mirror of
https://github.com/ilyakooo0/urbit.git
synced 2024-12-20 13:22:07 +03:00
846 lines
27 KiB
Plaintext
846 lines
27 KiB
Plaintext
/+ *test, naive, ethereum, azimuth
|
|
|%
|
|
++ address @ux
|
|
++ n |=([=^state:naive =^input:naive] (%*(. naive lac |) verifier 1.337 +<))
|
|
:: TODO: does this uniquely produce the pubkey?
|
|
::
|
|
++ verifier
|
|
^- ^verifier:naive
|
|
|= [dat=octs v=@ r=@ s=@]
|
|
?: (gth v 3) ~ :: TODO: move to jet
|
|
=/ result
|
|
%- mule
|
|
|.
|
|
=, secp256k1:secp:crypto
|
|
%- address-from-pub:key:ethereum
|
|
%- serialize-point
|
|
(ecdsa-raw-recover (keccak-256:keccak:crypto dat) v r s)
|
|
?- -.result
|
|
%| ~
|
|
%& `p.result
|
|
==
|
|
::
|
|
++ addr address-from-prv:key:ethereum
|
|
::
|
|
++ log
|
|
|= [log-name=@ux data=@ux topics=(lest @)]
|
|
^- ^input:naive
|
|
[%log *@ux data log-name topics]
|
|
::
|
|
:: ~bud is so that we aren't testing something impossible in Azimuth, like a star spawned before its sponsor galaxy
|
|
::
|
|
++ init-bud
|
|
|= =^state:naive
|
|
^- [effects:naive ^state:naive]
|
|
(n state (owner-changed:l1 ~bud (addr ~bud)))
|
|
::
|
|
:: ~dopbud is for testing L1 ownership with L2 spawn proxy
|
|
::
|
|
++ init-dopbud
|
|
|= =^state:naive
|
|
^- [effects:naive ^state:naive]
|
|
=^ f1 state (init-bud state)
|
|
=^ f2 state (n state (owner-changed:l1 ~dopbud (addr %dopbud-key-0)))
|
|
=^ f3 state (n state (changed-spawn-proxy:l1 ~dopbud deposit-address:naive))
|
|
[:(welp f1 f2 f3) state]
|
|
::
|
|
:: ~marbud is for testing L2 ownership
|
|
::
|
|
++ init-marbud
|
|
|= =^state:naive
|
|
^- [effects:naive ^state:naive]
|
|
=^ f1 state (init-bud state)
|
|
=^ f2 state (n state (owner-changed:l1 ~marbud (addr %marbud-key-0)))
|
|
=^ f3 state (n state (owner-changed:l1 ~marbud deposit-address:naive))
|
|
[:(welp f1 f2 f3) state]
|
|
::
|
|
:: ~litbud is for testing L2 sponsorship
|
|
::
|
|
++ init-litbud
|
|
|= =^state:naive
|
|
^- [effects:naive ^state:naive]
|
|
:: ~bud should already be spawned, though trying to init ~bud again shouldn't matter i think?
|
|
:: =^ f1 state (init-bud state)
|
|
=^ f2 state (n state (owner-changed:l1 ~litbud (addr %litbud-key-0)))
|
|
=^ f3 state (n state (owner-changed:l1 ~litbud deposit-address:naive))
|
|
[:(welp f2 f3) state]
|
|
::
|
|
:: ~sambud is for testing L1 stars attempting L2 actions
|
|
::
|
|
++ init-sambud
|
|
|= =^state:naive
|
|
^- [effects:naive ^state:naive]
|
|
=^ f1 state (init-bud state)
|
|
=^ f2 state (n state (owner-changed:l1 ~sambud (addr %sambud-key-0)))
|
|
[:(welp f1 f2) state]
|
|
::
|
|
++ sign-tx
|
|
|= [pk=@ nonce=@ud tx=octs] ^- octs
|
|
=/ prepared-data (prepare-for-sig 1.337 nonce tx)
|
|
=/ sign-data
|
|
=/ len (rsh [3 2] (scot %ui p.prepared-data))
|
|
%- keccak-256:keccak:crypto
|
|
%: cad:naive 3
|
|
26^'\19Ethereum Signed Message:\0a'
|
|
(met 3 len)^len
|
|
prepared-data
|
|
~
|
|
==
|
|
=+ (ecdsa-raw-sign:secp256k1:secp:crypto sign-data pk)
|
|
(cad:naive 3 1^v 32^s 32^r tx ~)
|
|
::
|
|
++ prepare-for-sig
|
|
|= [chain-id=@ud nonce=@ud tx=octs]
|
|
^- octs
|
|
=/ chain-t (rsh [3 2] (scot %ui chain-id))
|
|
%: cad:naive 3
|
|
14^'UrbitIDV1Chain'
|
|
(met 3 chain-t)^chain-t
|
|
1^':'
|
|
4^nonce
|
|
tx
|
|
~
|
|
==
|
|
::
|
|
++ l1
|
|
|%
|
|
::
|
|
:: Azimuth.sol events
|
|
::
|
|
++ owner-changed
|
|
|= [=ship =address]
|
|
(log owner-changed:log-names:naive *@ux ship address ~)
|
|
::
|
|
:: TODO: Activated (not in lib/naive.hoon)
|
|
:: TODO: Spawned (not in lib/naive.hoon)
|
|
::
|
|
++ escape-requested
|
|
|= [escapee=ship parent=ship]
|
|
(log escape-requested:log-names:naive *@ux escapee parent ~)
|
|
::
|
|
++ escape-canceled
|
|
:: The parent is pinned but not used in lib/naive.hoon for some reason
|
|
|= [escapee=ship parent=ship]
|
|
(log escape-canceled:log-names:naive *@ux escapee parent ~)
|
|
::
|
|
++ escape-accepted
|
|
|= [escapee=ship parent=ship]
|
|
(log escape-accepted:log-names:naive *@ux escapee parent ~)
|
|
::
|
|
++ lost-sponsor
|
|
|= [lost=ship parent=ship]
|
|
(log lost-sponsor:log-names:naive *@ux lost parent ~)
|
|
::
|
|
++ changed-keys
|
|
|= [=ship encr=@ auth=@ suite=@ life=@]
|
|
=/ keys=@ux
|
|
%: can 8
|
|
1^life
|
|
1^suite
|
|
1^auth
|
|
1^encr
|
|
~
|
|
==
|
|
(log changed-keys:log-names:naive keys ship ~)
|
|
::
|
|
++ broke-continuity
|
|
|= [=ship rift=@]
|
|
(log broke-continuity:log-names:naive rift ship ~)
|
|
::
|
|
++ changed-spawn-proxy
|
|
|= [=ship =address]
|
|
(log changed-spawn-proxy:log-names:naive *@ux ship address ~)
|
|
::
|
|
++ changed-transfer-proxy
|
|
|= [=ship =address]
|
|
(log changed-transfer-proxy:log-names:naive *@ux ship address ~)
|
|
::
|
|
++ changed-management-proxy
|
|
|= [=ship =address]
|
|
(log changed-management-proxy:log-names:naive *@ux ship address ~)
|
|
::
|
|
++ changed-voting-proxy
|
|
|= [=ship =address]
|
|
(log changed-voting-proxy:log-names:naive *@ux ship address ~)
|
|
::
|
|
:: TODO: ChangedDns (lib/naive still has TODOs)
|
|
::
|
|
:: Ecliptic.sol events
|
|
::
|
|
++ approval-for-all
|
|
|= [owner=address operator=address approved=@]
|
|
(log approval-for-all:log-names:naive approved owner operator ~)
|
|
::
|
|
--
|
|
::
|
|
++ l2
|
|
::
|
|
|%
|
|
::
|
|
++ spawn
|
|
|= [nonce=@ud parent=ship pk=@ proxy=@tas child=ship =address] ^- octs
|
|
%^ sign-tx pk nonce
|
|
%: cad:naive 3
|
|
(from-proxy:bits proxy)
|
|
4^parent
|
|
1^%1 :: %spawn
|
|
4^child
|
|
20^address
|
|
~
|
|
==
|
|
::
|
|
++ transfer-point
|
|
|= [nonce=@ud =ship pk=@ =address proxy=@tas reset=?] ^- octs
|
|
%^ sign-tx pk nonce
|
|
%: cad:naive 3
|
|
(from-proxy:bits proxy)
|
|
4^ship
|
|
1^(can 0 7^%0 1^reset ~) :: %transfer-point
|
|
20^address
|
|
~
|
|
==
|
|
::
|
|
++ configure-keys
|
|
|= $: nonce=@ud =ship pk=@ proxy=@tas
|
|
breach=? encrypt=@ auth=@ crypto-suite=@
|
|
==
|
|
^- octs
|
|
%^ sign-tx pk nonce
|
|
%: cad:naive 3
|
|
(from-proxy:bits proxy)
|
|
4^ship
|
|
1^(can 0 7^%2 1^breach ~) :: %configure-keys
|
|
32^encrypt
|
|
32^auth
|
|
4^crypto-suite
|
|
~
|
|
==
|
|
::
|
|
++ escape
|
|
|= [nonce=@ud child=ship pk=@ proxy=@tas parent=ship] ^- octs
|
|
%^ sign-tx pk nonce
|
|
(take-escape:bits %escape child proxy parent)
|
|
::
|
|
++ cancel-escape
|
|
|= [nonce=@ud child=ship pk=@ proxy=@tas parent=ship] ^- octs
|
|
%^ sign-tx pk nonce
|
|
(take-escape:bits %cancel-escape child proxy parent)
|
|
::
|
|
++ adopt
|
|
|= [nonce=@ud parent=ship pk=@ proxy=@tas child=ship] ^- octs
|
|
%^ sign-tx pk nonce
|
|
(take-escape:bits %adopt parent proxy child)
|
|
::
|
|
++ reject
|
|
|= [nonce=@ud parent=ship pk=@ proxy=@tas child=ship] ^- octs
|
|
%^ sign-tx pk nonce
|
|
(take-escape:bits %reject parent proxy child)
|
|
::
|
|
++ detach
|
|
|= [nonce=@ud parent=ship pk=@ proxy=@tas child=ship] ^- octs
|
|
%^ sign-tx pk nonce
|
|
(take-escape:bits %detach parent proxy child)
|
|
::
|
|
++ set-management-proxy
|
|
|= [nonce=@ud =ship pk=@ proxy=@tas =address] ^- octs
|
|
%^ sign-tx pk nonce
|
|
^- octs
|
|
(take-ship-address:bits %set-management-proxy ship proxy address)
|
|
::
|
|
++ set-spawn-proxy
|
|
|= [nonce=@ud =ship pk=@ proxy=@tas =address] ^- octs
|
|
%^ sign-tx pk nonce
|
|
(take-ship-address:bits %set-spawn-proxy ship proxy address)
|
|
::
|
|
++ set-transfer-proxy
|
|
|= [nonce=@ud =ship pk=@ proxy=@tas =address] ^- octs
|
|
%^ sign-tx pk nonce
|
|
(take-ship-address:bits %set-transfer-proxy ship proxy address)
|
|
::
|
|
++ bits
|
|
::
|
|
|%
|
|
::
|
|
:: TODO: Shouldn't need to pass all these arguments along - they should already be in the subject somewhere
|
|
::
|
|
++ take-escape
|
|
|= [action=@tas from=ship proxy=@tas other=ship] ^- octs
|
|
=/ op
|
|
?+ action !!
|
|
%escape %3
|
|
%cancel-escape %4
|
|
%adopt %5
|
|
%reject %6
|
|
%detach %7
|
|
==
|
|
%: cad:naive 3
|
|
(from-proxy proxy)
|
|
4^from
|
|
1^(can 0 7^op 1^0 ~)
|
|
4^other
|
|
~
|
|
==
|
|
::
|
|
++ take-ship-address
|
|
|= [action=@tas from=ship proxy=@tas =address] ^- octs
|
|
=/ op
|
|
?+ action !!
|
|
%set-management-proxy %8
|
|
%set-spawn-proxy %9
|
|
%set-transfer-proxy %10
|
|
==
|
|
%: cad:naive 3
|
|
(from-proxy proxy)
|
|
4^from
|
|
1^(can 0 7^op 1^0 ~)
|
|
20^address
|
|
~
|
|
==
|
|
::
|
|
++ from-proxy
|
|
|= prx=@tas
|
|
^- [@ @]
|
|
=/ proxy
|
|
?+ prx !!
|
|
%own %0
|
|
%spawn %1
|
|
%manage %2
|
|
%vote %3
|
|
%transfer %4
|
|
==
|
|
1^(can 0 3^proxy 5^0 ~)
|
|
::
|
|
--
|
|
::
|
|
--
|
|
::
|
|
--
|
|
::
|
|
:: Keys
|
|
::
|
|
|%
|
|
::
|
|
++ encr (shax 'You will forget that you ever read this sentence.')
|
|
++ auth (shax 'You cant know that this sentence is true.')
|
|
++ suit 1
|
|
::
|
|
--
|
|
::
|
|
:: Tests
|
|
::
|
|
|%
|
|
::
|
|
:: TODO: Factor out commonly used things like keys and addresses
|
|
::
|
|
++ test-log ^- tang
|
|
%+ expect-eq
|
|
!>
|
|
:- [%point ~bud %owner 0x123]~
|
|
:_ [~ ~] :_ [~ ~]
|
|
:- ~bud
|
|
%*(. *point:naive dominion %l1, owner.own 0x123^0, who.sponsor.net ~bud)
|
|
::
|
|
!>
|
|
%^ naive verifier 1.337 :- *^state:naive
|
|
:* %log *@ux *@ux
|
|
owner-changed:log-names:naive (@ux ~bud) 0x123 ~
|
|
==
|
|
::
|
|
++ test-deposit ^- tang
|
|
%+ expect-eq
|
|
!> %l2
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
dominion:(~(got by points.state) ~marbud)
|
|
::
|
|
++ test-batch ^- tang
|
|
%+ expect-eq
|
|
!> [0x234 2]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~marbud %marbud-key-0 (addr %marbud-key-0) %own |))
|
|
=^ f state (n state %bat q:(transfer-point:l2 1 ~marbud %marbud-key-0 0x234 %own |))
|
|
owner.own:(~(got by points.state) ~marbud)
|
|
::
|
|
++ test-l1-changed-spawn-proxy ^- tang
|
|
%+ expect-eq
|
|
!> [0x123 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-bud state)
|
|
=^ f state (n state (changed-spawn-proxy:l1 ~bud 0x123))
|
|
spawn-proxy.own:(~(got by points.state) ~bud)
|
|
::
|
|
++ test-l1-changed-transfer-proxy ^- tang
|
|
%+ expect-eq
|
|
!> [0x123 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-bud state)
|
|
=^ f state (n state (changed-transfer-proxy:l1 ~bud 0x123))
|
|
transfer-proxy.own:(~(got by points.state) ~bud)
|
|
::
|
|
++ test-l1-changed-management-proxy ^- tang
|
|
%+ expect-eq
|
|
!> [0x123 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-bud state)
|
|
=^ f state (n state (changed-management-proxy:l1 ~bud 0x123))
|
|
management-proxy.own:(~(got by points.state) ~bud)
|
|
::
|
|
++ test-l1-changed-voting-proxy ^- tang
|
|
%+ expect-eq
|
|
!> [0x123 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-bud state)
|
|
=^ f state (n state (changed-voting-proxy:l1 ~bud 0x123))
|
|
voting-proxy.own:(~(got by points.state) ~bud)
|
|
::
|
|
++ test-l1-changed-keys ^- tang
|
|
=/ life 1
|
|
=/ new-keys [~bud encr auth suit life]
|
|
%+ expect-eq
|
|
!> [suit auth encr]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-bud state)
|
|
=^ f state (n state (changed-keys:l1 new-keys))
|
|
|1:keys.net:(~(got by points.state) ~bud)
|
|
::
|
|
++ test-l2-set-spawn-proxy ^- tang
|
|
%+ expect-eq
|
|
!> [0x123 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(set-spawn-proxy:l2 0 ~marbud %marbud-key-0 %own 0x123))
|
|
spawn-proxy.own:(~(got by points.state) ~marbud)
|
|
::
|
|
++ test-l2-set-transfer-proxy ^- tang
|
|
%+ expect-eq
|
|
!> [0x123 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(set-transfer-proxy:l2 0 ~marbud %marbud-key-0 %own 0x123))
|
|
transfer-proxy.own:(~(got by points.state) ~marbud)
|
|
::
|
|
++ test-l2-set-management-proxy ^- tang
|
|
%+ expect-eq
|
|
!> [0x123 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(set-management-proxy:l2 0 ~marbud %marbud-key-0 %own 0x123))
|
|
management-proxy.own:(~(got by points.state) ~marbud)
|
|
::
|
|
++ test-l2-spawn-proxy-deposit ^- tang
|
|
%+ expect-eq
|
|
!> %spawn
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-dopbud state)
|
|
dominion:(~(got by points.state) ~dopbud)
|
|
::
|
|
++ test-marbud-l2-spawn ^- tang
|
|
%+ expect-eq
|
|
!> [`@ux`(addr %ll-key-0) 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~marbud %marbud-key-0 %own ~linnup-torsyx (addr %ll-key-0)))
|
|
transfer-proxy.own:(~(got by points.state) ~linnup-torsyx)
|
|
::
|
|
++ test-marbud-l2-spawn-w-proxy ^- tang
|
|
%+ expect-eq
|
|
!> [`@ux`(addr %ll-key-0) 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(set-spawn-proxy:l2 0 ~marbud %marbud-key-0 %own (addr %marbud-spn)))
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~marbud %marbud-spn %spawn ~linnup-torsyx (addr %ll-key-0)))
|
|
transfer-proxy.own:(~(got by points.state) ~linnup-torsyx)
|
|
::
|
|
++ test-marbud-l2-change-keys
|
|
=/ new-keys-own [~marbud %marbud-key-0 %own | encr auth suit]
|
|
=/ new-keys-mgt [~marbud %marbud-mgt %manage | encr auth suit]
|
|
=/ mgt-proxy [~marbud %marbud-key-0 %own (addr %marbud-mgt)]
|
|
;: weld
|
|
%+ expect-eq
|
|
!> [suit auth encr]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(configure-keys:l2 0 new-keys-own))
|
|
|1:keys.net:(~(got by points.state) ~marbud)
|
|
::
|
|
%+ expect-eq
|
|
!> [suit auth encr]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(set-management-proxy:l2 0 mgt-proxy))
|
|
=^ f state (n state %bat q:(configure-keys:l2 0 new-keys-mgt))
|
|
|1:keys.net:(~(got by points.state) ~marbud)
|
|
::
|
|
:: TODO: make sure nobody else can change these keys
|
|
==
|
|
::
|
|
:: TODO: transfer breach via transfer proxy
|
|
++ test-marbud-l2-transfer-breach ^- tang
|
|
=/ new-keys [~marbud %marbud-key-0 %own | encr auth suit]
|
|
;: weld
|
|
%+ expect-eq
|
|
:: Tests that proxies are reset on transfer breach
|
|
!>
|
|
:* [(addr %marbud-key-1) 3] :: ownership
|
|
[0 0] :: spawn-proxy
|
|
[0 0] :: management-proxy
|
|
[0 0] :: voting-proxy
|
|
[0 1] :: transfer-proxy
|
|
==
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(set-spawn-proxy:l2 0 ~marbud %marbud-key-0 %own 0x123))
|
|
=^ f state (n state %bat q:(set-management-proxy:l2 1 ~marbud %marbud-key-0 %own 0x234))
|
|
=^ f state (n state %bat q:(set-transfer-proxy:l2 2 ~marbud %marbud-key-0 %own (addr %marbud-key-1)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~marbud %marbud-key-1 (addr %marbud-key-1) %transfer &))
|
|
^- [[@ @] [@ @] [@ @] [@ @] [@ @]]
|
|
own:(~(got by points.state) ~marbud)
|
|
::
|
|
%+ expect-eq
|
|
:: Tests that networking keys are reset on transfer breach
|
|
!>
|
|
[0 0 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(configure-keys:l2 0 new-keys))
|
|
=^ f state (n state %bat q:(transfer-point:l2 1 ~marbud %marbud-key-0 (addr %marbud-key-0) %own &))
|
|
|1:keys.net:(~(got by points.state) ~marbud)
|
|
==
|
|
::
|
|
++ test-marbud-l2-transfer-no-breach ^- tang
|
|
=/ new-keys [~marbud %marbud-key-0 %own | encr auth suit]
|
|
;: weld
|
|
%+ expect-eq
|
|
:: Tests that proxies are not reset when transfering with no breach
|
|
!>
|
|
:* [(addr %marbud-key-1) 3] :: ownership
|
|
[`@`0x123 0] :: spawn-proxy
|
|
[`@`0x234 0] :: management-proxy
|
|
[0 0] :: voting-proxy
|
|
[0 1] :: transfer-proxy
|
|
==
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(set-spawn-proxy:l2 0 ~marbud %marbud-key-0 %own 0x123))
|
|
=^ f state (n state %bat q:(set-management-proxy:l2 1 ~marbud %marbud-key-0 %own 0x234))
|
|
=^ f state (n state %bat q:(set-transfer-proxy:l2 2 ~marbud %marbud-key-0 %own (addr %marbud-key-1)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~marbud %marbud-key-1 (addr %marbud-key-1) %transfer |))
|
|
^- [[@ @] [@ @] [@ @] [@ @] [@ @]]
|
|
own:(~(got by points.state) ~marbud)
|
|
::
|
|
%+ expect-eq
|
|
:: Tests that networking keys are not reset when transfering with no breach
|
|
!>
|
|
[suit auth encr]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(configure-keys:l2 0 new-keys))
|
|
=^ f state (n state %bat q:(transfer-point:l2 1 ~marbud %marbud-key-0 (addr %marbud-key-0) %own |))
|
|
|1:keys.net:(~(got by points.state) ~marbud)
|
|
==
|
|
::
|
|
:: TODO: life+rift changes via transfer proxy
|
|
::
|
|
++ test-marbud-keys-life-rift ^- tang
|
|
=/ new-keys-no-reset [~marbud %marbud-key-0 %own | encr auth suit]
|
|
=/ new-keys-yes-reset [~marbud %marbud-key-0 %own & encr auth suit]
|
|
=/ zero-keys-no-reset [~marbud %marbud-key-0 %own | 0 0 0]
|
|
=/ zero-keys-yes-reset [~marbud %marbud-key-0 %own & 0 0 0]
|
|
|
|
;: weld
|
|
%+ expect-eq
|
|
:: breach=%.n
|
|
!> [0 1] :: [rift life]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(configure-keys:l2 0 new-keys-no-reset))
|
|
[rift.net life.keys.net]:(~(got by points.state) ~marbud)
|
|
::
|
|
%+ expect-eq
|
|
:: breach=%.y
|
|
!> [1 1]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(configure-keys:l2 0 new-keys-yes-reset))
|
|
[rift.net life.keys.net]:(~(got by points.state) ~marbud)
|
|
::
|
|
%+ expect-eq
|
|
:: networking keys set incremenets life, reset=%.y
|
|
:: then zero keys and transfer, should increment rift but not life
|
|
::
|
|
!> [2 2]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(configure-keys:l2 0 new-keys-yes-reset)) :: inc life and rift
|
|
=^ f state (n state %bat q:(configure-keys:l2 1 zero-keys-no-reset)) :: inc life
|
|
=^ f state (n state %bat q:(configure-keys:l2 2 zero-keys-yes-reset)) :: inc rift
|
|
[rift.net life.keys.net]:(~(got by points.state) ~marbud)
|
|
::
|
|
==
|
|
::
|
|
++ test-marbud-transfer-life-rift ^- tang
|
|
=/ new-keys-no-reset [~marbud %marbud-key-0 %own | encr auth suit]
|
|
=/ new-keys-yes-reset [~marbud %marbud-key-0 %own & encr auth suit]
|
|
=/ zero-keys-no-reset [~marbud %marbud-key-0 %own | 0 0 0]
|
|
=/ zero-keys-yes-reset [~marbud %marbud-key-0 %own & 0 0 0]
|
|
;: weld
|
|
%+ expect-eq
|
|
:: networking keys not set, reset=%.n
|
|
::
|
|
!> [0 0] :: [rift life]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~marbud %marbud-key-0 (addr %marbud-key-1) %own |))
|
|
[rift.net life.keys.net]:(~(got by points.state) ~marbud)
|
|
::
|
|
%+ expect-eq
|
|
:: networking keys not set, reset=%.y
|
|
::
|
|
!> [0 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~marbud %marbud-key-0 (addr %marbud-key-1) %own &))
|
|
[rift.net life.keys.net]:(~(got by points.state) ~marbud)
|
|
::
|
|
%+ expect-eq
|
|
:: networking keys set incremenets life, reset=%.y
|
|
:: then zero keys and transfer, should increment rift but not life
|
|
:: TODO: transferring and reset with already zeroed keys ought to incr rift but not life, right?
|
|
:: but currently the transfer w/ reset increments both life and rift, despite keys already being 0
|
|
::
|
|
!> [2 2]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(configure-keys:l2 0 new-keys-yes-reset)) :: inc life and rift
|
|
=^ f state (n state %bat q:(configure-keys:l2 1 zero-keys-no-reset)) :: inc life
|
|
=^ f state (n state %bat q:(transfer-point:l2 2 ~marbud %marbud-key-0 (addr %marbud-key-1) %own &)) :: inc rift
|
|
[rift.net life.keys.net]:(~(got by points.state) ~marbud)
|
|
::
|
|
==
|
|
::
|
|
++ test-dopbud-l2-spawn ^- tang
|
|
%+ expect-eq
|
|
!> [`@ux`(addr %pp-key-0) 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-dopbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~dopbud %dopbud-key-0 %own ~palsep-picdun (addr %pp-key-0)))
|
|
transfer-proxy.own:(~(got by points.state) ~palsep-picdun)
|
|
::
|
|
++ test-dopbud-l2-spawn-after-transfer ^- tang
|
|
%+ expect-eq
|
|
!> [`@ux`(addr %lr-key-0) 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-dopbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~dopbud %dopbud-key-0 %own ~palsep-picdun (addr %pp-key-0)))
|
|
=^ f state (n state (owner-changed:l1 ~dopbud (addr %dopbud-key-1)))
|
|
=^ f state (n state %bat q:(spawn:l2 1 ~dopbud %dopbud-key-1 %own ~laclur-rachul (addr %lr-key-0)))
|
|
transfer-proxy.own:(~(got by points.state) ~laclur-rachul)
|
|
::
|
|
:: ++ test-sambud-double-spawn ^- tang
|
|
:: ::
|
|
:: :: TODO: Not sure of the right way to write this test yet. Current iteration
|
|
:: :: doesn't even compile
|
|
:: ::
|
|
:: %- expect-fail
|
|
:: |.
|
|
:: ?<
|
|
:: ?= [`@ux`(addr %ld-key-1) 0]
|
|
:: =| =^state:naive
|
|
:: =^ f state (init-sambud state)
|
|
:: =^ f state (n state (owner-changed:l1 ~lisdur-fodrys (addr %ld-key-0)))
|
|
:: =^ f state (n state (changed-spawn-proxy:l1 ~sambud deposit-address:naive))
|
|
:: =^ f state (n state %bat q:(spawn:l2 0 ~sambud %sambud-key-0 %own ~lisdur-fodrys (addr %ld-key-1)))
|
|
:: transfer-proxy.own:(~(got by points.state) ~lisdur-fodrys)
|
|
:: %.n
|
|
::
|
|
:: ++ test-sambud-double-spawn-w-proxy ^- tang
|
|
:: ::
|
|
:: :: Same confusion as above
|
|
:: ::
|
|
:: %- expect-fail
|
|
:: |.
|
|
:: =| =^state:naive
|
|
:: =^ f state (init-sambud state)
|
|
:: =^ f state (n state (owner-changed:l1 ~lisdur-fodrys (addr %ld-key-0)))
|
|
:: =^ f state (n state (owner-changed:l1 ~sambud deposit-address:naive))
|
|
:: =^ f state (n state %bat q:(spawn:l2 0 ~sambud %sambud-key-0 %own ~lisdur-fodrys (addr %ld-key-1)))
|
|
:: state
|
|
::
|
|
++ test-linnup-torsyx-l2-transfer-ownership ^- tang
|
|
%+ expect-eq
|
|
!> [`@ux`(addr %lt-key-0) 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~marbud %marbud-key-0 %own ~linnup-torsyx (addr %lt-key-0)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~linnup-torsyx %lt-key-0 (addr %lt-key-0) %transfer &))
|
|
owner.own:(~(got by points.state) ~linnup-torsyx)
|
|
::
|
|
++ test-palsep-picdun-l2-transfer-ownership ^- tang
|
|
%+ expect-eq
|
|
!> [`@ux`(addr %pp-key-0) 0]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-dopbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~dopbud %dopbud-key-0 %own ~palsep-picdun (addr %pp-key-0)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~palsep-picdun %pp-key-0 (addr %pp-key-0) %transfer &))
|
|
owner.own:(~(got by points.state) ~palsep-picdun)
|
|
::
|
|
++ test-linnup-torsyx-l2-escape-request ^- tang
|
|
:: TODO: Are you supposed to be able to request escape to a non-existent star?
|
|
%+ expect-eq
|
|
!> [~ ~litbud]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (init-litbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~marbud %marbud-key-0 %own ~linnup-torsyx (addr %lt-key-0)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~linnup-torsyx %lt-key-0 (addr %lt-key-0) %transfer &))
|
|
:: why is the nonce for the escape still 0?
|
|
=^ f state (n state %bat q:(escape:l2 0 ~linnup-torsyx %lt-key-0 %own ~litbud))
|
|
escape.net:(~(got by points.state) ~linnup-torsyx)
|
|
::
|
|
++ test-linnup-torsyx-l2-cancel-escape-request ^- tang
|
|
%+ expect-eq
|
|
!> ~
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (init-litbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~marbud %marbud-key-0 %own ~linnup-torsyx (addr %lt-key-0)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~linnup-torsyx %lt-key-0 (addr %lt-key-0) %transfer &))
|
|
=^ f state (n state %bat q:(escape:l2 0 ~linnup-torsyx %lt-key-0 %own ~litbud))
|
|
=^ f state (n state %bat q:(cancel-escape:l2 1 ~linnup-torsyx %lt-key-0 %own ~litbud))
|
|
escape.net:(~(got by points.state) ~linnup-torsyx)
|
|
::
|
|
++ test-linnup-torsyx-l2-adopt-accept ^- tang
|
|
%+ expect-eq
|
|
!> [~ %.y ~litbud]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (init-litbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~marbud %marbud-key-0 %own ~linnup-torsyx (addr %lt-key-0)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~linnup-torsyx %lt-key-0 (addr %lt-key-0) %transfer &))
|
|
=^ f state (n state %bat q:(escape:l2 0 ~linnup-torsyx %lt-key-0 %own ~litbud))
|
|
=^ f state (n state %bat q:(adopt:l2 0 ~litbud %litbud-key-0 %own ~linnup-torsyx))
|
|
[escape.net sponsor.net]:(~(got by points.state) ~linnup-torsyx)
|
|
::
|
|
++ test-linnup-torsyx-l2-adopt-reject ^- tang
|
|
:: TODO: at the moment the default sponsor is always ~zod, but it should probably
|
|
:: be ~marbud here
|
|
%+ expect-eq
|
|
!> ~
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (init-litbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~marbud %marbud-key-0 %own ~linnup-torsyx (addr %lt-key-0)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~linnup-torsyx %lt-key-0 (addr %lt-key-0) %transfer &))
|
|
=^ f state (n state %bat q:(escape:l2 0 ~linnup-torsyx %lt-key-0 %own ~litbud))
|
|
=^ f state (n state %bat q:(reject:l2 0 ~litbud %litbud-key-0 %own ~linnup-torsyx))
|
|
escape.net:(~(got by points.state) ~linnup-torsyx)
|
|
::
|
|
++ test-linnup-torsyx-l2-detach ^- tang
|
|
%+ expect-eq
|
|
!> [~ %.n ~marbud]
|
|
::
|
|
!>
|
|
=| =^state:naive
|
|
=^ f state (init-marbud state)
|
|
=^ f state (init-litbud state)
|
|
=^ f state (n state %bat q:(spawn:l2 0 ~marbud %marbud-key-0 %own ~linnup-torsyx (addr %lt-key-0)))
|
|
=^ f state (n state %bat q:(transfer-point:l2 0 ~linnup-torsyx %lt-key-0 (addr %lt-key-0) %transfer &))
|
|
=^ f state (n state %bat q:(detach:l2 1 ~marbud %marbud-key-0 %own ~linnup-torsyx))
|
|
[escape.net sponsor.net]:(~(got by points.state) ~linnup-torsyx)
|
|
::
|
|
:: TODO: signature format changed; regenerate
|
|
::
|
|
:: ++ test-metamask-signature ^- tang
|
|
:: =/ meta-owner=address
|
|
:: (hex-to-num:ethereum '0xb026b0AA6e686F2386051b31A03E5fB95513e1c0')
|
|
:: =/ tx 0x123.0000.0102.0a00.0001.0200
|
|
:: =/ sig
|
|
:: %- hex-to-num:ethereum
|
|
:: :: Must reverse endianness of tx to sign in metamask
|
|
:: ::
|
|
:: %^ cat 3
|
|
:: '0x5b85936ab7b9db8d72416648e6eb1b844a4545ddb7c7c646a74bc3a4fb001a2'
|
|
:: '8583bf12ca837b289036a6cc9e6359ed07dda2b87929b5dd7189a3057a395341f1c'
|
|
:: ::
|
|
:: %+ expect-eq
|
|
:: !> [0x123 0]
|
|
:: ::
|
|
:: !>
|
|
:: =| =^state:naive
|
|
:: =^ f state (init-marbud state)
|
|
:: :: =^ f state (n state %bat q:(transfer-point:l2 0 ~marbud (key ~marbud) %own &))
|
|
:: :: =^ f state (n state %bat q:(set-transfer-proxy:l2 1 ~marbud %own 0x123))
|
|
:: =^ f state
|
|
:: %^ n state %bat
|
|
:: q:(transfer-point:l2 0 ~marbud %marbud-key-0 meta-owner %own &)
|
|
:: =^ f state (n state %bat (cat 3 sig tx))
|
|
:: transfer-proxy.own:(~(got by points.state) ~marbud)
|
|
--
|