.owner_account = alice_id;
|
|
op.auth = authority(1, test_public_key, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(pidx.size() == 1);
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).permission_name == "abc");
|
|
BOOST_REQUIRE(custom_permission_id_type(0)(db).auth == authority(1, test_public_key, 1));
|
|
generate_block();
|
|
}
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = db.head_block_time();
|
|
op.valid_to = db.head_block_time() + fc::seconds(10 * db.block_interval());
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
generate_block();
|
|
}
|
|
// Multisig with common account auth
|
|
{
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
// Change alice's active auth to multisig 2-of-3 bob, charlie, dave
|
|
{
|
|
account_update_operation op;
|
|
op.account = alice_id;
|
|
op.active = authority(2, bob_id, 1, charlie_id, 1, dave_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Success -> alice owner key
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Fail -> auth not satisfied
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> custom key auth satisfied
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, test_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> 2-of-3 auth satisfied
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, charlie_private_key);
|
|
sign(trx, dave_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> 2-of-3 auth satisfied
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
sign(trx, charlie_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
// Success -> 2-of-3 auth satisfied
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
sign(trx, dave_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(proposal_op_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(account_authority_create_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
GET_ACTOR(charlie);
|
|
GET_ACTOR(dave);
|
|
generate_block();
|
|
const auto &prop_idx = db.get_index_type<proposal_index>().indices().get<by_id>();
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
|
|
// bob->alice xfer op
|
|
transfer_operation bob_to_alice_xfer_op;
|
|
bob_to_alice_xfer_op.amount.asset_id = asset_id_type(0);
|
|
bob_to_alice_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
bob_to_alice_xfer_op.from = bob_id;
|
|
bob_to_alice_xfer_op.to = alice_id;
|
|
bob_to_alice_xfer_op.fee.asset_id = asset_id_type(0);
|
|
{
|
|
set_expiration(db, trx);
|
|
proposal_create_operation prop;
|
|
prop.fee_paying_account = alice_id;
|
|
prop.proposed_ops = {op_wrapper(alice_to_bob_xfer_op), op_wrapper(bob_to_alice_xfer_op)};
|
|
prop.expiration_time = db.head_block_time() + 21600;
|
|
trx.operations = {prop};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
proposal_update_operation approve_prop;
|
|
approve_prop.proposal = proposal_id_type(0);
|
|
approve_prop.fee_paying_account = bob_id;
|
|
approve_prop.active_approvals_to_add = {bob_id};
|
|
trx.operations = {approve_prop};
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
BOOST_REQUIRE(prop_idx.find(proposal_id_type(0)) == prop_idx.end());
|
|
}
|
|
{
|
|
set_expiration(db, trx);
|
|
custom_account_authority_create_operation authorize_xfer_op;
|
|
authorize_xfer_op.permission_id = custom_permission_id_type(0);
|
|
authorize_xfer_op.valid_from = db.head_block_time();
|
|
authorize_xfer_op.valid_to = db.head_block_time() + fc::seconds(10 * db.block_interval());
|
|
authorize_xfer_op.operation_type = operation::tag<proposal_update_operation>::value;
|
|
authorize_xfer_op.owner_account = alice_id;
|
|
trx.operations = {authorize_xfer_op};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
proposal_create_operation prop;
|
|
prop.fee_paying_account = alice_id;
|
|
prop.proposed_ops = {op_wrapper(alice_to_bob_xfer_op), op_wrapper(bob_to_alice_xfer_op)};
|
|
prop.expiration_time = db.head_block_time() + 21600;
|
|
trx.operations = {prop};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
proposal_update_operation approve_prop;
|
|
approve_prop.proposal = proposal_id_type(1);
|
|
approve_prop.fee_paying_account = bob_id;
|
|
approve_prop.active_approvals_to_add = {bob_id};
|
|
trx.operations = {approve_prop};
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
approve_prop.proposal = proposal_id_type(1);
|
|
approve_prop.fee_paying_account = bob_id;
|
|
approve_prop.active_approvals_to_add = {alice_id, bob_id};
|
|
trx.operations = {approve_prop};
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
BOOST_REQUIRE(prop_idx.find(proposal_id_type(1)) == prop_idx.end());
|
|
}
|
|
{
|
|
set_expiration(db, trx);
|
|
custom_account_authority_create_operation authorize_xfer_op;
|
|
authorize_xfer_op.permission_id = custom_permission_id_type(1);
|
|
authorize_xfer_op.valid_from = db.head_block_time();
|
|
authorize_xfer_op.valid_to = db.head_block_time() + fc::seconds(10 * db.block_interval());
|
|
authorize_xfer_op.operation_type = operation::tag<transfer_operation>::value;
|
|
authorize_xfer_op.owner_account = alice_id;
|
|
|
|
proposal_create_operation prop;
|
|
prop.fee_paying_account = alice_id;
|
|
prop.proposed_ops = {op_wrapper(authorize_xfer_op)};
|
|
prop.expiration_time = db.head_block_time() + 21600;
|
|
trx.operations = {prop};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
proposal_update_operation approve_prop;
|
|
approve_prop.proposal = proposal_id_type(2);
|
|
approve_prop.fee_paying_account = alice_id;
|
|
approve_prop.active_approvals_to_add = {alice_id};
|
|
trx.operations = {approve_prop};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
BOOST_REQUIRE(prop_idx.find(proposal_id_type(2)) == prop_idx.end());
|
|
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, charlie_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
trx.operations = {bob_to_alice_xfer_op};
|
|
sign(trx, alice_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
|
|
trx.operations = {bob_to_alice_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(account_authority_delete_after_expiry_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(permission_create_success_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
time_point_sec valid_from = db.head_block_time() + fc::seconds(20 * db.block_interval());
|
|
time_point_sec valid_to = db.head_block_time() + fc::seconds(30 * db.block_interval());
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
generate_block();
|
|
// Alice creates a new account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = valid_from;
|
|
op.valid_to = valid_to;
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
generate_block();
|
|
}
|
|
// Alice creates a new account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = valid_from;
|
|
op.valid_to = db.get_dynamic_global_properties().next_maintenance_time;
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
generate_block();
|
|
}
|
|
generate_blocks(valid_to);
|
|
generate_block();
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
generate_blocks(db.get_dynamic_global_properties().next_maintenance_time);
|
|
generate_block();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
generate_blocks(db.get_dynamic_global_properties().next_maintenance_time);
|
|
generate_block();
|
|
BOOST_REQUIRE(cidx.size() == 0);
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(account_owner_authority_fail_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(permission_create_success_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
time_point_sec valid_from = db.head_block_time();
|
|
time_point_sec valid_to = db.head_block_time() + fc::seconds(30 * db.block_interval());
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
generate_block();
|
|
// Alice creates a new account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = valid_from;
|
|
op.valid_to = valid_to;
|
|
op.operation_type = operation::tag<account_update_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
generate_block();
|
|
}
|
|
// Alice creates a new account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = valid_from;
|
|
op.valid_to = valid_to;
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 2);
|
|
generate_block();
|
|
}
|
|
{
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
trx.operations.push_back(alice_to_bob_xfer_op);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
{
|
|
account_update_operation op;
|
|
op.account = alice_id;
|
|
op.owner = authority(1, bob_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
{
|
|
account_update_operation op;
|
|
op.account = alice_id;
|
|
op.active = authority(1, bob_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(multisig_combined_op_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(permission_create_success_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
GET_ACTOR(charlie);
|
|
GET_ACTOR(dave);
|
|
GET_ACTOR(erin);
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
time_point_sec valid_from = db.head_block_time();
|
|
time_point_sec valid_to = db.head_block_time() + fc::seconds(30 * db.block_interval());
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
generate_block();
|
|
// Alice creates a new account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = valid_from;
|
|
op.valid_to = valid_to;
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
generate_block();
|
|
}
|
|
{
|
|
account_update_operation op;
|
|
op.account = alice_id;
|
|
op.active = authority(2, bob_id, 1, charlie_id, 1, dave_id, 1);
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
{
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
// alice account update
|
|
account_update_operation auop;
|
|
auop.account = alice_id;
|
|
auop.active = authority(1, erin_id, 1);
|
|
trx.operations = {alice_to_bob_xfer_op, auop};
|
|
sign(trx, bob_private_key);
|
|
sign(trx, charlie_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
{
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, erin_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
{
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(db_api_test)
|
|
{
|
|
try
|
|
{
|
|
INVOKE(permission_create_success_test);
|
|
GET_ACTOR(alice);
|
|
GET_ACTOR(bob);
|
|
GET_ACTOR(charlie);
|
|
GET_ACTOR(dave);
|
|
GET_ACTOR(erin);
|
|
auto alice_public_key = alice_private_key.get_public_key();
|
|
auto bob_public_key = bob_private_key.get_public_key();
|
|
auto charlie_public_key = charlie_private_key.get_public_key();
|
|
auto dave_public_key = dave_private_key.get_public_key();
|
|
auto erin_public_key = erin_private_key.get_public_key();
|
|
const auto &pidx = db.get_index_type<custom_permission_index>().indices().get<by_id>();
|
|
const auto &cidx = db.get_index_type<custom_account_authority_index>().indices().get<by_id>();
|
|
time_point_sec valid_from = db.head_block_time();
|
|
time_point_sec valid_to = db.head_block_time() + fc::seconds(30 * db.block_interval());
|
|
BOOST_REQUIRE(pidx.size() == 2);
|
|
generate_block();
|
|
// alice->bob xfer op
|
|
transfer_operation alice_to_bob_xfer_op;
|
|
alice_to_bob_xfer_op.amount.asset_id = asset_id_type(0);
|
|
alice_to_bob_xfer_op.amount.amount = 100 * GRAPHENE_BLOCKCHAIN_PRECISION;
|
|
alice_to_bob_xfer_op.from = alice_id;
|
|
alice_to_bob_xfer_op.to = bob_id;
|
|
alice_to_bob_xfer_op.fee.asset_id = asset_id_type(0);
|
|
// alice account update
|
|
account_update_operation auop1;
|
|
auop1.account = alice_id;
|
|
auop1.active = authority(2, bob_id, 1, charlie_id, 1, dave_id, 1);
|
|
// alice account update
|
|
account_update_operation auop2;
|
|
auop2.account = alice_id;
|
|
auop2.active = authority(1, erin_id, 1);
|
|
// alice owner update
|
|
account_update_operation auop3;
|
|
auop3.account = alice_id;
|
|
auop3.owner = authority(1, bob_id, 1);
|
|
// get_required_signatures Auth Lambdas
|
|
set<public_key_type> result;
|
|
auto get_active_rs = [&](account_id_type aid) -> const authority * {
|
|
return &(aid(db).active);
|
|
};
|
|
|
|
auto get_owner_rs = [&](account_id_type aid) -> const authority * {
|
|
return &(aid(db).owner);
|
|
};
|
|
|
|
auto get_custom = [&](account_id_type id, const operation &op) -> vector<authority> {
|
|
return db.get_account_custom_authorities(id, op);
|
|
};
|
|
|
|
// get_potential_signatures Auth lambdas
|
|
auto get_active_ps = [&](account_id_type id) -> const authority * {
|
|
const auto &auth = id(db).active;
|
|
for (const auto &k : auth.get_keys())
|
|
result.insert(k);
|
|
return &auth;
|
|
};
|
|
|
|
auto get_owner_ps = [&](account_id_type id) -> const authority * {
|
|
const auto &auth = id(db).owner;
|
|
for (const auto &k : auth.get_keys())
|
|
result.insert(k);
|
|
return &auth;
|
|
};
|
|
// Transfer before custom account auth creation
|
|
{
|
|
result.clear();
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(),
|
|
get_active_ps,
|
|
get_owner_ps,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
set<public_key_type> exp_result_ps{alice_public_key};
|
|
BOOST_REQUIRE(result == exp_result_ps);
|
|
set<public_key_type> exp_result_rs{alice_public_key};
|
|
set<public_key_type> result_rs = trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(exp_result_ps.begin(), exp_result_ps.end()),
|
|
get_active_rs,
|
|
get_owner_rs,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
BOOST_REQUIRE(result_rs == exp_result_rs);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Alice creates a new account auth linking with permission abc
|
|
{
|
|
custom_account_authority_create_operation op;
|
|
op.permission_id = custom_permission_id_type(0);
|
|
op.valid_from = valid_from;
|
|
op.valid_to = valid_to;
|
|
op.operation_type = operation::tag<transfer_operation>::value;
|
|
op.owner_account = alice_id;
|
|
trx.operations.push_back(op);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
BOOST_REQUIRE(cidx.size() == 1);
|
|
generate_block();
|
|
}
|
|
// Transfer after custom account auth creation
|
|
{
|
|
result.clear();
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(),
|
|
get_active_ps,
|
|
get_owner_ps,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
set<public_key_type> exp_result_ps{alice_public_key, bob_public_key};
|
|
BOOST_REQUIRE(result == exp_result_ps);
|
|
set<public_key_type> exp_result_rs{bob_public_key};
|
|
set<public_key_type> result_rs = trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(exp_result_ps.begin(), exp_result_ps.end()),
|
|
get_active_rs,
|
|
get_owner_rs,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
BOOST_REQUIRE(result_rs == exp_result_rs);
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Alice account update after custom account auth creation
|
|
{
|
|
result.clear();
|
|
trx.operations = {auop1};
|
|
trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(),
|
|
get_active_ps,
|
|
get_owner_ps,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
set<public_key_type> exp_result_ps{alice_public_key};
|
|
BOOST_REQUIRE(result == exp_result_ps);
|
|
set<public_key_type> exp_result_rs{alice_public_key};
|
|
set<public_key_type> result_rs = trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(exp_result_ps.begin(), exp_result_ps.end()),
|
|
get_active_rs,
|
|
get_owner_rs,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
BOOST_REQUIRE(result_rs == exp_result_rs);
|
|
sign(trx, alice_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Alice account update and transfer after custom account auth creation
|
|
{
|
|
result.clear();
|
|
trx.operations = {alice_to_bob_xfer_op, auop2};
|
|
trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(),
|
|
get_active_ps,
|
|
get_owner_ps,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
set<public_key_type> exp_result_ps{bob_public_key, charlie_public_key, dave_public_key};
|
|
BOOST_REQUIRE(result == exp_result_ps);
|
|
set<public_key_type> exp_result_rs{bob_public_key, charlie_public_key};
|
|
set<public_key_type> result_rs = trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(exp_result_ps.begin(), exp_result_ps.end()),
|
|
get_active_rs,
|
|
get_owner_rs,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
BOOST_REQUIRE(result_rs == exp_result_rs);
|
|
sign(trx, bob_private_key);
|
|
sign(trx, charlie_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Transfer after alice account update again
|
|
{
|
|
result.clear();
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(),
|
|
get_active_ps,
|
|
get_owner_ps,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
set<public_key_type> exp_result_ps{erin_public_key, bob_public_key};
|
|
BOOST_REQUIRE(result == exp_result_ps);
|
|
set<public_key_type> exp_result_rs{bob_public_key};
|
|
set<public_key_type> result_rs = trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(exp_result_ps.begin(), exp_result_ps.end()),
|
|
get_active_rs,
|
|
get_owner_rs,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
BOOST_REQUIRE(result_rs == exp_result_rs);
|
|
sign(trx, erin_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Alice owner auth update
|
|
{
|
|
result.clear();
|
|
trx.operations = {auop3};
|
|
trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(),
|
|
get_active_ps,
|
|
get_owner_ps,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
set<public_key_type> exp_result_ps{alice_public_key, erin_public_key};
|
|
BOOST_REQUIRE(result == exp_result_ps);
|
|
set<public_key_type> exp_result_rs{alice_public_key, erin_public_key};
|
|
set<public_key_type> result_rs = trx.get_required_signatures(
|
|
db.get_chain_id(),
|
|
flat_set<public_key_type>(exp_result_ps.begin(), exp_result_ps.end()),
|
|
get_active_rs,
|
|
get_owner_rs,
|
|
get_custom,
|
|
db.get_global_properties().parameters.max_authority_depth);
|
|
BOOST_REQUIRE(result_rs == exp_result_rs);
|
|
sign(trx, bob_private_key);
|
|
BOOST_CHECK_THROW(PUSH_TX(db, trx), fc::exception);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
// Transfer with custom account auth
|
|
{
|
|
trx.operations = {alice_to_bob_xfer_op};
|
|
sign(trx, bob_private_key);
|
|
PUSH_TX(db, trx);
|
|
trx.clear();
|
|
generate_block();
|
|
}
|
|
}
|
|
FC_LOG_AND_RETHROW()
|
|
}
|
|
BOOST_AUTO_TEST_SUITE_END()
|