214 lines
		
	
	
		
			7.2 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
			
		
		
	
	
			214 lines
		
	
	
		
			7.2 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
| use common::prepare_test_env::{
 | |
|     prepare_test_db, run_service_for_stream, run_service_in_background,
 | |
| };
 | |
| use common::test_utils::Key;
 | |
| use common::vm_cli_utils::{create_new_vm, report_node};
 | |
| use common::vm_daemon_utils::{mock_vm_daemon, register_vm_node};
 | |
| use detee_shared::common_proto::{Empty, Pubkey};
 | |
| use detee_shared::general_proto::brain_general_cli_client::BrainGeneralCliClient;
 | |
| use detee_shared::general_proto::AirdropReq;
 | |
| use detee_shared::vm_proto::brain_vm_daemon_client::BrainVmDaemonClient;
 | |
| use futures::StreamExt;
 | |
| use itertools::Itertools;
 | |
| use std::vec;
 | |
| use surreal_brain::constants::VM_NODE;
 | |
| use surreal_brain::db::vm::VmNodeWithReports;
 | |
| 
 | |
| mod common;
 | |
| 
 | |
| #[tokio::test]
 | |
| async fn test_general_balance() {
 | |
|     // env_logger::builder().filter_level(log::LevelFilter::Trace).init();
 | |
|     prepare_test_db().await.unwrap();
 | |
| 
 | |
|     let addr = run_service_in_background().await.unwrap();
 | |
|     let mut client = BrainGeneralCliClient::connect(format!("http://{}", addr)).await.unwrap();
 | |
| 
 | |
|     let key = Key::new();
 | |
|     let pubkey = key.pubkey.clone();
 | |
|     let req_data = Pubkey { pubkey };
 | |
| 
 | |
|     let req = key.sign_request(req_data).unwrap();
 | |
| 
 | |
|     let acc_bal = client.get_balance(req).await.unwrap().into_inner();
 | |
| 
 | |
|     assert_eq!(acc_bal.balance, 0);
 | |
|     assert_eq!(acc_bal.tmp_locked, 0);
 | |
| }
 | |
| 
 | |
| #[tokio::test]
 | |
| async fn test_general_airdrop() {
 | |
|     // env_logger::builder().filter_level(log::LevelFilter::Trace).init();
 | |
|     prepare_test_db().await.unwrap();
 | |
| 
 | |
|     const AIRDROP_MULTIPLE: u64 = 1_000_000_000;
 | |
|     let airdrop_amount = 10;
 | |
| 
 | |
|     let addr = run_service_in_background().await.unwrap();
 | |
|     let mut client = BrainGeneralCliClient::connect(format!("http://{}", addr)).await.unwrap();
 | |
| 
 | |
|     let admin_keys = vec![Key::new(), Key::new(), Key::new()];
 | |
|     let admin_pub_keys = admin_keys.iter().map(|k| k.pubkey.clone()).join(", ");
 | |
|     std::env::set_var("ADMIN_PUB_KEYS", admin_pub_keys);
 | |
| 
 | |
|     let user_01_key = Key::new();
 | |
|     let user_01_pubkey = user_01_key.pubkey.clone();
 | |
| 
 | |
|     let airdrop_req = AirdropReq { pubkey: user_01_pubkey.clone(), tokens: airdrop_amount };
 | |
| 
 | |
|     // user airdroping himself
 | |
|     let err =
 | |
|         client.airdrop(user_01_key.sign_request(airdrop_req.clone()).unwrap()).await.err().unwrap();
 | |
|     assert_eq!(err.message(), "This operation is reserved to admin accounts");
 | |
| 
 | |
|     // other user airdroping
 | |
|     let err =
 | |
|         client.airdrop(Key::new().sign_request(airdrop_req.clone()).unwrap()).await.err().unwrap();
 | |
|     assert_eq!(err.message(), "This operation is reserved to admin accounts");
 | |
| 
 | |
|     let _ = client.airdrop(admin_keys[0].sign_request(airdrop_req.clone()).unwrap()).await.unwrap();
 | |
| 
 | |
|     let bal_req_data = Pubkey { pubkey: user_01_pubkey };
 | |
|     let bal_req = user_01_key.sign_request(bal_req_data.clone()).unwrap();
 | |
|     let acc_bal_user_01 = client.get_balance(bal_req).await.unwrap().into_inner();
 | |
| 
 | |
|     assert_eq!(acc_bal_user_01.balance, airdrop_amount * AIRDROP_MULTIPLE);
 | |
|     assert_eq!(acc_bal_user_01.tmp_locked, 0);
 | |
| 
 | |
|     // second airdrop from same admin
 | |
|     let _ = client.airdrop(admin_keys[0].sign_request(airdrop_req.clone()).unwrap()).await.unwrap();
 | |
| 
 | |
|     let acc_bal_user_01 = client
 | |
|         .get_balance(user_01_key.sign_request(bal_req_data.clone()).unwrap())
 | |
|         .await
 | |
|         .unwrap()
 | |
|         .into_inner();
 | |
| 
 | |
|     assert_eq!(acc_bal_user_01.balance, 2 * airdrop_amount * AIRDROP_MULTIPLE);
 | |
| 
 | |
|     // third airdrop from another admin
 | |
|     let _ = client.airdrop(admin_keys[1].sign_request(airdrop_req.clone()).unwrap()).await.unwrap();
 | |
| 
 | |
|     let acc_bal_user_01 = client
 | |
|         .get_balance(user_01_key.sign_request(bal_req_data).unwrap())
 | |
|         .await
 | |
|         .unwrap()
 | |
|         .into_inner();
 | |
| 
 | |
|     assert_eq!(acc_bal_user_01.balance, 3 * airdrop_amount * AIRDROP_MULTIPLE);
 | |
| 
 | |
|     // self airdrop
 | |
|     let airdrop_req = AirdropReq { pubkey: admin_keys[2].pubkey.clone(), tokens: airdrop_amount };
 | |
| 
 | |
|     let _ = client.airdrop(admin_keys[2].sign_request(airdrop_req.clone()).unwrap()).await.unwrap();
 | |
| 
 | |
|     let bal_req_data = Pubkey { pubkey: admin_keys[2].pubkey.clone() };
 | |
|     let acc_bal_admin_3 = client
 | |
|         .get_balance(admin_keys[2].sign_request(bal_req_data.clone()).unwrap())
 | |
|         .await
 | |
|         .unwrap()
 | |
|         .into_inner();
 | |
| 
 | |
|     assert_eq!(acc_bal_admin_3.balance, airdrop_amount * AIRDROP_MULTIPLE);
 | |
| }
 | |
| 
 | |
| #[tokio::test]
 | |
| async fn test_report_node() {
 | |
|     let db = prepare_test_db().await.unwrap();
 | |
| 
 | |
|     let brain_channel = run_service_for_stream().await.unwrap();
 | |
|     let daemon_key = mock_vm_daemon(&brain_channel).await.unwrap();
 | |
| 
 | |
|     let key = Key::new();
 | |
| 
 | |
|     let report_error =
 | |
|         report_node(&key, &brain_channel, &daemon_key, "uuid", "reason").await.err().unwrap();
 | |
| 
 | |
|     log::info!("Report error: {:?}", report_error);
 | |
|     assert!(report_error.to_string().contains("No contract found by this ID."));
 | |
| 
 | |
|     let active_vm_id = create_new_vm(&db, &key, &daemon_key, &brain_channel).await.unwrap();
 | |
| 
 | |
|     let reason = String::from("something went wrong on vm");
 | |
| 
 | |
|     let _ = report_node(&key, &brain_channel, &daemon_key, &active_vm_id, &reason)
 | |
|         .await
 | |
|         .unwrap()
 | |
|         .into_inner();
 | |
| 
 | |
|     let vm_nodes: Vec<VmNodeWithReports> = db
 | |
|         .query(format!(
 | |
|             "SELECT *, <-report.* as reports FROM {VM_NODE} WHERE id = {VM_NODE}:{daemon_key};"
 | |
|         ))
 | |
|         .await
 | |
|         .unwrap()
 | |
|         .take(0)
 | |
|         .unwrap();
 | |
| 
 | |
|     let vm_node_with_report = &vm_nodes[0];
 | |
| 
 | |
|     assert!(vm_node_with_report.reports[0].reason == reason);
 | |
| }
 | |
| 
 | |
| #[tokio::test]
 | |
| // TODO: register some operators before testing this
 | |
| async fn test_list_operators() {
 | |
|     prepare_test_db().await.unwrap();
 | |
| 
 | |
|     let channel = run_service_for_stream().await.unwrap();
 | |
| 
 | |
|     let mut client = BrainGeneralCliClient::new(channel);
 | |
| 
 | |
|     let key = Key::new();
 | |
| 
 | |
|     let mut grpc_stream =
 | |
|         client.list_operators(key.sign_request(Empty {}).unwrap()).await.unwrap().into_inner();
 | |
| 
 | |
|     let mut operators = Vec::new();
 | |
|     while let Some(stream_update) = grpc_stream.next().await {
 | |
|         match stream_update {
 | |
|             Ok(op) => {
 | |
|                 operators.push(op);
 | |
|             }
 | |
|             Err(e) => {
 | |
|                 panic!("Received error instead of operators: {e:?}");
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     assert!(!operators.is_empty())
 | |
| }
 | |
| 
 | |
| #[tokio::test]
 | |
| async fn test_inspect_operator() {
 | |
|     prepare_test_db().await.unwrap();
 | |
| 
 | |
|     let brain_channel = run_service_for_stream().await.unwrap();
 | |
|     let mut cli_client = BrainGeneralCliClient::new(brain_channel.clone());
 | |
|     let mut daemon_client = BrainVmDaemonClient::new(brain_channel.clone());
 | |
|     let key = Key::new();
 | |
|     let daemon_key = Key::new();
 | |
|     let operator_key = Key::new();
 | |
| 
 | |
|     let err = cli_client
 | |
|         .inspect_operator(key.sign_request(Pubkey { pubkey: operator_key.pubkey.clone() }).unwrap())
 | |
|         .await
 | |
|         .err()
 | |
|         .unwrap();
 | |
| 
 | |
|     assert_eq!(err.message(), "The wallet you specified is not an operator");
 | |
| 
 | |
|     // TODO: test with app node also
 | |
|     register_vm_node(&mut daemon_client, &daemon_key, &operator_key.pubkey).await.unwrap();
 | |
| 
 | |
|     let inspect_response = cli_client
 | |
|         .inspect_operator(key.sign_request(Pubkey { pubkey: operator_key.pubkey.clone() }).unwrap())
 | |
|         .await
 | |
|         .unwrap()
 | |
|         .into_inner();
 | |
| 
 | |
|     assert!(inspect_response.app_nodes.is_empty());
 | |
|     assert!(!inspect_response.vm_nodes.is_empty());
 | |
|     assert_eq!(&inspect_response.vm_nodes[0].operator, &operator_key.pubkey);
 | |
| }
 |