-
Notifications
You must be signed in to change notification settings - Fork 40
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
7 changed files
with
410 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
on: [push, pull_request] | ||
|
||
name: Continuous integration | ||
|
||
jobs: | ||
unit-tests: | ||
name: unit-tests | ||
runs-on: ubuntu-latest | ||
container: | ||
image: xd009642/tarpaulin | ||
options: --security-opt seccomp=unconfined | ||
steps: | ||
- uses: actions/checkout@v2 | ||
- name: Build | ||
run: cargo build --verbose | ||
- name: Test | ||
run: cargo test --verbose | ||
- name: Install nightly toolchain | ||
run: rustup toolchain install nightly | ||
- name: code coverage | ||
run: ./scripts/generate_coverage.sh | ||
- name: Archive code coverage results | ||
uses: actions/upload-artifact@v1 | ||
with: | ||
name: code-coverage-report | ||
path: tarpaulin-report.html | ||
|
||
integration_tests: | ||
name: integration-tests | ||
runs-on: ubuntu-latest | ||
strategy: | ||
matrix: | ||
tests: | ||
- close | ||
- refund | ||
steps: | ||
- uses: actions/checkout@v2 | ||
- name: Start bitcoin node | ||
run: ./scripts/start_node.sh | ||
- name: Run test | ||
run: cargo test -- --ignored integration_tests_${{ matrix.tests }} | ||
- name: Stop bitcoin node | ||
run: ./scripts/stop_node.sh |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,344 @@ | ||
extern crate bitcoin; | ||
extern crate bitcoincore_rpc; | ||
extern crate bitcoincore_rpc_json; | ||
extern crate dlc; | ||
extern crate secp256k1; | ||
|
||
use bitcoincore_rpc::{Auth, Client, RpcApi}; | ||
use bitcoincore_rpc_json::AddressType; | ||
|
||
use bitcoin::hashes::{sha256, Hash}; | ||
use bitcoin::{OutPoint, Script, SigHashType}; | ||
use dlc::{PartyParams, Payout, TxInputInfo}; | ||
use secp256k1::{schnorrsig::PublicKey as SchnorrPublicKey, Message, PublicKey, SecretKey}; | ||
|
||
use secp256k1::rand::{thread_rng, RngCore}; | ||
|
||
const LOCALPARTY: &str = "alice"; | ||
const REMOTEPARTY: &str = "bob"; | ||
const SINK: &str = "sink"; | ||
|
||
const RPCBASE: &str = "http://localhost:18443"; | ||
|
||
const BTC_TO_SAT: u64 = 100000000; | ||
const PARTY_COLLATERAL: u64 = 1 * BTC_TO_SAT; | ||
const WIN: &str = "WIN"; | ||
const LOSE: &str = "LOSE"; | ||
|
||
const FUND_LOCK_TIME: u32 = 1000; | ||
const CET_LOCK_TIME: u32 = FUND_LOCK_TIME + 1000; | ||
const REFUND_LOCK_TIME: u32 = CET_LOCK_TIME + 1000; | ||
|
||
fn outcomes() -> Vec<Payout> { | ||
vec![ | ||
Payout { | ||
offer: 2 * BTC_TO_SAT, | ||
accept: 0, | ||
}, | ||
Payout { | ||
offer: 0, | ||
accept: 2 * BTC_TO_SAT, | ||
}, | ||
] | ||
} | ||
|
||
fn hashed_msg() -> Vec<Message> { | ||
[WIN, LOSE] | ||
.iter() | ||
.map(|m| { | ||
Message::from_slice(sha256::Hash::hash(&m.as_bytes()).into_inner()[..].as_ref()) | ||
.unwrap() | ||
}) | ||
.collect() | ||
} | ||
|
||
fn get_new_wallet_rpc(default_rpc: &Client, wallet_name: &str, auth: Auth) -> Client { | ||
default_rpc | ||
.create_wallet(wallet_name, Some(false), None, None, None) | ||
.unwrap(); | ||
let rpc_url = format!("{}{}{}", RPCBASE, "/wallet/", wallet_name); | ||
Client::new(rpc_url, auth).unwrap() | ||
} | ||
|
||
fn init() -> (Client, Client, Box<dyn Fn(u64) -> ()>) { | ||
let auth = Auth::UserPass( | ||
"testuser".to_string(), | ||
"lq6zequb-gYTdF2_ZEUtr8ywTXzLYtknzWU4nV8uVoo=".to_string(), | ||
); | ||
let rpc = Client::new(RPCBASE.to_string(), auth.clone()).unwrap(); | ||
|
||
let offer_rpc = get_new_wallet_rpc(&rpc, LOCALPARTY, auth.clone()); | ||
let accept_rpc = get_new_wallet_rpc(&rpc, REMOTEPARTY, auth.clone()); | ||
let sink_rpc = get_new_wallet_rpc(&rpc, SINK, auth.clone()); | ||
|
||
let offer_address = offer_rpc | ||
.get_new_address(None, Some(AddressType::Bech32)) | ||
.unwrap(); | ||
let accept_address = accept_rpc | ||
.get_new_address(None, Some(AddressType::Bech32)) | ||
.unwrap(); | ||
let sink_address = sink_rpc | ||
.get_new_address(None, Some(AddressType::Bech32)) | ||
.unwrap(); | ||
|
||
sink_rpc.generate_to_address(1, &offer_address).unwrap(); | ||
sink_rpc.generate_to_address(1, &accept_address).unwrap(); | ||
sink_rpc.generate_to_address(100, &sink_address).unwrap(); | ||
|
||
( | ||
offer_rpc, | ||
accept_rpc, | ||
Box::new(move |nb_blocks| { | ||
sink_rpc | ||
.generate_to_address(nb_blocks, &sink_address) | ||
.unwrap(); | ||
}), | ||
) | ||
} | ||
|
||
fn generate_dlc_parameters<'a, C: secp256k1::Signing>( | ||
rpc: &Client, | ||
secp: &secp256k1::Secp256k1<C>, | ||
collateral: u64, | ||
) -> (PartyParams, SecretKey, SecretKey) { | ||
let change_address = rpc | ||
.get_new_address(None, Some(AddressType::Bech32)) | ||
.unwrap(); | ||
let final_address = rpc | ||
.get_new_address(None, Some(AddressType::Bech32)) | ||
.unwrap(); | ||
let fund_address = rpc | ||
.get_new_address(None, Some(AddressType::Bech32)) | ||
.unwrap(); | ||
let fund_priv_key = rpc.dump_private_key(&fund_address).unwrap().key; | ||
let mut utxos = rpc | ||
.list_unspent(None, None, None, Some(false), None) | ||
.unwrap(); | ||
let utxo = utxos.pop().unwrap(); | ||
let input_sk = { | ||
let address = utxo.address.clone().unwrap(); | ||
let privkey = rpc.dump_private_key(&address).unwrap(); | ||
privkey.key | ||
}; | ||
( | ||
PartyParams { | ||
fund_pubkey: PublicKey::from_secret_key(secp, &fund_priv_key), | ||
change_script_pubkey: change_address.script_pubkey(), | ||
final_script_pubkey: final_address.script_pubkey(), | ||
inputs: vec![TxInputInfo { | ||
outpoint: OutPoint { | ||
txid: utxo.txid, | ||
vout: utxo.vout, | ||
}, | ||
max_witness_len: dlc::P2WPKH_WITNESS_SIZE, | ||
redeem_script: Script::new(), | ||
}], | ||
input_amount: utxo.amount.as_sat(), | ||
collateral, | ||
}, | ||
fund_priv_key, | ||
input_sk, | ||
) | ||
} | ||
|
||
#[derive(PartialEq)] | ||
enum TestCase { | ||
Close, | ||
Refund, | ||
} | ||
|
||
#[test] | ||
#[ignore] | ||
fn integration_tests_close() { | ||
integration_tests_common(TestCase::Close); | ||
} | ||
|
||
#[test] | ||
#[ignore] | ||
fn integration_tests_refund() { | ||
integration_tests_common(TestCase::Refund); | ||
} | ||
|
||
fn integration_tests_common(test_case: TestCase) { | ||
let secp = secp256k1::Secp256k1::new(); | ||
let rng = &mut thread_rng(); | ||
let (oracle_kp, oracle_pubkey) = secp.generate_schnorrsig_keypair(rng); | ||
let mut oracle_k_value = [0u8; 32]; | ||
rng.fill_bytes(&mut oracle_k_value); | ||
let oracle_r_kp = | ||
secp256k1::schnorrsig::KeyPair::from_seckey_slice(&secp, &oracle_k_value).unwrap(); | ||
|
||
let oracle_r_value = SchnorrPublicKey::from_keypair(&secp, &oracle_r_kp); | ||
let (offer_rpc, accept_rpc, generate_blocks) = init(); | ||
|
||
let (offer_params, offer_fund_sk, offer_input_sk) = | ||
generate_dlc_parameters(&offer_rpc, &secp, PARTY_COLLATERAL); | ||
let (accept_params, accept_fund_sk, accept_input_sk) = | ||
generate_dlc_parameters(&accept_rpc, &secp, PARTY_COLLATERAL); | ||
|
||
let mut dlc_txs = dlc::create_dlc_transactions( | ||
&offer_params, | ||
&accept_params, | ||
&outcomes(), | ||
REFUND_LOCK_TIME, | ||
2, | ||
FUND_LOCK_TIME, | ||
CET_LOCK_TIME, | ||
) | ||
.expect("Error creating dlc transactions."); | ||
|
||
let funding_script_pubkey = | ||
dlc::make_funding_redeemscript(&offer_params.fund_pubkey, &accept_params.fund_pubkey); | ||
let fund_output_value = dlc_txs.fund.output[0].value; | ||
let msgs = hashed_msg(); | ||
let accept_sig = { | ||
let mut offer_cets_sigs = dlc_txs.cets.iter().zip(&msgs).map(|z| { | ||
( | ||
z, | ||
dlc::create_cet_adaptor_sig_from_oracle_info( | ||
&secp, | ||
&z.0, | ||
&oracle_pubkey, | ||
&oracle_r_value, | ||
&offer_fund_sk, | ||
&funding_script_pubkey, | ||
fund_output_value, | ||
z.1, | ||
) | ||
.expect("Error creating adaptor sig"), | ||
) | ||
}); | ||
let mut accept_cets_sigs = dlc_txs.cets.iter().zip(&msgs).map(|z| { | ||
( | ||
z, | ||
dlc::create_cet_adaptor_sig_from_oracle_info( | ||
&secp, | ||
&z.0, | ||
&oracle_pubkey, | ||
&oracle_r_value, | ||
&accept_fund_sk, | ||
&funding_script_pubkey, | ||
fund_output_value, | ||
z.1, | ||
) | ||
.expect("Error creating adaptor sig"), | ||
) | ||
}); | ||
|
||
assert!( | ||
offer_cets_sigs.all(|z| dlc::verify_cet_adaptor_sig_from_oracle_info( | ||
&secp, | ||
&(z.1).0, | ||
&(z.1).1, | ||
&(z.0).0, | ||
&oracle_pubkey, | ||
&oracle_r_value, | ||
&offer_params.fund_pubkey, | ||
&funding_script_pubkey, | ||
fund_output_value, | ||
&(z.0).1 | ||
) | ||
.is_ok()) | ||
); | ||
|
||
assert!(accept_cets_sigs | ||
.clone() | ||
.all(|z| dlc::verify_cet_adaptor_sig_from_oracle_info( | ||
&secp, | ||
&(z.1).0, | ||
&(z.1).1, | ||
&(z.0).0, | ||
&oracle_pubkey, | ||
&oracle_r_value, | ||
&accept_params.fund_pubkey, | ||
&funding_script_pubkey, | ||
fund_output_value, | ||
&(z.0).1 | ||
) | ||
.is_ok())); | ||
accept_cets_sigs.nth(0).unwrap().1 | ||
}; | ||
|
||
let oracle_sig = secp.schnorrsig_sign_with_nonce(&msgs[0], &oracle_kp, &oracle_k_value); | ||
|
||
assert!(dlc::sign_cet( | ||
&secp, | ||
&mut dlc_txs.cets[0], | ||
&accept_sig.0, | ||
&oracle_sig, | ||
&offer_fund_sk, | ||
&PublicKey::from_secret_key(&secp, &accept_fund_sk), | ||
&funding_script_pubkey, | ||
fund_output_value, | ||
) | ||
.is_ok()); | ||
|
||
dlc::util::sign_p2wpkh_input( | ||
&secp, | ||
&offer_input_sk, | ||
&mut dlc_txs.fund, | ||
0, | ||
SigHashType::All, | ||
offer_params.input_amount, | ||
); | ||
|
||
dlc::util::sign_p2wpkh_input( | ||
&secp, | ||
&accept_input_sk, | ||
&mut dlc_txs.fund, | ||
1, | ||
SigHashType::All, | ||
accept_params.input_amount, | ||
); | ||
|
||
let go_to_height = |height: u64| { | ||
let block_count = offer_rpc.get_block_count().unwrap(); | ||
|
||
generate_blocks(height - block_count); | ||
}; | ||
|
||
// Should not be able to broadcast before fund lock time | ||
assert!(offer_rpc.send_raw_transaction(&dlc_txs.fund).is_err()); | ||
|
||
go_to_height(FUND_LOCK_TIME as u64); | ||
|
||
assert!(offer_rpc.send_raw_transaction(&dlc_txs.fund).is_ok()); | ||
|
||
generate_blocks(1); | ||
|
||
if test_case == TestCase::Close { | ||
// Should not be able to broadcast before cet lock time | ||
assert!(offer_rpc.send_raw_transaction(&dlc_txs.cets[0]).is_err()); | ||
|
||
go_to_height(CET_LOCK_TIME as u64); | ||
|
||
assert!(offer_rpc.send_raw_transaction(&dlc_txs.cets[0]).is_ok()); | ||
} else { | ||
let offer_refund_sig = dlc::util::get_raw_sig_for_tx_input( | ||
&secp, | ||
&dlc_txs.refund, | ||
0, | ||
&funding_script_pubkey, | ||
dlc_txs.fund.output[0].value, | ||
&offer_fund_sk, | ||
); | ||
|
||
dlc::util::sign_multi_sig_input( | ||
&secp, | ||
&mut dlc_txs.refund, | ||
&offer_refund_sig, | ||
&PublicKey::from_secret_key(&secp, &offer_fund_sk), | ||
&accept_fund_sk, | ||
&funding_script_pubkey, | ||
dlc_txs.fund.output[0].value, | ||
0, | ||
); | ||
|
||
// Should not be able to broadcast before refund lock time | ||
assert!(offer_rpc.send_raw_transaction(&dlc_txs.refund).is_err()); | ||
|
||
go_to_height(REFUND_LOCK_TIME as u64); | ||
|
||
assert!(offer_rpc.send_raw_transaction(&dlc_txs.refund).is_ok()); | ||
} | ||
} |
Oops, something went wrong.