aboutsummaryrefslogtreecommitdiff
path: root/tests/unit_tests
diff options
context:
space:
mode:
Diffstat (limited to 'tests/unit_tests')
-rw-r--r--tests/unit_tests/CMakeLists.txt3
-rw-r--r--tests/unit_tests/ban.cpp1
-rw-r--r--tests/unit_tests/hardfork.cpp127
-rw-r--r--tests/unit_tests/ringdb.cpp164
4 files changed, 294 insertions, 1 deletions
diff --git a/tests/unit_tests/CMakeLists.txt b/tests/unit_tests/CMakeLists.txt
index 249dbdbe8..8cc074bb2 100644
--- a/tests/unit_tests/CMakeLists.txt
+++ b/tests/unit_tests/CMakeLists.txt
@@ -68,7 +68,8 @@ set(unit_tests_sources
varint.cpp
ringct.cpp
output_selection.cpp
- vercmp.cpp)
+ vercmp.cpp
+ ringdb.cpp)
set(unit_tests_headers
unit_tests_utils.h)
diff --git a/tests/unit_tests/ban.cpp b/tests/unit_tests/ban.cpp
index e56a89971..15bc0bce3 100644
--- a/tests/unit_tests/ban.cpp
+++ b/tests/unit_tests/ban.cpp
@@ -79,6 +79,7 @@ public:
uint8_t get_ideal_hard_fork_version() const { return 0; }
uint8_t get_ideal_hard_fork_version(uint64_t height) const { return 0; }
uint8_t get_hard_fork_version(uint64_t height) const { return 0; }
+ uint64_t get_earliest_ideal_height_for_version(uint8_t version) const { return 0; }
cryptonote::difficulty_type get_block_cumulative_difficulty(uint64_t height) const { return 0; }
bool fluffy_blocks_enabled() const { return false; }
uint64_t prevalidate_block_hashes(uint64_t height, const std::list<crypto::hash> &hashes) { return 0; }
diff --git a/tests/unit_tests/hardfork.cpp b/tests/unit_tests/hardfork.cpp
index 7c27b9c5d..913ebe84a 100644
--- a/tests/unit_tests/hardfork.cpp
+++ b/tests/unit_tests/hardfork.cpp
@@ -232,6 +232,59 @@ TEST(ordering, Success)
ASSERT_FALSE(hf.add_fork(5, 5, 4));
}
+TEST(check_for_height, Success)
+{
+ TestDB db;
+ HardFork hf(db, 1, 0, 0, 0, 1, 0); // no voting
+
+ ASSERT_TRUE(hf.add_fork(1, 0, 0));
+ ASSERT_TRUE(hf.add_fork(2, 5, 1));
+ hf.init();
+
+ for (uint64_t h = 0; h <= 4; ++h) {
+ ASSERT_TRUE(hf.check_for_height(mkblock(1, 1), h));
+ ASSERT_FALSE(hf.check_for_height(mkblock(2, 2), h)); // block version is too high
+ db.add_block(mkblock(hf, h, 1), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+
+ for (uint64_t h = 5; h <= 10; ++h) {
+ ASSERT_FALSE(hf.check_for_height(mkblock(1, 1), h)); // block version is too low
+ ASSERT_TRUE(hf.check_for_height(mkblock(2, 2), h));
+ db.add_block(mkblock(hf, h, 2), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+}
+
+TEST(get, next_version)
+{
+ TestDB db;
+ HardFork hf(db);
+
+ ASSERT_TRUE(hf.add_fork(1, 0, 0));
+ ASSERT_TRUE(hf.add_fork(2, 5, 1));
+ ASSERT_TRUE(hf.add_fork(4, 10, 2));
+ hf.init();
+
+ for (uint64_t h = 0; h <= 4; ++h) {
+ ASSERT_EQ(2, hf.get_next_version());
+ db.add_block(mkblock(hf, h, 1), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+
+ for (uint64_t h = 5; h <= 9; ++h) {
+ ASSERT_EQ(4, hf.get_next_version());
+ db.add_block(mkblock(hf, h, 2), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+
+ for (uint64_t h = 10; h <= 15; ++h) {
+ ASSERT_EQ(4, hf.get_next_version());
+ db.add_block(mkblock(hf, h, 4), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+}
+
TEST(states, Success)
{
TestDB db;
@@ -439,6 +492,55 @@ TEST(voting, different_thresholds)
}
}
+TEST(voting, info)
+{
+ TestDB db;
+ HardFork hf(db, 1, 0, 1, 1, 4, 50); // window size 4, default threshold 50%
+
+ // v h ts
+ ASSERT_TRUE(hf.add_fork(1, 0, 0));
+ // v h thr ts
+ ASSERT_TRUE(hf.add_fork(2, 5, 0, 1)); // asap
+ ASSERT_TRUE(hf.add_fork(3, 10, 100, 2)); // all votes
+ // v h ts
+ ASSERT_TRUE(hf.add_fork(4, 15, 3)); // default 50% votes
+ hf.init();
+
+ // 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
+ static const uint8_t block_versions[] = { 1, 1, 1, 2, 2, 2, 2, 2, 3, 3, 3, 3, 3, 3, 4, 4, 4, 4, 4, 4 };
+ static const uint8_t expected_versions[] = { 1, 1, 1, 1, 1, 2, 2, 2, 2, 2, 2, 2, 3, 3, 3, 3, 4, 4, 4, 4 };
+ static const uint8_t expected_thresholds[] = { 0, 1, 1, 2, 2, 0, 0, 0, 0, 0, 0, 0, 4, 4, 4, 4, 2, 2, 2, 2 };
+
+ for (uint64_t h = 0; h < sizeof(block_versions) / sizeof(block_versions[0]); ++h) {
+ uint32_t window, votes, threshold;
+ uint64_t earliest_height;
+ uint8_t voting;
+
+ ASSERT_TRUE(hf.get_voting_info(1, window, votes, threshold, earliest_height, voting));
+ ASSERT_EQ(std::min<uint64_t>(h, 4), votes);
+ ASSERT_EQ(0, earliest_height);
+
+ ASSERT_EQ(hf.get_current_version() >= 2, hf.get_voting_info(2, window, votes, threshold, earliest_height, voting));
+ ASSERT_EQ(std::min<uint64_t>(h <= 3 ? 0 : h - 3, 4), votes);
+ ASSERT_EQ(5, earliest_height);
+
+ ASSERT_EQ(hf.get_current_version() >= 3, hf.get_voting_info(3, window, votes, threshold, earliest_height, voting));
+ ASSERT_EQ(std::min<uint64_t>(h <= 8 ? 0 : h - 8, 4), votes);
+ ASSERT_EQ(10, earliest_height);
+
+ ASSERT_EQ(hf.get_current_version() == 4, hf.get_voting_info(4, window, votes, threshold, earliest_height, voting));
+ ASSERT_EQ(std::min<uint64_t>(h <= 14 ? 0 : h - 14, 4), votes);
+ ASSERT_EQ(15, earliest_height);
+
+ ASSERT_EQ(std::min<uint64_t>(h, 4), window);
+ ASSERT_EQ(expected_thresholds[h], threshold);
+ ASSERT_EQ(4, voting);
+
+ db.add_block(mkblock(hf, h, block_versions[h]), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+}
+
TEST(new_blocks, denied)
{
TestDB db;
@@ -554,3 +656,28 @@ TEST(get, higher)
ASSERT_EQ(hf.get_ideal_version(7), 3);
}
+TEST(get, earliest_ideal_height)
+{
+ TestDB db;
+ HardFork hf(db, 1, 0, 1, 1, 4, 50);
+
+ // v h t
+ ASSERT_TRUE(hf.add_fork(1, 0, 0));
+ ASSERT_TRUE(hf.add_fork(2, 2, 1));
+ ASSERT_TRUE(hf.add_fork(5, 5, 2));
+ ASSERT_TRUE(hf.add_fork(6, 10, 3));
+ ASSERT_TRUE(hf.add_fork(9, 15, 4));
+ hf.init();
+
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(1), 0);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(2), 2);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(3), 5);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(4), 5);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(5), 5);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(6), 10);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(7), 15);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(8), 15);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(9), 15);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(10), std::numeric_limits<uint64_t>::max());
+}
+
diff --git a/tests/unit_tests/ringdb.cpp b/tests/unit_tests/ringdb.cpp
new file mode 100644
index 000000000..d50d61b0f
--- /dev/null
+++ b/tests/unit_tests/ringdb.cpp
@@ -0,0 +1,164 @@
+// Copyright (c) 2018, The Monero Project
+//
+// All rights reserved.
+//
+// Redistribution and use in source and binary forms, with or without modification, are
+// permitted provided that the following conditions are met:
+//
+// 1. Redistributions of source code must retain the above copyright notice, this list of
+// conditions and the following disclaimer.
+//
+// 2. Redistributions in binary form must reproduce the above copyright notice, this list
+// of conditions and the following disclaimer in the documentation and/or other
+// materials provided with the distribution.
+//
+// 3. Neither the name of the copyright holder nor the names of its contributors may be
+// used to endorse or promote products derived from this software without specific
+// prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
+// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <unistd.h>
+#include <fcntl.h>
+#include <string.h>
+#include <boost/filesystem.hpp>
+
+#include "gtest/gtest.h"
+
+#include "string_tools.h"
+#include "crypto/crypto.h"
+#include "crypto/random.h"
+#include "crypto/chacha.h"
+#include "wallet/ringdb.h"
+
+static crypto::chacha_key generate_chacha_key()
+{
+ uint8_t key[CHACHA_KEY_SIZE];
+ crypto::rand(CHACHA_KEY_SIZE, key);
+ crypto::chacha_key chacha_key;
+ memcpy(&chacha_key, key, CHACHA_KEY_SIZE);
+ return chacha_key;
+}
+
+static crypto::key_image generate_key_image()
+{
+ return crypto::rand<crypto::key_image>();
+}
+
+static crypto::public_key generate_output()
+{
+ return crypto::rand<crypto::public_key>();
+}
+
+
+static const crypto::chacha_key KEY_1 = generate_chacha_key();
+static const crypto::chacha_key KEY_2 = generate_chacha_key();
+static const crypto::key_image KEY_IMAGE_1 = generate_key_image();
+static const crypto::public_key OUTPUT_1 = generate_output();
+static const crypto::public_key OUTPUT_2 = generate_output();
+
+class RingDB: public tools::ringdb
+{
+public:
+ RingDB(const char *genesis = ""): tools::ringdb(make_filename(), genesis) { }
+ ~RingDB() { close(); boost::filesystem::remove_all(filename); free(filename); }
+
+private:
+ std::string make_filename()
+ {
+ boost::filesystem::path path = tools::get_default_data_dir();
+ path /= "fake";
+#if defined(__MINGW32__) || defined(__MINGW__)
+ filename = tempnam(path.string().c_str(), "ringdb-test-");
+ EXPECT_TRUE(filename != NULL);
+#else
+ path /= "ringdb-test-XXXXXX";
+ filename = strdup(path.string().c_str());
+ EXPECT_TRUE(mkdtemp(filename) != NULL);
+#endif
+ return filename;
+ }
+
+private:
+ char *filename;
+};
+
+TEST(ringdb, not_found)
+{
+ RingDB ringdb;
+ std::vector<uint64_t> outs;
+ ASSERT_FALSE(ringdb.get_ring(KEY_1, KEY_IMAGE_1, outs));
+}
+
+TEST(ringdb, found)
+{
+ RingDB ringdb;
+ std::vector<uint64_t> outs, outs2;
+ outs.push_back(43); outs.push_back(7320); outs.push_back(8429);
+ ASSERT_TRUE(ringdb.set_ring(KEY_1, KEY_IMAGE_1, outs, false));
+ ASSERT_TRUE(ringdb.get_ring(KEY_1, KEY_IMAGE_1, outs2));
+ ASSERT_EQ(outs, outs2);
+}
+
+TEST(ringdb, convert)
+{
+ RingDB ringdb;
+ std::vector<uint64_t> outs, outs2;
+ outs.push_back(43); outs.push_back(7320); outs.push_back(8429);
+ ASSERT_TRUE(ringdb.set_ring(KEY_1, KEY_IMAGE_1, outs, true));
+ ASSERT_TRUE(ringdb.get_ring(KEY_1, KEY_IMAGE_1, outs2));
+ ASSERT_EQ(outs2.size(), 3);
+ ASSERT_EQ(outs2[0], 43);
+ ASSERT_EQ(outs2[1], 43+7320);
+ ASSERT_EQ(outs2[2], 43+7320+8429);
+}
+
+TEST(ringdb, different_genesis)
+{
+ RingDB ringdb;
+ std::vector<uint64_t> outs, outs2;
+ outs.push_back(43); outs.push_back(7320); outs.push_back(8429);
+ ASSERT_TRUE(ringdb.set_ring(KEY_1, KEY_IMAGE_1, outs, false));
+ ASSERT_FALSE(ringdb.get_ring(KEY_2, KEY_IMAGE_1, outs2));
+}
+
+TEST(blackball, not_found)
+{
+ RingDB ringdb;
+ ASSERT_TRUE(ringdb.blackball(OUTPUT_1));
+ ASSERT_FALSE(ringdb.blackballed(OUTPUT_2));
+}
+
+TEST(blackball, found)
+{
+ RingDB ringdb;
+ ASSERT_TRUE(ringdb.blackball(OUTPUT_1));
+ ASSERT_TRUE(ringdb.blackballed(OUTPUT_1));
+}
+
+TEST(blackball, unblackball)
+{
+ RingDB ringdb;
+ ASSERT_TRUE(ringdb.blackball(OUTPUT_1));
+ ASSERT_TRUE(ringdb.unblackball(OUTPUT_1));
+ ASSERT_FALSE(ringdb.blackballed(OUTPUT_1));
+}
+
+TEST(blackball, clear)
+{
+ RingDB ringdb;
+ ASSERT_TRUE(ringdb.blackball(OUTPUT_1));
+ ASSERT_TRUE(ringdb.clear_blackballs());
+ ASSERT_FALSE(ringdb.blackballed(OUTPUT_1));
+}
+