calculating refund inside transaction query db function to calculate price per minute for app binded all kick contract query to prevent sql injection proper logging for kick contract fix table schema app_node typo and default time on deleted_app removed wrapper contract struct removed migrating timer.sql fixed some clippy warnings
247 lines
8.2 KiB
Rust
247 lines
8.2 KiB
Rust
use common::prepare_test_env::{
|
|
prepare_test_db, run_service_for_stream, run_service_in_background,
|
|
};
|
|
use common::test_utils::{admin_keys, Key};
|
|
use common::vm_cli_utils::{airdrop, create_new_vm, report_node};
|
|
use common::vm_daemon_utils::{mock_vm_daemon, register_vm_node};
|
|
use detee_shared::common_proto::{Empty, Pubkey};
|
|
use detee_shared::general_proto::brain_general_cli_client::BrainGeneralCliClient;
|
|
use detee_shared::general_proto::AirdropReq;
|
|
use detee_shared::vm_proto::brain_vm_daemon_client::BrainVmDaemonClient;
|
|
use futures::StreamExt;
|
|
use surreal_brain::constants::{TOKEN_DECIMAL, VM_NODE};
|
|
use surreal_brain::db::vm::VmNodeWithReports;
|
|
|
|
mod common;
|
|
|
|
#[tokio::test]
|
|
async fn test_general_balance() {
|
|
// env_logger::builder().filter_level(log::LevelFilter::Trace).init();
|
|
prepare_test_db().await.unwrap();
|
|
|
|
let addr = run_service_in_background().await.unwrap();
|
|
let mut client = BrainGeneralCliClient::connect(format!("http://{}", addr)).await.unwrap();
|
|
|
|
let key = Key::new();
|
|
let pubkey = key.pubkey.clone();
|
|
let req_data = Pubkey { pubkey };
|
|
|
|
let req = key.sign_request(req_data).unwrap();
|
|
|
|
let acc_bal = client.get_balance(req).await.unwrap().into_inner();
|
|
|
|
assert_eq!(acc_bal.balance, 0);
|
|
assert_eq!(acc_bal.tmp_locked, 0);
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn test_general_airdrop() {
|
|
// env_logger::builder().filter_level(log::LevelFilter::Trace).init();
|
|
prepare_test_db().await.unwrap();
|
|
|
|
let airdrop_amount = 10;
|
|
|
|
let addr = run_service_in_background().await.unwrap();
|
|
let mut client = BrainGeneralCliClient::connect(format!("http://{}", addr)).await.unwrap();
|
|
|
|
let admin_keys = admin_keys();
|
|
|
|
let user_01_key = Key::new();
|
|
let user_01_pubkey = user_01_key.pubkey.clone();
|
|
|
|
let airdrop_req = AirdropReq { pubkey: user_01_pubkey.clone(), tokens: airdrop_amount };
|
|
|
|
// user airdroping himself
|
|
let err =
|
|
client.airdrop(user_01_key.sign_request(airdrop_req.clone()).unwrap()).await.err().unwrap();
|
|
assert_eq!(err.message(), "This operation is reserved to admin accounts");
|
|
|
|
// other user airdroping
|
|
let err =
|
|
client.airdrop(Key::new().sign_request(airdrop_req.clone()).unwrap()).await.err().unwrap();
|
|
assert_eq!(err.message(), "This operation is reserved to admin accounts");
|
|
|
|
let _ = client.airdrop(admin_keys[0].sign_request(airdrop_req.clone()).unwrap()).await.unwrap();
|
|
|
|
let bal_req_data = Pubkey { pubkey: user_01_pubkey };
|
|
let bal_req = user_01_key.sign_request(bal_req_data.clone()).unwrap();
|
|
let acc_bal_user_01 = client.get_balance(bal_req).await.unwrap().into_inner();
|
|
|
|
assert_eq!(acc_bal_user_01.balance, airdrop_amount * TOKEN_DECIMAL);
|
|
assert_eq!(acc_bal_user_01.tmp_locked, 0);
|
|
|
|
// second airdrop from same admin
|
|
let _ = client.airdrop(admin_keys[0].sign_request(airdrop_req.clone()).unwrap()).await.unwrap();
|
|
|
|
let acc_bal_user_01 = client
|
|
.get_balance(user_01_key.sign_request(bal_req_data.clone()).unwrap())
|
|
.await
|
|
.unwrap()
|
|
.into_inner();
|
|
|
|
assert_eq!(acc_bal_user_01.balance, 2 * airdrop_amount * TOKEN_DECIMAL);
|
|
|
|
// third airdrop from another admin
|
|
let _ = client.airdrop(admin_keys[1].sign_request(airdrop_req.clone()).unwrap()).await.unwrap();
|
|
|
|
let acc_bal_user_01 = client
|
|
.get_balance(user_01_key.sign_request(bal_req_data).unwrap())
|
|
.await
|
|
.unwrap()
|
|
.into_inner();
|
|
|
|
assert_eq!(acc_bal_user_01.balance, 3 * airdrop_amount * TOKEN_DECIMAL);
|
|
|
|
// self airdrop
|
|
let airdrop_req = AirdropReq { pubkey: admin_keys[2].pubkey.clone(), tokens: airdrop_amount };
|
|
|
|
let _ = client.airdrop(admin_keys[2].sign_request(airdrop_req.clone()).unwrap()).await.unwrap();
|
|
|
|
let bal_req_data = Pubkey { pubkey: admin_keys[2].pubkey.clone() };
|
|
let acc_bal_admin_3 = client
|
|
.get_balance(admin_keys[2].sign_request(bal_req_data.clone()).unwrap())
|
|
.await
|
|
.unwrap()
|
|
.into_inner();
|
|
|
|
assert_eq!(acc_bal_admin_3.balance, airdrop_amount * TOKEN_DECIMAL);
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn test_report_node() {
|
|
let db = prepare_test_db().await.unwrap();
|
|
|
|
let brain_channel = run_service_for_stream().await.unwrap();
|
|
let daemon_key = mock_vm_daemon(&brain_channel).await.unwrap();
|
|
|
|
let key = Key::new();
|
|
|
|
let report_error =
|
|
report_node(&key, &brain_channel, &daemon_key, "uuid", "reason").await.err().unwrap();
|
|
|
|
log::info!("Report error: {:?}", report_error);
|
|
assert!(report_error.to_string().contains("No contract found by this ID."));
|
|
|
|
airdrop(&brain_channel, &key.pubkey, 10).await.unwrap();
|
|
|
|
let active_vm_id = create_new_vm(&db, &key, &daemon_key, &brain_channel).await.unwrap();
|
|
|
|
let reason = String::from("something went wrong on vm");
|
|
|
|
let _ = report_node(&key, &brain_channel, &daemon_key, &active_vm_id, &reason)
|
|
.await
|
|
.unwrap()
|
|
.into_inner();
|
|
|
|
let vm_nodes: Vec<VmNodeWithReports> = db
|
|
.query(format!(
|
|
"SELECT *, <-report.* as reports FROM {VM_NODE} WHERE id = {VM_NODE}:{daemon_key};"
|
|
))
|
|
.await
|
|
.unwrap()
|
|
.take(0)
|
|
.unwrap();
|
|
|
|
let vm_node_with_report = &vm_nodes[0];
|
|
|
|
assert!(vm_node_with_report.reports[0].reason == reason);
|
|
}
|
|
|
|
#[tokio::test]
|
|
// TODO: register some operators before testing this
|
|
async fn test_list_operators() {
|
|
prepare_test_db().await.unwrap();
|
|
|
|
let channel = run_service_for_stream().await.unwrap();
|
|
|
|
let mut client = BrainGeneralCliClient::new(channel);
|
|
|
|
let key = Key::new();
|
|
|
|
let mut grpc_stream =
|
|
client.list_operators(key.sign_request(Empty {}).unwrap()).await.unwrap().into_inner();
|
|
|
|
let mut operators = Vec::new();
|
|
while let Some(stream_update) = grpc_stream.next().await {
|
|
match stream_update {
|
|
Ok(op) => {
|
|
operators.push(op);
|
|
}
|
|
Err(e) => {
|
|
panic!("Received error instead of operators: {e:?}");
|
|
}
|
|
}
|
|
}
|
|
|
|
assert!(!operators.is_empty())
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn test_inspect_operator() {
|
|
prepare_test_db().await.unwrap();
|
|
|
|
let brain_channel = run_service_for_stream().await.unwrap();
|
|
let mut cli_client = BrainGeneralCliClient::new(brain_channel.clone());
|
|
let mut daemon_client = BrainVmDaemonClient::new(brain_channel.clone());
|
|
let key = Key::new();
|
|
let daemon_key = Key::new();
|
|
let operator_key = Key::new();
|
|
|
|
let err = cli_client
|
|
.inspect_operator(key.sign_request(Pubkey { pubkey: operator_key.pubkey.clone() }).unwrap())
|
|
.await
|
|
.err()
|
|
.unwrap();
|
|
|
|
assert_eq!(err.message(), "The wallet you specified is not an operator");
|
|
|
|
// TODO: test with app node also
|
|
register_vm_node(&mut daemon_client, &daemon_key, &operator_key.pubkey).await.unwrap();
|
|
|
|
let inspect_response = cli_client
|
|
.inspect_operator(key.sign_request(Pubkey { pubkey: operator_key.pubkey.clone() }).unwrap())
|
|
.await
|
|
.unwrap()
|
|
.into_inner();
|
|
|
|
assert!(inspect_response.app_nodes.is_empty());
|
|
assert!(!inspect_response.vm_nodes.is_empty());
|
|
assert_eq!(&inspect_response.vm_nodes[0].operator, &operator_key.pubkey);
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn test_kick_contract() {
|
|
// TODO: implement seed data to test
|
|
// possibilities
|
|
// 1. vm contract
|
|
// 2. app contract
|
|
// 3. non existent contract
|
|
// 4. other operator's contract
|
|
// 5. contract collected more than a week
|
|
// 6. refund amount calculation
|
|
// 7. refund of multiple contract kick in a day for same user
|
|
|
|
env_logger::builder()
|
|
.filter_level(log::LevelFilter::Info)
|
|
.filter_module("tungstenite", log::LevelFilter::Debug)
|
|
.filter_module("tokio_tungstenite", log::LevelFilter::Debug)
|
|
.init();
|
|
|
|
let db_conn = prepare_test_db().await.unwrap();
|
|
let contract_uuid = "e3d01f252b2a410b80e312f44e474334";
|
|
let operator_wallet = "7V3rEuh6j8VuwMVB5PyGqWKLmjJ4fYSv6WtrTL51NZTB";
|
|
let reason = "'; THROW 'Injected error'; --"; // sql injection query
|
|
|
|
let kick_response =
|
|
surreal_brain::db::general::kick_contract(&db_conn, operator_wallet, contract_uuid, reason)
|
|
.await;
|
|
match kick_response {
|
|
Ok(refund_amount) => {
|
|
println!("Refund amount: {}", refund_amount);
|
|
}
|
|
Err(e) => {
|
|
println!("Error: {}", e);
|
|
}
|
|
}
|
|
}
|