699 lines
24 KiB
Go
699 lines
24 KiB
Go
package evm_test
|
|
|
|
import (
|
|
"errors"
|
|
"math/big"
|
|
"testing"
|
|
"time"
|
|
|
|
sdkmath "cosmossdk.io/math"
|
|
"github.com/gogo/protobuf/proto"
|
|
|
|
abci "github.com/tendermint/tendermint/abci/types"
|
|
tmjson "github.com/tendermint/tendermint/libs/json"
|
|
|
|
feemarkettypes "github.com/cerc-io/laconicd/x/feemarket/types"
|
|
"github.com/cosmos/cosmos-sdk/simapp"
|
|
authtypes "github.com/cosmos/cosmos-sdk/x/auth/types"
|
|
banktypes "github.com/cosmos/cosmos-sdk/x/bank/types"
|
|
|
|
stakingtypes "github.com/cosmos/cosmos-sdk/x/staking/types"
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/core"
|
|
ethtypes "github.com/ethereum/go-ethereum/core/types"
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
"github.com/cosmos/cosmos-sdk/baseapp"
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
|
|
"github.com/cerc-io/laconicd/app"
|
|
"github.com/cerc-io/laconicd/crypto/ethsecp256k1"
|
|
"github.com/cerc-io/laconicd/tests"
|
|
ethermint "github.com/cerc-io/laconicd/types"
|
|
"github.com/cerc-io/laconicd/x/evm"
|
|
"github.com/cerc-io/laconicd/x/evm/statedb"
|
|
"github.com/cerc-io/laconicd/x/evm/types"
|
|
|
|
"github.com/tendermint/tendermint/crypto/tmhash"
|
|
tmproto "github.com/tendermint/tendermint/proto/tendermint/types"
|
|
tmversion "github.com/tendermint/tendermint/proto/tendermint/version"
|
|
|
|
"github.com/tendermint/tendermint/version"
|
|
)
|
|
|
|
type EvmTestSuite struct {
|
|
suite.Suite
|
|
|
|
ctx sdk.Context
|
|
handler sdk.Handler
|
|
app *app.EthermintApp
|
|
codec codec.Codec
|
|
chainID *big.Int
|
|
|
|
signer keyring.Signer
|
|
ethSigner ethtypes.Signer
|
|
from common.Address
|
|
to sdk.AccAddress
|
|
|
|
dynamicTxFee bool
|
|
}
|
|
|
|
// DoSetupTest setup test environment, it uses`require.TestingT` to support both `testing.T` and `testing.B`.
|
|
func (suite *EvmTestSuite) DoSetupTest(t require.TestingT) {
|
|
checkTx := false
|
|
|
|
// account key
|
|
priv, err := ethsecp256k1.GenerateKey()
|
|
require.NoError(t, err)
|
|
address := common.BytesToAddress(priv.PubKey().Address().Bytes())
|
|
suite.signer = tests.NewSigner(priv)
|
|
suite.from = address
|
|
// consensus key
|
|
priv, err = ethsecp256k1.GenerateKey()
|
|
require.NoError(t, err)
|
|
consAddress := sdk.ConsAddress(priv.PubKey().Address())
|
|
|
|
suite.app = app.Setup(checkTx, func(app *app.EthermintApp, genesis simapp.GenesisState) simapp.GenesisState {
|
|
if suite.dynamicTxFee {
|
|
feemarketGenesis := feemarkettypes.DefaultGenesisState()
|
|
feemarketGenesis.Params.EnableHeight = 1
|
|
feemarketGenesis.Params.NoBaseFee = false
|
|
genesis[feemarkettypes.ModuleName] = app.AppCodec().MustMarshalJSON(feemarketGenesis)
|
|
}
|
|
return genesis
|
|
})
|
|
|
|
coins := sdk.NewCoins(sdk.NewCoin(types.DefaultEVMDenom, sdkmath.NewInt(100000000000000)))
|
|
genesisState := app.NewTestGenesisState(suite.app.AppCodec())
|
|
b32address := sdk.MustBech32ifyAddressBytes(sdk.GetConfig().GetBech32AccountAddrPrefix(), priv.PubKey().Address().Bytes())
|
|
balances := []banktypes.Balance{
|
|
{
|
|
Address: b32address,
|
|
Coins: coins,
|
|
},
|
|
{
|
|
Address: suite.app.AccountKeeper.GetModuleAddress(authtypes.FeeCollectorName).String(),
|
|
Coins: coins,
|
|
},
|
|
}
|
|
var bankGenesis banktypes.GenesisState
|
|
suite.app.AppCodec().MustUnmarshalJSON(genesisState[banktypes.ModuleName], &bankGenesis)
|
|
// Update balances and total supply
|
|
bankGenesis.Balances = append(bankGenesis.Balances, balances...)
|
|
bankGenesis.Supply = bankGenesis.Supply.Add(coins...).Add(coins...)
|
|
genesisState[banktypes.ModuleName] = suite.app.AppCodec().MustMarshalJSON(&bankGenesis)
|
|
|
|
stateBytes, err := tmjson.MarshalIndent(genesisState, "", " ")
|
|
require.NoError(t, err)
|
|
|
|
// Initialize the chain
|
|
suite.app.InitChain(
|
|
abci.RequestInitChain{
|
|
ChainId: "laconic_9000-1",
|
|
Validators: []abci.ValidatorUpdate{},
|
|
ConsensusParams: app.DefaultConsensusParams,
|
|
AppStateBytes: stateBytes,
|
|
},
|
|
)
|
|
|
|
suite.ctx = suite.app.BaseApp.NewContext(checkTx, tmproto.Header{
|
|
Height: 1,
|
|
ChainID: "laconic_9000-1",
|
|
Time: time.Now().UTC(),
|
|
ProposerAddress: consAddress.Bytes(),
|
|
Version: tmversion.Consensus{
|
|
Block: version.BlockProtocol,
|
|
},
|
|
LastBlockId: tmproto.BlockID{
|
|
Hash: tmhash.Sum([]byte("block_id")),
|
|
PartSetHeader: tmproto.PartSetHeader{
|
|
Total: 11,
|
|
Hash: tmhash.Sum([]byte("partset_header")),
|
|
},
|
|
},
|
|
AppHash: tmhash.Sum([]byte("app")),
|
|
DataHash: tmhash.Sum([]byte("data")),
|
|
EvidenceHash: tmhash.Sum([]byte("evidence")),
|
|
ValidatorsHash: tmhash.Sum([]byte("validators")),
|
|
NextValidatorsHash: tmhash.Sum([]byte("next_validators")),
|
|
ConsensusHash: tmhash.Sum([]byte("consensus")),
|
|
LastResultsHash: tmhash.Sum([]byte("last_result")),
|
|
})
|
|
|
|
queryHelper := baseapp.NewQueryServerTestHelper(suite.ctx, suite.app.InterfaceRegistry())
|
|
types.RegisterQueryServer(queryHelper, suite.app.EvmKeeper)
|
|
|
|
acc := ðermint.EthAccount{
|
|
BaseAccount: authtypes.NewBaseAccount(sdk.AccAddress(address.Bytes()), nil, 0, 0),
|
|
CodeHash: common.BytesToHash(crypto.Keccak256(nil)).String(),
|
|
}
|
|
|
|
suite.app.AccountKeeper.SetAccount(suite.ctx, acc)
|
|
|
|
valAddr := sdk.ValAddress(address.Bytes())
|
|
validator, err := stakingtypes.NewValidator(valAddr, priv.PubKey(), stakingtypes.Description{})
|
|
require.NoError(t, err)
|
|
|
|
err = suite.app.StakingKeeper.SetValidatorByConsAddr(suite.ctx, validator)
|
|
require.NoError(t, err)
|
|
err = suite.app.StakingKeeper.SetValidatorByConsAddr(suite.ctx, validator)
|
|
require.NoError(t, err)
|
|
suite.app.StakingKeeper.SetValidator(suite.ctx, validator)
|
|
|
|
suite.ethSigner = ethtypes.LatestSignerForChainID(suite.app.EvmKeeper.ChainID())
|
|
suite.handler = evm.NewHandler(suite.app.EvmKeeper)
|
|
}
|
|
|
|
func (suite *EvmTestSuite) SetupTest() {
|
|
suite.DoSetupTest(suite.T())
|
|
}
|
|
|
|
func (suite *EvmTestSuite) SignTx(tx *types.MsgEthereumTx) {
|
|
tx.From = suite.from.String()
|
|
err := tx.Sign(suite.ethSigner, suite.signer)
|
|
suite.Require().NoError(err)
|
|
}
|
|
|
|
func (suite *EvmTestSuite) StateDB() *statedb.StateDB {
|
|
return statedb.New(suite.ctx, suite.app.EvmKeeper, statedb.NewEmptyTxConfig(common.BytesToHash(suite.ctx.HeaderHash().Bytes())))
|
|
}
|
|
|
|
func TestEvmTestSuite(t *testing.T) {
|
|
suite.Run(t, new(EvmTestSuite))
|
|
}
|
|
|
|
func (suite *EvmTestSuite) TestHandleMsgEthereumTx() {
|
|
var tx *types.MsgEthereumTx
|
|
|
|
testCases := []struct {
|
|
msg string
|
|
malleate func()
|
|
expPass bool
|
|
}{
|
|
{
|
|
"passed",
|
|
func() {
|
|
to := common.BytesToAddress(suite.to)
|
|
tx = types.NewTx(suite.chainID, 0, &to, big.NewInt(100), 10_000_000, big.NewInt(10000), nil, nil, nil, nil)
|
|
suite.SignTx(tx)
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"insufficient balance",
|
|
func() {
|
|
tx = types.NewTxContract(suite.chainID, 0, big.NewInt(100), 0, big.NewInt(10000), nil, nil, nil, nil)
|
|
suite.SignTx(tx)
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"tx encoding failed",
|
|
func() {
|
|
tx = types.NewTxContract(suite.chainID, 0, big.NewInt(100), 0, big.NewInt(10000), nil, nil, nil, nil)
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"invalid chain ID",
|
|
func() {
|
|
suite.ctx = suite.ctx.WithChainID("chainID")
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"VerifySig failed",
|
|
func() {
|
|
tx = types.NewTxContract(suite.chainID, 0, big.NewInt(100), 0, big.NewInt(10000), nil, nil, nil, nil)
|
|
},
|
|
false,
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
suite.Run(tc.msg, func() {
|
|
suite.SetupTest() // reset
|
|
//nolint
|
|
tc.malleate()
|
|
res, err := suite.handler(suite.ctx, tx)
|
|
|
|
//nolint
|
|
if tc.expPass {
|
|
suite.Require().NoError(err)
|
|
suite.Require().NotNil(res)
|
|
} else {
|
|
suite.Require().Error(err)
|
|
suite.Require().Nil(res)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func (suite *EvmTestSuite) TestHandlerLogs() {
|
|
// Test contract:
|
|
|
|
// pragma solidity ^0.5.1;
|
|
|
|
// contract Test {
|
|
// event Hello(uint256 indexed world);
|
|
|
|
// constructor() public {
|
|
// emit Hello(17);
|
|
// }
|
|
// }
|
|
|
|
// {
|
|
// "linkReferences": {},
|
|
// "object": "6080604052348015600f57600080fd5b5060117f775a94827b8fd9b519d36cd827093c664f93347070a554f65e4a6f56cd73889860405160405180910390a2603580604b6000396000f3fe6080604052600080fdfea165627a7a723058206cab665f0f557620554bb45adf266708d2bd349b8a4314bdff205ee8440e3c240029",
|
|
// "opcodes": "PUSH1 0x80 PUSH1 0x40 MSTORE CALLVALUE DUP1 ISZERO PUSH1 0xF JUMPI PUSH1 0x0 DUP1 REVERT JUMPDEST POP PUSH1 0x11 PUSH32 0x775A94827B8FD9B519D36CD827093C664F93347070A554F65E4A6F56CD738898 PUSH1 0x40 MLOAD PUSH1 0x40 MLOAD DUP1 SWAP2 SUB SWAP1 LOG2 PUSH1 0x35 DUP1 PUSH1 0x4B PUSH1 0x0 CODECOPY PUSH1 0x0 RETURN INVALID PUSH1 0x80 PUSH1 0x40 MSTORE PUSH1 0x0 DUP1 REVERT INVALID LOG1 PUSH6 0x627A7A723058 KECCAK256 PUSH13 0xAB665F0F557620554BB45ADF26 PUSH8 0x8D2BD349B8A4314 0xbd SELFDESTRUCT KECCAK256 0x5e 0xe8 DIFFICULTY 0xe EXTCODECOPY 0x24 STOP 0x29 ",
|
|
// "sourceMap": "25:119:0:-;;;90:52;8:9:-1;5:2;;;30:1;27;20:12;5:2;90:52:0;132:2;126:9;;;;;;;;;;25:119;;;;;;"
|
|
// }
|
|
|
|
gasLimit := uint64(100000)
|
|
gasPrice := big.NewInt(1000000)
|
|
|
|
bytecode := common.FromHex("0x6080604052348015600f57600080fd5b5060117f775a94827b8fd9b519d36cd827093c664f93347070a554f65e4a6f56cd73889860405160405180910390a2603580604b6000396000f3fe6080604052600080fdfea165627a7a723058206cab665f0f557620554bb45adf266708d2bd349b8a4314bdff205ee8440e3c240029")
|
|
tx := types.NewTx(suite.chainID, 1, nil, big.NewInt(0), gasLimit, gasPrice, nil, nil, bytecode, nil)
|
|
suite.SignTx(tx)
|
|
|
|
result, err := suite.handler(suite.ctx, tx)
|
|
suite.Require().NoError(err, "failed to handle eth tx msg")
|
|
|
|
var txResponse types.MsgEthereumTxResponse
|
|
|
|
err = proto.Unmarshal(result.Data, &txResponse)
|
|
suite.Require().NoError(err, "failed to decode result data")
|
|
|
|
suite.Require().Equal(len(txResponse.Logs), 1)
|
|
suite.Require().Equal(len(txResponse.Logs[0].Topics), 2)
|
|
}
|
|
|
|
func (suite *EvmTestSuite) TestDeployAndCallContract() {
|
|
// Test contract:
|
|
//http://remix.ethereum.org/#optimize=false&evmVersion=istanbul&version=soljson-v0.5.15+commit.6a57276f.js
|
|
//2_Owner.sol
|
|
//
|
|
//pragma solidity >=0.4.22 <0.7.0;
|
|
//
|
|
///**
|
|
// * @title Owner
|
|
// * @dev Set & change owner
|
|
// */
|
|
//contract Owner {
|
|
//
|
|
// address private owner;
|
|
//
|
|
// // event for EVM logging
|
|
// event OwnerSet(address indexed oldOwner, address indexed newOwner);
|
|
//
|
|
// // modifier to check if caller is owner
|
|
// modifier isOwner() {
|
|
// // If the first argument of 'require' evaluates to 'false', execution terminates and all
|
|
// // changes to the state and to Ether balances are reverted.
|
|
// // This used to consume all gas in old EVM versions, but not anymore.
|
|
// // It is often a good idea to use 'require' to check if functions are called correctly.
|
|
// // As a second argument, you can also provide an explanation about what went wrong.
|
|
// require(msg.sender == owner, "Caller is not owner");
|
|
// _;
|
|
//}
|
|
//
|
|
// /**
|
|
// * @dev Set contract deployer as owner
|
|
// */
|
|
// constructor() public {
|
|
// owner = msg.sender; // 'msg.sender' is sender of current call, contract deployer for a constructor
|
|
// emit OwnerSet(address(0), owner);
|
|
//}
|
|
//
|
|
// /**
|
|
// * @dev Change owner
|
|
// * @param newOwner address of new owner
|
|
// */
|
|
// function changeOwner(address newOwner) public isOwner {
|
|
// emit OwnerSet(owner, newOwner);
|
|
// owner = newOwner;
|
|
//}
|
|
//
|
|
// /**
|
|
// * @dev Return owner address
|
|
// * @return address of owner
|
|
// */
|
|
// function getOwner() external view returns (address) {
|
|
// return owner;
|
|
//}
|
|
//}
|
|
|
|
// Deploy contract - Owner.sol
|
|
gasLimit := uint64(100000000)
|
|
gasPrice := big.NewInt(10000)
|
|
|
|
bytecode := common.FromHex("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")
|
|
tx := types.NewTx(suite.chainID, 1, nil, big.NewInt(0), gasLimit, gasPrice, nil, nil, bytecode, nil)
|
|
suite.SignTx(tx)
|
|
|
|
result, err := suite.handler(suite.ctx, tx)
|
|
suite.Require().NoError(err, "failed to handle eth tx msg")
|
|
|
|
var res types.MsgEthereumTxResponse
|
|
|
|
err = proto.Unmarshal(result.Data, &res)
|
|
suite.Require().NoError(err, "failed to decode result data")
|
|
suite.Require().Equal(res.VmError, "", "failed to handle eth tx msg")
|
|
|
|
// store - changeOwner
|
|
gasLimit = uint64(100000000000)
|
|
gasPrice = big.NewInt(100)
|
|
receiver := crypto.CreateAddress(suite.from, 1)
|
|
|
|
storeAddr := "0xa6f9dae10000000000000000000000006a82e4a67715c8412a9114fbd2cbaefbc8181424"
|
|
bytecode = common.FromHex(storeAddr)
|
|
tx = types.NewTx(suite.chainID, 2, &receiver, big.NewInt(0), gasLimit, gasPrice, nil, nil, bytecode, nil)
|
|
suite.SignTx(tx)
|
|
|
|
_, err = suite.handler(suite.ctx, tx)
|
|
suite.Require().NoError(err, "failed to handle eth tx msg")
|
|
|
|
err = proto.Unmarshal(result.Data, &res)
|
|
suite.Require().NoError(err, "failed to decode result data")
|
|
suite.Require().Equal(res.VmError, "", "failed to handle eth tx msg")
|
|
|
|
// query - getOwner
|
|
bytecode = common.FromHex("0x893d20e8")
|
|
tx = types.NewTx(suite.chainID, 2, &receiver, big.NewInt(0), gasLimit, gasPrice, nil, nil, bytecode, nil)
|
|
suite.SignTx(tx)
|
|
|
|
_, err = suite.handler(suite.ctx, tx)
|
|
suite.Require().NoError(err, "failed to handle eth tx msg")
|
|
|
|
err = proto.Unmarshal(result.Data, &res)
|
|
suite.Require().NoError(err, "failed to decode result data")
|
|
suite.Require().Equal(res.VmError, "", "failed to handle eth tx msg")
|
|
|
|
// FIXME: correct owner?
|
|
// getAddr := strings.ToLower(hexutils.BytesToHex(res.Ret))
|
|
// suite.Require().Equal(true, strings.HasSuffix(storeAddr, getAddr), "Fail to query the address")
|
|
}
|
|
|
|
func (suite *EvmTestSuite) TestSendTransaction() {
|
|
gasLimit := uint64(21000)
|
|
gasPrice := big.NewInt(0x55ae82600)
|
|
|
|
// send simple value transfer with gasLimit=21000
|
|
tx := types.NewTx(suite.chainID, 1, &common.Address{0x1}, big.NewInt(1), gasLimit, gasPrice, nil, nil, nil, nil)
|
|
suite.SignTx(tx)
|
|
|
|
result, err := suite.handler(suite.ctx, tx)
|
|
suite.Require().NoError(err)
|
|
suite.Require().NotNil(result)
|
|
}
|
|
|
|
func (suite *EvmTestSuite) TestOutOfGasWhenDeployContract() {
|
|
// Test contract:
|
|
//http://remix.ethereum.org/#optimize=false&evmVersion=istanbul&version=soljson-v0.5.15+commit.6a57276f.js
|
|
//2_Owner.sol
|
|
//
|
|
//pragma solidity >=0.4.22 <0.7.0;
|
|
//
|
|
///**
|
|
// * @title Owner
|
|
// * @dev Set & change owner
|
|
// */
|
|
//contract Owner {
|
|
//
|
|
// address private owner;
|
|
//
|
|
// // event for EVM logging
|
|
// event OwnerSet(address indexed oldOwner, address indexed newOwner);
|
|
//
|
|
// // modifier to check if caller is owner
|
|
// modifier isOwner() {
|
|
// // If the first argument of 'require' evaluates to 'false', execution terminates and all
|
|
// // changes to the state and to Ether balances are reverted.
|
|
// // This used to consume all gas in old EVM versions, but not anymore.
|
|
// // It is often a good idea to use 'require' to check if functions are called correctly.
|
|
// // As a second argument, you can also provide an explanation about what went wrong.
|
|
// require(msg.sender == owner, "Caller is not owner");
|
|
// _;
|
|
//}
|
|
//
|
|
// /**
|
|
// * @dev Set contract deployer as owner
|
|
// */
|
|
// constructor() public {
|
|
// owner = msg.sender; // 'msg.sender' is sender of current call, contract deployer for a constructor
|
|
// emit OwnerSet(address(0), owner);
|
|
//}
|
|
//
|
|
// /**
|
|
// * @dev Change owner
|
|
// * @param newOwner address of new owner
|
|
// */
|
|
// function changeOwner(address newOwner) public isOwner {
|
|
// emit OwnerSet(owner, newOwner);
|
|
// owner = newOwner;
|
|
//}
|
|
//
|
|
// /**
|
|
// * @dev Return owner address
|
|
// * @return address of owner
|
|
// */
|
|
// function getOwner() external view returns (address) {
|
|
// return owner;
|
|
//}
|
|
//}
|
|
|
|
// Deploy contract - Owner.sol
|
|
gasLimit := uint64(1)
|
|
suite.ctx = suite.ctx.WithGasMeter(sdk.NewGasMeter(gasLimit))
|
|
gasPrice := big.NewInt(10000)
|
|
|
|
bytecode := common.FromHex("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")
|
|
tx := types.NewTx(suite.chainID, 1, nil, big.NewInt(0), gasLimit, gasPrice, nil, nil, bytecode, nil)
|
|
suite.SignTx(tx)
|
|
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
// TODO: snapshotting logic
|
|
} else {
|
|
suite.Require().Fail("panic did not happen")
|
|
}
|
|
}()
|
|
|
|
suite.handler(suite.ctx, tx)
|
|
suite.Require().Fail("panic did not happen")
|
|
}
|
|
|
|
func (suite *EvmTestSuite) TestErrorWhenDeployContract() {
|
|
gasLimit := uint64(1000000)
|
|
gasPrice := big.NewInt(10000)
|
|
|
|
bytecode := common.FromHex("0xa6f9dae10000000000000000000000006a82e4a67715c8412a9114fbd2cbaefbc8181424")
|
|
|
|
tx := types.NewTx(suite.chainID, 1, nil, big.NewInt(0), gasLimit, gasPrice, nil, nil, bytecode, nil)
|
|
suite.SignTx(tx)
|
|
|
|
result, _ := suite.handler(suite.ctx, tx)
|
|
var res types.MsgEthereumTxResponse
|
|
|
|
_ = proto.Unmarshal(result.Data, &res)
|
|
|
|
suite.Require().Equal("invalid opcode: opcode 0xa6 not defined", res.VmError, "correct evm error")
|
|
|
|
// TODO: snapshot checking
|
|
}
|
|
|
|
func (suite *EvmTestSuite) deployERC20Contract() common.Address {
|
|
k := suite.app.EvmKeeper
|
|
nonce := k.GetNonce(suite.ctx, suite.from)
|
|
ctorArgs, err := types.ERC20Contract.ABI.Pack("", suite.from, big.NewInt(10000000000))
|
|
suite.Require().NoError(err)
|
|
msg := ethtypes.NewMessage(
|
|
suite.from,
|
|
nil,
|
|
nonce,
|
|
big.NewInt(0),
|
|
2000000,
|
|
big.NewInt(1),
|
|
nil,
|
|
nil,
|
|
append(types.ERC20Contract.Bin, ctorArgs...),
|
|
nil,
|
|
true,
|
|
)
|
|
rsp, err := k.ApplyMessage(suite.ctx, msg, nil, true)
|
|
suite.Require().NoError(err)
|
|
suite.Require().False(rsp.Failed())
|
|
return crypto.CreateAddress(suite.from, nonce)
|
|
}
|
|
|
|
// TestERC20TransferReverted checks:
|
|
// - when transaction reverted, gas refund works.
|
|
// - when transaction reverted, nonce is still increased.
|
|
func (suite *EvmTestSuite) TestERC20TransferReverted() {
|
|
intrinsicGas := uint64(21572)
|
|
// test different hooks scenarios
|
|
testCases := []struct {
|
|
msg string
|
|
gasLimit uint64
|
|
hooks types.EvmHooks
|
|
expErr string
|
|
}{
|
|
{
|
|
"no hooks",
|
|
intrinsicGas, // enough for intrinsicGas, but not enough for execution
|
|
nil,
|
|
"out of gas",
|
|
},
|
|
{
|
|
"success hooks",
|
|
intrinsicGas, // enough for intrinsicGas, but not enough for execution
|
|
&DummyHook{},
|
|
"out of gas",
|
|
},
|
|
{
|
|
"failure hooks",
|
|
1000000, // enough gas limit, but hooks fails.
|
|
&FailureHook{},
|
|
"failed to execute post processing",
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
suite.Run(tc.msg, func() {
|
|
suite.SetupTest()
|
|
k := suite.app.EvmKeeper
|
|
k.SetHooks(tc.hooks)
|
|
|
|
// add some fund to pay gas fee
|
|
k.SetBalance(suite.ctx, suite.from, big.NewInt(1000000000000000))
|
|
|
|
contract := suite.deployERC20Contract()
|
|
|
|
data, err := types.ERC20Contract.ABI.Pack("transfer", suite.from, big.NewInt(10))
|
|
suite.Require().NoError(err)
|
|
|
|
gasPrice := big.NewInt(1000000000) // must be bigger than or equal to baseFee
|
|
nonce := k.GetNonce(suite.ctx, suite.from)
|
|
tx := types.NewTx(
|
|
suite.chainID,
|
|
nonce,
|
|
&contract,
|
|
big.NewInt(0),
|
|
tc.gasLimit,
|
|
gasPrice,
|
|
nil,
|
|
nil,
|
|
data,
|
|
nil,
|
|
)
|
|
suite.SignTx(tx)
|
|
|
|
before := k.GetBalance(suite.ctx, suite.from)
|
|
|
|
txData, err := types.UnpackTxData(tx.Data)
|
|
suite.Require().NoError(err)
|
|
_, _, err = k.DeductTxCostsFromUserBalance(suite.ctx, *tx, txData, "aphoton", true, true, true)
|
|
suite.Require().NoError(err)
|
|
|
|
res, err := k.EthereumTx(sdk.WrapSDKContext(suite.ctx), tx)
|
|
suite.Require().NoError(err)
|
|
|
|
suite.Require().True(res.Failed())
|
|
suite.Require().Equal(tc.expErr, res.VmError)
|
|
suite.Require().Empty(res.Logs)
|
|
|
|
after := k.GetBalance(suite.ctx, suite.from)
|
|
|
|
if tc.expErr == "out of gas" {
|
|
suite.Require().Equal(tc.gasLimit, res.GasUsed)
|
|
} else {
|
|
suite.Require().Greater(tc.gasLimit, res.GasUsed)
|
|
}
|
|
|
|
// check gas refund works: only deducted fee for gas used, rather than gas limit.
|
|
suite.Require().Equal(new(big.Int).Mul(gasPrice, big.NewInt(int64(res.GasUsed))), new(big.Int).Sub(before, after))
|
|
|
|
// nonce should not be increased.
|
|
nonce2 := k.GetNonce(suite.ctx, suite.from)
|
|
suite.Require().Equal(nonce, nonce2)
|
|
})
|
|
}
|
|
}
|
|
|
|
func (suite *EvmTestSuite) TestContractDeploymentRevert() {
|
|
intrinsicGas := uint64(134180)
|
|
testCases := []struct {
|
|
msg string
|
|
gasLimit uint64
|
|
hooks types.EvmHooks
|
|
}{
|
|
{
|
|
"no hooks",
|
|
intrinsicGas,
|
|
nil,
|
|
},
|
|
{
|
|
"success hooks",
|
|
intrinsicGas,
|
|
&DummyHook{},
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
suite.Run(tc.msg, func() {
|
|
suite.SetupTest()
|
|
k := suite.app.EvmKeeper
|
|
|
|
// test with different hooks scenarios
|
|
k.SetHooks(tc.hooks)
|
|
|
|
nonce := k.GetNonce(suite.ctx, suite.from)
|
|
ctorArgs, err := types.ERC20Contract.ABI.Pack("", suite.from, big.NewInt(0))
|
|
suite.Require().NoError(err)
|
|
|
|
tx := types.NewTx(
|
|
nil,
|
|
nonce,
|
|
nil, // to
|
|
nil, // amount
|
|
tc.gasLimit,
|
|
nil, nil, nil,
|
|
append(types.ERC20Contract.Bin, ctorArgs...),
|
|
nil,
|
|
)
|
|
suite.SignTx(tx)
|
|
|
|
// simulate nonce increment in ante handler
|
|
db := suite.StateDB()
|
|
db.SetNonce(suite.from, nonce+1)
|
|
suite.Require().NoError(db.Commit())
|
|
|
|
rsp, err := k.EthereumTx(sdk.WrapSDKContext(suite.ctx), tx)
|
|
suite.Require().NoError(err)
|
|
suite.Require().True(rsp.Failed())
|
|
|
|
// nonce don't change
|
|
nonce2 := k.GetNonce(suite.ctx, suite.from)
|
|
suite.Require().Equal(nonce+1, nonce2)
|
|
})
|
|
}
|
|
}
|
|
|
|
// DummyHook implements EvmHooks interface
|
|
type DummyHook struct{}
|
|
|
|
func (dh *DummyHook) PostTxProcessing(ctx sdk.Context, msg core.Message, receipt *ethtypes.Receipt) error {
|
|
return nil
|
|
}
|
|
|
|
// FailureHook implements EvmHooks interface
|
|
type FailureHook struct{}
|
|
|
|
func (dh *FailureHook) PostTxProcessing(ctx sdk.Context, msg core.Message, receipt *ethtypes.Receipt) error {
|
|
return errors.New("mock error")
|
|
}
|