aboutsummaryrefslogtreecommitdiff
path: root/tests/unit_tests
diff options
context:
space:
mode:
Diffstat (limited to 'tests/unit_tests')
-rw-r--r--tests/unit_tests/CMakeLists.txt5
-rw-r--r--tests/unit_tests/ban.cpp1
-rw-r--r--tests/unit_tests/hardfork.cpp136
-rw-r--r--tests/unit_tests/main.cpp11
-rw-r--r--tests/unit_tests/ringdb.cpp164
5 files changed, 305 insertions, 12 deletions
diff --git a/tests/unit_tests/CMakeLists.txt b/tests/unit_tests/CMakeLists.txt
index 9c58536c9..8cc074bb2 100644
--- a/tests/unit_tests/CMakeLists.txt
+++ b/tests/unit_tests/CMakeLists.txt
@@ -68,7 +68,8 @@ set(unit_tests_sources
varint.cpp
ringct.cpp
output_selection.cpp
- vercmp.cpp)
+ vercmp.cpp
+ ringdb.cpp)
set(unit_tests_headers
unit_tests_utils.h)
@@ -103,6 +104,8 @@ if (NOT MSVC)
COMPILE_FLAGS " -Wno-undef -Wno-sign-compare")
endif ()
+SET_PROPERTY(SOURCE main.cpp PROPERTY COMPILE_FLAGS -DDEFAULT_DATA_DIR="\\"${CMAKE_SOURCE_DIR}/tests/data\\"")
+
SET_PROPERTY(SOURCE memwipe.cpp PROPERTY COMPILE_FLAGS -Ofast)
add_test(
diff --git a/tests/unit_tests/ban.cpp b/tests/unit_tests/ban.cpp
index 313ff21d6..15bc0bce3 100644
--- a/tests/unit_tests/ban.cpp
+++ b/tests/unit_tests/ban.cpp
@@ -76,6 +76,7 @@ public:
bool get_blocks(uint64_t start_offset, size_t count, std::list<std::pair<cryptonote::blobdata, cryptonote::block>>& blocks, std::list<cryptonote::blobdata>& txs) const { return false; }
bool get_transactions(const std::vector<crypto::hash>& txs_ids, std::list<cryptonote::transaction>& txs, std::list<crypto::hash>& missed_txs) const { return false; }
bool get_block_by_hash(const crypto::hash &h, cryptonote::block &blk, bool *orphan = NULL) const { return false; }
+ uint8_t get_ideal_hard_fork_version() const { return 0; }
uint8_t get_ideal_hard_fork_version(uint64_t height) const { return 0; }
uint8_t get_hard_fork_version(uint64_t height) const { return 0; }
uint64_t get_earliest_ideal_height_for_version(uint8_t version) const { return 0; }
diff --git a/tests/unit_tests/hardfork.cpp b/tests/unit_tests/hardfork.cpp
index 3e2199217..913ebe84a 100644
--- a/tests/unit_tests/hardfork.cpp
+++ b/tests/unit_tests/hardfork.cpp
@@ -64,6 +64,8 @@ public:
virtual blobdata get_block_blob_from_height(const uint64_t& height) const { return cryptonote::t_serializable_object_to_blob(get_block_from_height(height)); }
virtual blobdata get_block_blob(const crypto::hash& h) const { return blobdata(); }
virtual bool get_tx_blob(const crypto::hash& h, cryptonote::blobdata &tx) const { return false; }
+ virtual bool get_pruned_tx_blob(const crypto::hash& h, cryptonote::blobdata &tx) const { return false; }
+ virtual bool get_prunable_tx_hash(const crypto::hash& tx_hash, crypto::hash &prunable_hash) const { return false; }
virtual uint64_t get_block_height(const crypto::hash& h) const { return 0; }
virtual block_header get_block_header(const crypto::hash& h) const { return block_header(); }
virtual uint64_t get_block_timestamp(const uint64_t& height) const { return 0; }
@@ -99,7 +101,7 @@ public:
virtual std::vector<uint64_t> get_tx_amount_output_indices(const uint64_t tx_index) const { return std::vector<uint64_t>(); }
virtual bool has_key_image(const crypto::key_image& img) const { return false; }
virtual void remove_block() { blocks.pop_back(); }
- virtual uint64_t add_transaction_data(const crypto::hash& blk_hash, const transaction& tx, const crypto::hash& tx_hash) {return 0;}
+ virtual uint64_t add_transaction_data(const crypto::hash& blk_hash, const transaction& tx, const crypto::hash& tx_hash, const crypto::hash& tx_prunable_hash) {return 0;}
virtual void remove_transaction_data(const crypto::hash& tx_hash, const transaction& tx) {}
virtual uint64_t add_output(const crypto::hash& tx_hash, const tx_out& tx_output, const uint64_t& local_index, const uint64_t unlock_time, const rct::key *commitment) {return 0;}
virtual void add_tx_amount_output_indices(const uint64_t tx_index, const std::vector<uint64_t>& amount_output_indices) {}
@@ -108,11 +110,12 @@ public:
virtual bool for_all_key_images(std::function<bool(const crypto::key_image&)>) const { return true; }
virtual bool for_blocks_range(const uint64_t&, const uint64_t&, std::function<bool(uint64_t, const crypto::hash&, const cryptonote::block&)>) const { return true; }
- virtual bool for_all_transactions(std::function<bool(const crypto::hash&, const cryptonote::transaction&)>) const { return true; }
+ virtual bool for_all_transactions(std::function<bool(const crypto::hash&, const cryptonote::transaction&)>, bool pruned) const { return true; }
virtual bool for_all_outputs(std::function<bool(uint64_t amount, const crypto::hash &tx_hash, uint64_t height, size_t tx_idx)> f) const { return true; }
virtual bool for_all_outputs(uint64_t amount, const std::function<bool(uint64_t height)> &f) const { return true; }
virtual bool is_read_only() const { return false; }
- virtual std::map<uint64_t, std::tuple<uint64_t, uint64_t, uint64_t>> get_output_histogram(const std::vector<uint64_t> &amounts, bool unlocked, uint64_t recent_cutoff) const { return std::map<uint64_t, std::tuple<uint64_t, uint64_t, uint64_t>>(); }
+ virtual std::map<uint64_t, std::tuple<uint64_t, uint64_t, uint64_t>> get_output_histogram(const std::vector<uint64_t> &amounts, bool unlocked, uint64_t recent_cutoff, uint64_t min_count) const { return std::map<uint64_t, std::tuple<uint64_t, uint64_t, uint64_t>>(); }
+ virtual bool get_output_distribution(uint64_t amount, uint64_t from_height, uint64_t to_height, std::vector<uint64_t> &distribution, uint64_t &base) const { return false; }
virtual void add_txpool_tx(const transaction &tx, const txpool_tx_meta_t& details) {}
virtual void update_txpool_tx(const crypto::hash &txid, const txpool_tx_meta_t& details) {}
@@ -229,6 +232,59 @@ TEST(ordering, Success)
ASSERT_FALSE(hf.add_fork(5, 5, 4));
}
+TEST(check_for_height, Success)
+{
+ TestDB db;
+ HardFork hf(db, 1, 0, 0, 0, 1, 0); // no voting
+
+ ASSERT_TRUE(hf.add_fork(1, 0, 0));
+ ASSERT_TRUE(hf.add_fork(2, 5, 1));
+ hf.init();
+
+ for (uint64_t h = 0; h <= 4; ++h) {
+ ASSERT_TRUE(hf.check_for_height(mkblock(1, 1), h));
+ ASSERT_FALSE(hf.check_for_height(mkblock(2, 2), h)); // block version is too high
+ db.add_block(mkblock(hf, h, 1), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+
+ for (uint64_t h = 5; h <= 10; ++h) {
+ ASSERT_FALSE(hf.check_for_height(mkblock(1, 1), h)); // block version is too low
+ ASSERT_TRUE(hf.check_for_height(mkblock(2, 2), h));
+ db.add_block(mkblock(hf, h, 2), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+}
+
+TEST(get, next_version)
+{
+ TestDB db;
+ HardFork hf(db);
+
+ ASSERT_TRUE(hf.add_fork(1, 0, 0));
+ ASSERT_TRUE(hf.add_fork(2, 5, 1));
+ ASSERT_TRUE(hf.add_fork(4, 10, 2));
+ hf.init();
+
+ for (uint64_t h = 0; h <= 4; ++h) {
+ ASSERT_EQ(2, hf.get_next_version());
+ db.add_block(mkblock(hf, h, 1), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+
+ for (uint64_t h = 5; h <= 9; ++h) {
+ ASSERT_EQ(4, hf.get_next_version());
+ db.add_block(mkblock(hf, h, 2), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+
+ for (uint64_t h = 10; h <= 15; ++h) {
+ ASSERT_EQ(4, hf.get_next_version());
+ db.add_block(mkblock(hf, h, 4), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+}
+
TEST(states, Success)
{
TestDB db;
@@ -436,6 +492,55 @@ TEST(voting, different_thresholds)
}
}
+TEST(voting, info)
+{
+ TestDB db;
+ HardFork hf(db, 1, 0, 1, 1, 4, 50); // window size 4, default threshold 50%
+
+ // v h ts
+ ASSERT_TRUE(hf.add_fork(1, 0, 0));
+ // v h thr ts
+ ASSERT_TRUE(hf.add_fork(2, 5, 0, 1)); // asap
+ ASSERT_TRUE(hf.add_fork(3, 10, 100, 2)); // all votes
+ // v h ts
+ ASSERT_TRUE(hf.add_fork(4, 15, 3)); // default 50% votes
+ hf.init();
+
+ // 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
+ static const uint8_t block_versions[] = { 1, 1, 1, 2, 2, 2, 2, 2, 3, 3, 3, 3, 3, 3, 4, 4, 4, 4, 4, 4 };
+ static const uint8_t expected_versions[] = { 1, 1, 1, 1, 1, 2, 2, 2, 2, 2, 2, 2, 3, 3, 3, 3, 4, 4, 4, 4 };
+ static const uint8_t expected_thresholds[] = { 0, 1, 1, 2, 2, 0, 0, 0, 0, 0, 0, 0, 4, 4, 4, 4, 2, 2, 2, 2 };
+
+ for (uint64_t h = 0; h < sizeof(block_versions) / sizeof(block_versions[0]); ++h) {
+ uint32_t window, votes, threshold;
+ uint64_t earliest_height;
+ uint8_t voting;
+
+ ASSERT_TRUE(hf.get_voting_info(1, window, votes, threshold, earliest_height, voting));
+ ASSERT_EQ(std::min<uint64_t>(h, 4), votes);
+ ASSERT_EQ(0, earliest_height);
+
+ ASSERT_EQ(hf.get_current_version() >= 2, hf.get_voting_info(2, window, votes, threshold, earliest_height, voting));
+ ASSERT_EQ(std::min<uint64_t>(h <= 3 ? 0 : h - 3, 4), votes);
+ ASSERT_EQ(5, earliest_height);
+
+ ASSERT_EQ(hf.get_current_version() >= 3, hf.get_voting_info(3, window, votes, threshold, earliest_height, voting));
+ ASSERT_EQ(std::min<uint64_t>(h <= 8 ? 0 : h - 8, 4), votes);
+ ASSERT_EQ(10, earliest_height);
+
+ ASSERT_EQ(hf.get_current_version() == 4, hf.get_voting_info(4, window, votes, threshold, earliest_height, voting));
+ ASSERT_EQ(std::min<uint64_t>(h <= 14 ? 0 : h - 14, 4), votes);
+ ASSERT_EQ(15, earliest_height);
+
+ ASSERT_EQ(std::min<uint64_t>(h, 4), window);
+ ASSERT_EQ(expected_thresholds[h], threshold);
+ ASSERT_EQ(4, voting);
+
+ db.add_block(mkblock(hf, h, block_versions[h]), 0, 0, 0, crypto::hash());
+ ASSERT_TRUE(hf.add(db.get_block_from_height(h), h));
+ }
+}
+
TEST(new_blocks, denied)
{
TestDB db;
@@ -551,3 +656,28 @@ TEST(get, higher)
ASSERT_EQ(hf.get_ideal_version(7), 3);
}
+TEST(get, earliest_ideal_height)
+{
+ TestDB db;
+ HardFork hf(db, 1, 0, 1, 1, 4, 50);
+
+ // v h t
+ ASSERT_TRUE(hf.add_fork(1, 0, 0));
+ ASSERT_TRUE(hf.add_fork(2, 2, 1));
+ ASSERT_TRUE(hf.add_fork(5, 5, 2));
+ ASSERT_TRUE(hf.add_fork(6, 10, 3));
+ ASSERT_TRUE(hf.add_fork(9, 15, 4));
+ hf.init();
+
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(1), 0);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(2), 2);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(3), 5);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(4), 5);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(5), 5);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(6), 10);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(7), 15);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(8), 15);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(9), 15);
+ ASSERT_EQ(hf.get_earliest_ideal_height_for_version(10), std::numeric_limits<uint64_t>::max());
+}
+
diff --git a/tests/unit_tests/main.cpp b/tests/unit_tests/main.cpp
index 85c6cbed5..13b62cbb4 100644
--- a/tests/unit_tests/main.cpp
+++ b/tests/unit_tests/main.cpp
@@ -61,8 +61,8 @@ int main(int argc, char** argv)
::testing::InitGoogleTest(&argc, argv);
po::options_description desc_options("Command line options");
- const command_line::arg_descriptor<std::string> arg_data_dir = { "data-dir", "Data files directory" };
- command_line::add_arg(desc_options, arg_data_dir, "");
+ const command_line::arg_descriptor<std::string> arg_data_dir = { "data-dir", "Data files directory", DEFAULT_DATA_DIR };
+ command_line::add_arg(desc_options, arg_data_dir);
po::variables_map vm;
bool r = command_line::handle_error_helper(desc_options, [&]()
@@ -74,12 +74,7 @@ int main(int argc, char** argv)
if (! r)
return 1;
- if (command_line::is_arg_defaulted(vm, arg_data_dir))
- unit_test::data_dir = boost::filesystem::canonical(boost::filesystem::path(epee::string_tools::get_current_module_folder()))
- .parent_path().parent_path().parent_path().parent_path()
- .append("tests").append("data");
- else
- unit_test::data_dir = command_line::get_arg(vm, arg_data_dir);
+ unit_test::data_dir = command_line::get_arg(vm, arg_data_dir);
return RUN_ALL_TESTS();
}
diff --git a/tests/unit_tests/ringdb.cpp b/tests/unit_tests/ringdb.cpp
new file mode 100644
index 000000000..d50d61b0f
--- /dev/null
+++ b/tests/unit_tests/ringdb.cpp
@@ -0,0 +1,164 @@
+// Copyright (c) 2018, The Monero Project
+//
+// All rights reserved.
+//
+// Redistribution and use in source and binary forms, with or without modification, are
+// permitted provided that the following conditions are met:
+//
+// 1. Redistributions of source code must retain the above copyright notice, this list of
+// conditions and the following disclaimer.
+//
+// 2. Redistributions in binary form must reproduce the above copyright notice, this list
+// of conditions and the following disclaimer in the documentation and/or other
+// materials provided with the distribution.
+//
+// 3. Neither the name of the copyright holder nor the names of its contributors may be
+// used to endorse or promote products derived from this software without specific
+// prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
+// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <unistd.h>
+#include <fcntl.h>
+#include <string.h>
+#include <boost/filesystem.hpp>
+
+#include "gtest/gtest.h"
+
+#include "string_tools.h"
+#include "crypto/crypto.h"
+#include "crypto/random.h"
+#include "crypto/chacha.h"
+#include "wallet/ringdb.h"
+
+static crypto::chacha_key generate_chacha_key()
+{
+ uint8_t key[CHACHA_KEY_SIZE];
+ crypto::rand(CHACHA_KEY_SIZE, key);
+ crypto::chacha_key chacha_key;
+ memcpy(&chacha_key, key, CHACHA_KEY_SIZE);
+ return chacha_key;
+}
+
+static crypto::key_image generate_key_image()
+{
+ return crypto::rand<crypto::key_image>();
+}
+
+static crypto::public_key generate_output()
+{
+ return crypto::rand<crypto::public_key>();
+}
+
+
+static const crypto::chacha_key KEY_1 = generate_chacha_key();
+static const crypto::chacha_key KEY_2 = generate_chacha_key();
+static const crypto::key_image KEY_IMAGE_1 = generate_key_image();
+static const crypto::public_key OUTPUT_1 = generate_output();
+static const crypto::public_key OUTPUT_2 = generate_output();
+
+class RingDB: public tools::ringdb
+{
+public:
+ RingDB(const char *genesis = ""): tools::ringdb(make_filename(), genesis) { }
+ ~RingDB() { close(); boost::filesystem::remove_all(filename); free(filename); }
+
+private:
+ std::string make_filename()
+ {
+ boost::filesystem::path path = tools::get_default_data_dir();
+ path /= "fake";
+#if defined(__MINGW32__) || defined(__MINGW__)
+ filename = tempnam(path.string().c_str(), "ringdb-test-");
+ EXPECT_TRUE(filename != NULL);
+#else
+ path /= "ringdb-test-XXXXXX";
+ filename = strdup(path.string().c_str());
+ EXPECT_TRUE(mkdtemp(filename) != NULL);
+#endif
+ return filename;
+ }
+
+private:
+ char *filename;
+};
+
+TEST(ringdb, not_found)
+{
+ RingDB ringdb;
+ std::vector<uint64_t> outs;
+ ASSERT_FALSE(ringdb.get_ring(KEY_1, KEY_IMAGE_1, outs));
+}
+
+TEST(ringdb, found)
+{
+ RingDB ringdb;
+ std::vector<uint64_t> outs, outs2;
+ outs.push_back(43); outs.push_back(7320); outs.push_back(8429);
+ ASSERT_TRUE(ringdb.set_ring(KEY_1, KEY_IMAGE_1, outs, false));
+ ASSERT_TRUE(ringdb.get_ring(KEY_1, KEY_IMAGE_1, outs2));
+ ASSERT_EQ(outs, outs2);
+}
+
+TEST(ringdb, convert)
+{
+ RingDB ringdb;
+ std::vector<uint64_t> outs, outs2;
+ outs.push_back(43); outs.push_back(7320); outs.push_back(8429);
+ ASSERT_TRUE(ringdb.set_ring(KEY_1, KEY_IMAGE_1, outs, true));
+ ASSERT_TRUE(ringdb.get_ring(KEY_1, KEY_IMAGE_1, outs2));
+ ASSERT_EQ(outs2.size(), 3);
+ ASSERT_EQ(outs2[0], 43);
+ ASSERT_EQ(outs2[1], 43+7320);
+ ASSERT_EQ(outs2[2], 43+7320+8429);
+}
+
+TEST(ringdb, different_genesis)
+{
+ RingDB ringdb;
+ std::vector<uint64_t> outs, outs2;
+ outs.push_back(43); outs.push_back(7320); outs.push_back(8429);
+ ASSERT_TRUE(ringdb.set_ring(KEY_1, KEY_IMAGE_1, outs, false));
+ ASSERT_FALSE(ringdb.get_ring(KEY_2, KEY_IMAGE_1, outs2));
+}
+
+TEST(blackball, not_found)
+{
+ RingDB ringdb;
+ ASSERT_TRUE(ringdb.blackball(OUTPUT_1));
+ ASSERT_FALSE(ringdb.blackballed(OUTPUT_2));
+}
+
+TEST(blackball, found)
+{
+ RingDB ringdb;
+ ASSERT_TRUE(ringdb.blackball(OUTPUT_1));
+ ASSERT_TRUE(ringdb.blackballed(OUTPUT_1));
+}
+
+TEST(blackball, unblackball)
+{
+ RingDB ringdb;
+ ASSERT_TRUE(ringdb.blackball(OUTPUT_1));
+ ASSERT_TRUE(ringdb.unblackball(OUTPUT_1));
+ ASSERT_FALSE(ringdb.blackballed(OUTPUT_1));
+}
+
+TEST(blackball, clear)
+{
+ RingDB ringdb;
+ ASSERT_TRUE(ringdb.blackball(OUTPUT_1));
+ ASSERT_TRUE(ringdb.clear_blackballs());
+ ASSERT_FALSE(ringdb.blackballed(OUTPUT_1));
+}
+