diff --git a/.circleci/config.yml b/.circleci/config.yml index 0062a9b32..5f77c5fde 100644 --- a/.circleci/config.yml +++ b/.circleci/config.yml @@ -1,5 +1,8 @@ version: 2.1 +orbs: + win: circleci/windows@5.0 + jobs: # All checks on the codebase that can run in parallel to build_shared_library libwasmvm_sanity: @@ -65,6 +68,44 @@ jobs: - libwasmvm/target/release/deps key: cargocache-v3-libwasmvm_sanity-rust:1.60.0-{{ checksum "libwasmvm/Cargo.lock" }} + # This performs all the Rust debug builds on Windows. Similar to libwasmvm_sanity + # but avoids duplicating things that are not platform dependent. + libwasmvm_sanity_windows: + executor: + name: win/default + shell: bash.exe + steps: + - checkout + - run: + name: Reset git config set by CircleCI to make Cargo work + command: git config --global --unset url.ssh://git@github.com.insteadof + - run: + name: Install Rust + command: | + set -o errexit + curl -sS --output rustup-init.exe https://static.rust-lang.org/rustup/dist/x86_64-pc-windows-msvc/rustup-init.exe + ./rustup-init.exe --no-modify-path --profile minimal --default-toolchain 1.60.0 -y + echo 'export PATH="$PATH;$USERPROFILE/.cargo/bin"' >> "$BASH_ENV" + - run: + name: Show Rust version information + command: rustc --version; cargo --version; rustup --version + - restore_cache: + keys: + - cachev4-libwasmvm_sanity_windows-rust:1.60.0-{{ checksum "libwasmvm/Cargo.lock" }} + - cachev4-libwasmvm_sanity_windows-rust:1.60.0- + - run: + name: Run unit tests + working_directory: libwasmvm + command: cargo test + - save_cache: + paths: + # ".." is the easiest way to get $HOME here (pwd is $HOME\project) + - ../.cargo/registry + - libwasmvm/target/debug/.fingerprint + - libwasmvm/target/debug/build + - libwasmvm/target/debug/deps + key: cachev4-libwasmvm_sanity_windows-rust:1.60.0-{{ checksum "libwasmvm/Cargo.lock" }} + libwasmvm_audit: docker: # The audit tool might use a more modern Rust version than the build jobs. See @@ -327,6 +368,7 @@ workflows: build_and_test: jobs: - libwasmvm_sanity + - libwasmvm_sanity_windows - libwasmvm_audit - format-go - wasmvm_no_cgo diff --git a/internal/api/bindings.h b/internal/api/bindings.h index 1d8c973e0..5f7e31f8b 100644 --- a/internal/api/bindings.h +++ b/internal/api/bindings.h @@ -313,6 +313,10 @@ struct UnmanagedVector save_wasm(struct cache_t *cache, struct ByteSliceView wasm, struct UnmanagedVector *error_msg); +void remove_wasm(struct cache_t *cache, + struct ByteSliceView checksum, + struct UnmanagedVector *error_msg); + struct UnmanagedVector load_wasm(struct cache_t *cache, struct ByteSliceView checksum, struct UnmanagedVector *error_msg); diff --git a/internal/api/lib.go b/internal/api/lib.go index c9e6eba09..b4d96d264 100644 --- a/internal/api/lib.go +++ b/internal/api/lib.go @@ -67,6 +67,17 @@ func StoreCode(cache Cache, wasm []byte) ([]byte, error) { return copyAndDestroyUnmanagedVector(checksum), nil } +func RemoveCode(cache Cache, checksum []byte) error { + cs := makeView(checksum) + defer runtime.KeepAlive(checksum) + errmsg := newUnmanagedVector(nil) + _, err := C.remove_wasm(cache.ptr, cs, &errmsg) + if err != nil { + return errorWithMessage(err, errmsg) + } + return nil +} + func GetCode(cache Cache, checksum []byte) ([]byte, error) { cs := makeView(checksum) defer runtime.KeepAlive(checksum) diff --git a/internal/api/lib_test.go b/internal/api/lib_test.go index 9e8c01652..9ea283519 100644 --- a/internal/api/lib_test.go +++ b/internal/api/lib_test.go @@ -15,7 +15,7 @@ import ( ) const ( - TESTING_FEATURES = "staking,stargate,iterator" + TESTING_FEATURES = "staking,stargate,iterator,cosmwasm_1_1,cosmwasm_1_2" TESTING_PRINT_DEBUG = false TESTING_GAS_LIMIT = uint64(500_000_000_000) // ~0.5ms TESTING_MEMORY_LIMIT = 32 // MiB @@ -72,6 +72,25 @@ func TestStoreCodeAndGetCode(t *testing.T) { require.Equal(t, wasm, code) } +func TestRemoveCode(t *testing.T) { + cache, cleanup := withCache(t) + defer cleanup() + + wasm, err := ioutil.ReadFile("../../testdata/hackatom.wasm") + require.NoError(t, err) + + checksum, err := StoreCode(cache, wasm) + require.NoError(t, err) + + // First removal works + err = RemoveCode(cache, checksum) + require.NoError(t, err) + + // Second removal fails + err = RemoveCode(cache, checksum) + require.ErrorContains(t, err, "Wasm file does not exist") +} + func TestStoreCodeFailsWithBadData(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() @@ -121,7 +140,7 @@ func TestPinErrors(t *testing.T) { 0x84, 0x22, 0x71, 0x04, } err = Pin(cache, unknownChecksum) - require.ErrorContains(t, err, "No such file or directory") + require.ErrorContains(t, err, "Error opening Wasm file for reading") } func TestUnpin(t *testing.T) { @@ -201,7 +220,7 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint32(0), metrics.HitsMemoryCache) require.Equal(t, uint32(1), metrics.HitsFsCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Instantiate 2 msg2 := []byte(`{"verifier": "fred", "beneficiary": "susi"}`) @@ -214,7 +233,7 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint32(1), metrics.HitsMemoryCache) require.Equal(t, uint32(1), metrics.HitsFsCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Pin err = Pin(cache, checksum) @@ -227,8 +246,8 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint32(1), metrics.HitsFsCache) require.Equal(t, uint64(1), metrics.ElementsPinnedMemoryCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizePinnedMemoryCache, 0.18) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizePinnedMemoryCache, 0.2) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Instantiate 3 msg3 := []byte(`{"verifier": "fred", "beneficiary": "bert"}`) @@ -243,8 +262,8 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint32(1), metrics.HitsFsCache) require.Equal(t, uint64(1), metrics.ElementsPinnedMemoryCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizePinnedMemoryCache, 0.18) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizePinnedMemoryCache, 0.2) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Unpin err = Unpin(cache, checksum) @@ -259,7 +278,7 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint64(0), metrics.ElementsPinnedMemoryCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) require.Equal(t, uint64(0), metrics.SizePinnedMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Instantiate 4 msg4 := []byte(`{"verifier": "fred", "beneficiary": "jeff"}`) @@ -275,7 +294,7 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint64(0), metrics.ElementsPinnedMemoryCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) require.Equal(t, uint64(0), metrics.SizePinnedMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) } func TestInstantiate(t *testing.T) { @@ -301,7 +320,7 @@ func TestInstantiate(t *testing.T) { res, cost, err := Instantiate(cache, checksum, env, info, msg, &igasMeter, store, api, &querier, TESTING_GAS_LIMIT, TESTING_PRINT_DEBUG) require.NoError(t, err) requireOkResponse(t, res, 0) - assert.Equal(t, uint64(0x1432036ec), cost) + assert.Equal(t, uint64(0x13a78a36c), cost) var result types.ContractResult err = json.Unmarshal(res, &result) @@ -313,7 +332,7 @@ func TestInstantiate(t *testing.T) { func TestExecute(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) gasMeter1 := NewMockGasMeter(TESTING_GAS_LIMIT) igasMeter1 := types.GasMeter(gasMeter1) @@ -332,7 +351,7 @@ func TestExecute(t *testing.T) { diff := time.Now().Sub(start) require.NoError(t, err) requireOkResponse(t, res, 0) - assert.Equal(t, uint64(0x1432036ec), cost) + assert.Equal(t, uint64(0x13a78a36c), cost) t.Logf("Time (%d gas): %s\n", cost, diff) // execute with the same store @@ -345,7 +364,7 @@ func TestExecute(t *testing.T) { res, cost, err = Execute(cache, checksum, env, info, []byte(`{"release":{}}`), &igasMeter2, store, api, &querier, TESTING_GAS_LIMIT, TESTING_PRINT_DEBUG) diff = time.Now().Sub(start) require.NoError(t, err) - assert.Equal(t, uint64(0x2335827f0), cost) + assert.Equal(t, uint64(0x222892d70), cost) t.Logf("Time (%d gas): %s\n", cost, diff) // make sure it read the balance properly and we got 250 atoms @@ -374,10 +393,68 @@ func TestExecute(t *testing.T) { assert.Equal(t, expectedData, result.Ok.Data) } +func TestExecutePanic(t *testing.T) { + cache, cleanup := withCache(t) + defer cleanup() + checksum := createCyberpunkContract(t, cache) + + maxGas := TESTING_GAS_LIMIT + gasMeter1 := NewMockGasMeter(maxGas) + igasMeter1 := types.GasMeter(gasMeter1) + // instantiate it with this store + store := NewLookup(gasMeter1) + api := NewMockAPI() + balance := types.Coins{types.NewCoin(250, "ATOM")} + querier := DefaultQuerier(MOCK_CONTRACT_ADDR, balance) + env := MockEnvBin(t) + info := MockInfoBin(t, "creator") + + res, _, err := Instantiate(cache, checksum, env, info, []byte(`{}`), &igasMeter1, store, api, &querier, maxGas, TESTING_PRINT_DEBUG) + require.NoError(t, err) + requireOkResponse(t, res, 0) + + // execute a panic + gasMeter2 := NewMockGasMeter(maxGas) + igasMeter2 := types.GasMeter(gasMeter2) + store.SetGasMeter(gasMeter2) + info = MockInfoBin(t, "fred") + res, _, err = Execute(cache, checksum, env, info, []byte(`{"panic":{}}`), &igasMeter2, store, api, &querier, maxGas, TESTING_PRINT_DEBUG) + require.ErrorContains(t, err, "RuntimeError: Aborted: panicked at 'This page intentionally faulted'") +} + +func TestExecuteUnreachable(t *testing.T) { + cache, cleanup := withCache(t) + defer cleanup() + checksum := createCyberpunkContract(t, cache) + + maxGas := TESTING_GAS_LIMIT + gasMeter1 := NewMockGasMeter(maxGas) + igasMeter1 := types.GasMeter(gasMeter1) + // instantiate it with this store + store := NewLookup(gasMeter1) + api := NewMockAPI() + balance := types.Coins{types.NewCoin(250, "ATOM")} + querier := DefaultQuerier(MOCK_CONTRACT_ADDR, balance) + env := MockEnvBin(t) + info := MockInfoBin(t, "creator") + + res, _, err := Instantiate(cache, checksum, env, info, []byte(`{}`), &igasMeter1, store, api, &querier, maxGas, TESTING_PRINT_DEBUG) + require.NoError(t, err) + requireOkResponse(t, res, 0) + + // execute a panic + gasMeter2 := NewMockGasMeter(maxGas) + igasMeter2 := types.GasMeter(gasMeter2) + store.SetGasMeter(gasMeter2) + info = MockInfoBin(t, "fred") + res, _, err = Execute(cache, checksum, env, info, []byte(`{"unreachable":{}}`), &igasMeter2, store, api, &querier, maxGas, TESTING_PRINT_DEBUG) + require.ErrorContains(t, err, "RuntimeError: unreachable") +} + func TestExecuteCpuLoop(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) gasMeter1 := NewMockGasMeter(TESTING_GAS_LIMIT) igasMeter1 := types.GasMeter(gasMeter1) @@ -396,7 +473,7 @@ func TestExecuteCpuLoop(t *testing.T) { diff := time.Now().Sub(start) require.NoError(t, err) requireOkResponse(t, res, 0) - assert.Equal(t, uint64(0x1432036ec), cost) + assert.Equal(t, uint64(0x13a78a36c), cost) t.Logf("Time (%d gas): %s\n", cost, diff) // execute a cpu loop @@ -416,7 +493,7 @@ func TestExecuteCpuLoop(t *testing.T) { func TestExecuteStorageLoop(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) maxGas := TESTING_GAS_LIMIT gasMeter1 := NewMockGasMeter(maxGas) @@ -456,7 +533,7 @@ func TestExecuteStorageLoop(t *testing.T) { func TestExecuteUserErrorsInApiCalls(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) maxGas := TESTING_GAS_LIMIT gasMeter1 := NewMockGasMeter(maxGas) @@ -487,7 +564,7 @@ func TestExecuteUserErrorsInApiCalls(t *testing.T) { func TestMigrate(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) gasMeter := NewMockGasMeter(TESTING_GAS_LIMIT) igasMeter := types.GasMeter(gasMeter) @@ -532,7 +609,7 @@ func TestMigrate(t *testing.T) { func TestMultipleInstances(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) // instance1 controlled by fred gasMeter1 := NewMockGasMeter(TESTING_GAS_LIMIT) @@ -547,7 +624,7 @@ func TestMultipleInstances(t *testing.T) { require.NoError(t, err) requireOkResponse(t, res, 0) // we now count wasm gas charges and db writes - assert.Equal(t, uint64(0x140fd2fdc), cost) + assert.Equal(t, uint64(0x138559c5c), cost) // instance2 controlled by mary gasMeter2 := NewMockGasMeter(TESTING_GAS_LIMIT) @@ -558,14 +635,14 @@ func TestMultipleInstances(t *testing.T) { res, cost, err = Instantiate(cache, checksum, env, info, msg, &igasMeter2, store2, api, &querier, TESTING_GAS_LIMIT, TESTING_PRINT_DEBUG) require.NoError(t, err) requireOkResponse(t, res, 0) - assert.Equal(t, uint64(0x142390b3c), cost) + assert.Equal(t, uint64(0x1399177bc), cost) // fail to execute store1 with mary - resp := exec(t, cache, checksum, "mary", store1, api, querier, 0x129b512e0) + resp := exec(t, cache, checksum, "mary", store1, api, querier, 0x1218ff5d0) require.Equal(t, "Unauthorized", resp.Err) // succeed to execute store1 with fred - resp = exec(t, cache, checksum, "fred", store1, api, querier, 0x23257cef0) + resp = exec(t, cache, checksum, "fred", store1, api, querier, 0x22188d470) require.Equal(t, "", resp.Err) require.Equal(t, 1, len(resp.Ok.Messages)) attributes := resp.Ok.Attributes @@ -574,7 +651,7 @@ func TestMultipleInstances(t *testing.T) { require.Equal(t, "bob", attributes[1].Value) // succeed to execute store2 with mary - resp = exec(t, cache, checksum, "mary", store2, api, querier, 0x232d7fb70) + resp = exec(t, cache, checksum, "mary", store2, api, querier, 0x2220900f0) require.Equal(t, "", resp.Err) require.Equal(t, 1, len(resp.Ok.Messages)) attributes = resp.Ok.Attributes @@ -586,7 +663,7 @@ func TestMultipleInstances(t *testing.T) { func TestSudo(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) gasMeter1 := NewMockGasMeter(TESTING_GAS_LIMIT) igasMeter1 := types.GasMeter(gasMeter1) @@ -774,10 +851,14 @@ func requireQueryOk(t *testing.T, res []byte) []byte { return result.Ok } -func createTestContract(t *testing.T, cache Cache) []byte { +func createHackatomContract(t *testing.T, cache Cache) []byte { return createContract(t, cache, "../../testdata/hackatom.wasm") } +func createCyberpunkContract(t *testing.T, cache Cache) []byte { + return createContract(t, cache, "../../testdata/cyberpunk.wasm") +} + func createQueueContract(t *testing.T, cache Cache) []byte { return createContract(t, cache, "../../testdata/queue.wasm") } @@ -813,7 +894,7 @@ func exec(t *testing.T, cache Cache, checksum []byte, signer types.HumanAddress, func TestQuery(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) // set up contract gasMeter1 := NewMockGasMeter(TESTING_GAS_LIMIT) @@ -856,7 +937,7 @@ func TestQuery(t *testing.T) { func TestHackatomQuerier(t *testing.T) { cache, cleanup := withCache(t) defer cleanup() - checksum := createTestContract(t, cache) + checksum := createHackatomContract(t, cache) // set up contract gasMeter := NewMockGasMeter(TESTING_GAS_LIMIT) diff --git a/lib.go b/lib.go index c693693ea..d70be746c 100644 --- a/lib.go +++ b/lib.go @@ -60,6 +60,10 @@ func (vm *VM) StoreCode(code WasmCode) (Checksum, error) { return api.StoreCode(vm.cache, code) } +func (vm *VM) RemoveCode(checksum Checksum) error { + return api.RemoveCode(vm.cache, checksum) +} + // GetCode will load the original Wasm code for the given checksum. // This will only succeed if that checksum was previously returned from // a call to StoreCode. diff --git a/lib_test.go b/lib_test.go index a2302b3d1..3bd53eb4b 100644 --- a/lib_test.go +++ b/lib_test.go @@ -114,6 +114,22 @@ func TestStoreCodeAndGet(t *testing.T) { require.Equal(t, WasmCode(wasm), code) } +func TestRemoveCode(t *testing.T) { + vm := withVM(t) + + wasm, err := ioutil.ReadFile(HACKATOM_TEST_CONTRACT) + require.NoError(t, err) + + checksum, err := vm.StoreCode(wasm) + require.NoError(t, err) + + err = vm.RemoveCode(checksum) + require.NoError(t, err) + + err = vm.RemoveCode(checksum) + require.ErrorContains(t, err, "Wasm file does not exist") +} + func TestHappyPath(t *testing.T) { vm := withVM(t) checksum := createTestContract(t, vm, HACKATOM_TEST_CONTRACT) @@ -254,7 +270,7 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint32(0), metrics.HitsMemoryCache) require.Equal(t, uint32(1), metrics.HitsFsCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Instantiate 2 msg2 := []byte(`{"verifier": "fred", "beneficiary": "susi"}`) @@ -268,7 +284,7 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint32(1), metrics.HitsMemoryCache) require.Equal(t, uint32(1), metrics.HitsFsCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Pin err = vm.Pin(checksum) @@ -281,8 +297,8 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint32(1), metrics.HitsFsCache) require.Equal(t, uint64(1), metrics.ElementsPinnedMemoryCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizePinnedMemoryCache, 0.18) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizePinnedMemoryCache, 0.2) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Instantiate 3 msg3 := []byte(`{"verifier": "fred", "beneficiary": "bert"}`) @@ -298,8 +314,8 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint32(1), metrics.HitsFsCache) require.Equal(t, uint64(1), metrics.ElementsPinnedMemoryCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizePinnedMemoryCache, 0.18) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizePinnedMemoryCache, 0.2) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Unpin err = vm.Unpin(checksum) @@ -314,7 +330,7 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint64(0), metrics.ElementsPinnedMemoryCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) require.Equal(t, uint64(0), metrics.SizePinnedMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) // Instantiate 4 msg4 := []byte(`{"verifier": "fred", "beneficiary": "jeff"}`) @@ -331,5 +347,5 @@ func TestGetMetrics(t *testing.T) { require.Equal(t, uint64(0), metrics.ElementsPinnedMemoryCache) require.Equal(t, uint64(1), metrics.ElementsMemoryCache) require.Equal(t, uint64(0), metrics.SizePinnedMemoryCache) - require.InEpsilon(t, 5602873, metrics.SizeMemoryCache, 0.18) + require.InEpsilon(t, 4075417, metrics.SizeMemoryCache, 0.2) } diff --git a/libwasmvm/Cargo.lock b/libwasmvm/Cargo.lock index 1c49fbee1..b4a94f0dc 100644 --- a/libwasmvm/Cargo.lock +++ b/libwasmvm/Cargo.lock @@ -217,8 +217,8 @@ dependencies = [ [[package]] name = "cosmwasm-crypto" -version = "1.1.2" -source = "git+https://github.com/CosmWasm/cosmwasm.git?rev=v1.1.2#b102c15ded828343466d89bfec7198e62bc91d49" +version = "1.2.0-rc.1" +source = "git+https://github.com/CosmWasm/cosmwasm.git?rev=v1.2.0-rc.1#3cf3c67a267fefa3900083ca8ab9ca065fdf383b" dependencies = [ "digest 0.10.3", "ed25519-zebra", @@ -229,16 +229,16 @@ dependencies = [ [[package]] name = "cosmwasm-derive" -version = "1.1.2" -source = "git+https://github.com/CosmWasm/cosmwasm.git?rev=v1.1.2#b102c15ded828343466d89bfec7198e62bc91d49" +version = "1.2.0-rc.1" +source = "git+https://github.com/CosmWasm/cosmwasm.git?rev=v1.2.0-rc.1#3cf3c67a267fefa3900083ca8ab9ca065fdf383b" dependencies = [ "syn", ] [[package]] name = "cosmwasm-std" -version = "1.1.2" -source = "git+https://github.com/CosmWasm/cosmwasm.git?rev=v1.1.2#b102c15ded828343466d89bfec7198e62bc91d49" +version = "1.2.0-rc.1" +source = "git+https://github.com/CosmWasm/cosmwasm.git?rev=v1.2.0-rc.1#3cf3c67a267fefa3900083ca8ab9ca065fdf383b" dependencies = [ "base64", "cosmwasm-crypto", @@ -249,18 +249,22 @@ dependencies = [ "schemars", "serde", "serde-json-wasm", + "sha2 0.10.3", "thiserror", "uint", ] [[package]] name = "cosmwasm-vm" -version = "1.1.2" -source = "git+https://github.com/CosmWasm/cosmwasm.git?rev=v1.1.2#b102c15ded828343466d89bfec7198e62bc91d49" +version = "1.2.0-rc.1" +source = "git+https://github.com/CosmWasm/cosmwasm.git?rev=v1.2.0-rc.1#3cf3c67a267fefa3900083ca8ab9ca065fdf383b" dependencies = [ + "bitflags", + "bytecheck", "clru", "cosmwasm-crypto", "cosmwasm-std", + "enumset", "hex", "loupe", "parity-wasm", @@ -1323,9 +1327,9 @@ dependencies = [ [[package]] name = "serde-json-wasm" -version = "0.4.1" +version = "0.5.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "479b4dbc401ca13ee8ce902851b834893251404c4f3c65370a49e047a6be09a5" +checksum = "a15bee9b04dd165c3f4e142628982ddde884c2022a89e8ddf99c4829bf2c3a58" dependencies = [ "serde", ] diff --git a/libwasmvm/Cargo.toml b/libwasmvm/Cargo.toml index a72528b82..83e5feba6 100644 --- a/libwasmvm/Cargo.toml +++ b/libwasmvm/Cargo.toml @@ -26,8 +26,8 @@ default = [] backtraces = [] [dependencies] -cosmwasm-std = { git = "https://github.com/CosmWasm/cosmwasm.git", rev = "v1.1.2", features = ["staking", "stargate", "iterator"] } -cosmwasm-vm = { git = "https://github.com/CosmWasm/cosmwasm.git", rev = "v1.1.2", features = ["staking", "stargate", "iterator"] } +cosmwasm-std = { git = "https://github.com/CosmWasm/cosmwasm.git", rev = "v1.2.0-rc.1", features = ["staking", "stargate", "iterator"] } +cosmwasm-vm = { git = "https://github.com/CosmWasm/cosmwasm.git", rev = "v1.2.0-rc.1", features = ["staking", "stargate", "iterator"] } errno = "0.2" serde_json = "1.0" thiserror = "1.0" diff --git a/libwasmvm/bindings.h b/libwasmvm/bindings.h index 1d8c973e0..5f7e31f8b 100644 --- a/libwasmvm/bindings.h +++ b/libwasmvm/bindings.h @@ -313,6 +313,10 @@ struct UnmanagedVector save_wasm(struct cache_t *cache, struct ByteSliceView wasm, struct UnmanagedVector *error_msg); +void remove_wasm(struct cache_t *cache, + struct ByteSliceView checksum, + struct UnmanagedVector *error_msg); + struct UnmanagedVector load_wasm(struct cache_t *cache, struct ByteSliceView checksum, struct UnmanagedVector *error_msg); diff --git a/libwasmvm/src/cache.rs b/libwasmvm/src/cache.rs index 932361142..f55f4b6cf 100644 --- a/libwasmvm/src/cache.rs +++ b/libwasmvm/src/cache.rs @@ -54,7 +54,7 @@ fn do_init_cache( .read() .ok_or_else(|| Error::unset_arg(DATA_DIR_ARG))?; let dir_str = String::from_utf8(dir.to_vec())?; - // parse the supported features + // parse the supported capabilities let capabilities_bin = available_capabilities .read() .ok_or_else(|| Error::unset_arg(AVAILABLE_CAPABILITIES_ARG))?; @@ -104,6 +104,32 @@ fn do_save_wasm( Ok(checksum) } +#[no_mangle] +pub extern "C" fn remove_wasm( + cache: *mut cache_t, + checksum: ByteSliceView, + error_msg: Option<&mut UnmanagedVector>, +) { + let r = match to_cache(cache) { + Some(c) => catch_unwind(AssertUnwindSafe(move || do_remove_wasm(c, checksum))) + .unwrap_or_else(|_| Err(Error::panic())), + None => Err(Error::unset_arg(CACHE_ARG)), + }; + handle_c_error_default(r, error_msg) +} + +fn do_remove_wasm( + cache: &mut Cache, + checksum: ByteSliceView, +) -> Result<(), Error> { + let checksum: Checksum = checksum + .read() + .ok_or_else(|| Error::unset_arg(CHECKSUM_ARG))? + .try_into()?; + cache.remove_wasm(&checksum)?; + Ok(()) +} + #[no_mangle] pub extern "C" fn load_wasm( cache: *mut cache_t, @@ -340,12 +366,12 @@ mod tests { #[test] fn init_cache_and_release_cache_work() { let dir: String = TempDir::new().unwrap().path().to_str().unwrap().to_owned(); - let features = b"staking"; + let capabilities = b"staking"; let mut error_msg = UnmanagedVector::default(); let cache_ptr = init_cache( ByteSliceView::new(dir.as_bytes()), - ByteSliceView::new(features), + ByteSliceView::new(capabilities), 512, 32, Some(&mut error_msg), @@ -359,12 +385,12 @@ mod tests { #[test] fn init_cache_writes_error() { let dir: String = String::from("broken\0dir"); // null bytes are valid UTF8 but not allowed in FS paths - let features = b"staking"; + let capabilities = b"staking"; let mut error_msg = UnmanagedVector::default(); let cache_ptr = init_cache( ByteSliceView::new(dir.as_bytes()), - ByteSliceView::new(features), + ByteSliceView::new(capabilities), 512, 32, Some(&mut error_msg), @@ -372,18 +398,21 @@ mod tests { assert!(cache_ptr.is_null()); assert!(error_msg.is_some()); let msg = String::from_utf8(error_msg.consume().unwrap()).unwrap(); - assert_eq!(msg, "Error calling the VM: Cache error: Error creating directory broken\u{0}dir/state: data provided contains a nul byte"); + assert_eq!( + msg, + "Error calling the VM: Cache error: Error creating state directory" + ); } #[test] fn save_wasm_works() { let dir: String = TempDir::new().unwrap().path().to_str().unwrap().to_owned(); - let features = b"staking"; + let capabilities = b"staking"; let mut error_msg = UnmanagedVector::default(); let cache_ptr = init_cache( ByteSliceView::new(dir.as_bytes()), - ByteSliceView::new(features), + ByteSliceView::new(capabilities), 512, 32, Some(&mut error_msg), @@ -403,15 +432,69 @@ mod tests { release_cache(cache_ptr); } + #[test] + fn remove_wasm_works() { + let dir: String = TempDir::new().unwrap().path().to_str().unwrap().to_owned(); + let capabilities = b"staking"; + + let mut error_msg = UnmanagedVector::default(); + let cache_ptr = init_cache( + ByteSliceView::new(dir.as_bytes()), + ByteSliceView::new(capabilities), + 512, + 32, + Some(&mut error_msg), + ); + assert!(error_msg.is_none()); + let _ = error_msg.consume(); + + let mut error_msg = UnmanagedVector::default(); + let checksum = save_wasm( + cache_ptr, + ByteSliceView::new(HACKATOM), + Some(&mut error_msg), + ); + assert!(error_msg.is_none()); + let _ = error_msg.consume(); + let checksum = checksum.consume().unwrap_or_default(); + + // Removing once works + let mut error_msg = UnmanagedVector::default(); + remove_wasm( + cache_ptr, + ByteSliceView::new(&checksum), + Some(&mut error_msg), + ); + assert!(error_msg.is_none()); + let _ = error_msg.consume(); + + // Removing again fails + let mut error_msg = UnmanagedVector::default(); + remove_wasm( + cache_ptr, + ByteSliceView::new(&checksum), + Some(&mut error_msg), + ); + let error_msg = error_msg + .consume() + .map(|e| String::from_utf8_lossy(&e).into_owned()); + assert_eq!( + error_msg.unwrap(), + "Error calling the VM: Cache error: Wasm file does not exist" + ); + + release_cache(cache_ptr); + } + #[test] fn load_wasm_works() { let dir: String = TempDir::new().unwrap().path().to_str().unwrap().to_owned(); - let features = b"staking"; + let capabilities = b"staking"; let mut error_msg = UnmanagedVector::default(); let cache_ptr = init_cache( ByteSliceView::new(dir.as_bytes()), - ByteSliceView::new(features), + ByteSliceView::new(capabilities), 512, 32, Some(&mut error_msg), @@ -446,12 +529,12 @@ mod tests { #[test] fn pin_works() { let dir: String = TempDir::new().unwrap().path().to_str().unwrap().to_owned(); - let features = b"staking"; + let capabilities = b"staking"; let mut error_msg = UnmanagedVector::default(); let cache_ptr = init_cache( ByteSliceView::new(dir.as_bytes()), - ByteSliceView::new(features), + ByteSliceView::new(capabilities), 512, 32, Some(&mut error_msg), @@ -494,12 +577,12 @@ mod tests { #[test] fn unpin_works() { let dir: String = TempDir::new().unwrap().path().to_str().unwrap().to_owned(); - let features = b"staking"; + let capabilities = b"staking"; let mut error_msg = UnmanagedVector::default(); let cache_ptr = init_cache( ByteSliceView::new(dir.as_bytes()), - ByteSliceView::new(features), + ByteSliceView::new(capabilities), 512, 32, Some(&mut error_msg), @@ -551,12 +634,12 @@ mod tests { #[test] fn analyze_code_works() { let dir: String = TempDir::new().unwrap().path().to_str().unwrap().to_owned(); - let features = b"staking,stargate,iterator"; + let capabilities = b"staking,stargate,iterator"; let mut error_msg = UnmanagedVector::default(); let cache_ptr = init_cache( ByteSliceView::new(dir.as_bytes()), - ByteSliceView::new(features), + ByteSliceView::new(capabilities), 512, 32, Some(&mut error_msg), @@ -646,13 +729,13 @@ mod tests { #[test] fn get_metrics_works() { let dir: String = TempDir::new().unwrap().path().to_str().unwrap().to_owned(); - let features = b"staking"; + let capabilities = b"staking"; // Init cache let mut error_msg = UnmanagedVector::default(); let cache_ptr = init_cache( ByteSliceView::new(dir.as_bytes()), - ByteSliceView::new(features), + ByteSliceView::new(capabilities), 512, 32, Some(&mut error_msg), @@ -715,7 +798,7 @@ mod tests { assert_eq!(elements_memory_cache, 0); assert_approx_eq!( size_pinned_memory_cache, - 5602873, + 4075417, "0.2", "size_pinned_memory_cache: {size_pinned_memory_cache}" ); diff --git a/testdata/cyberpunk.wasm b/testdata/cyberpunk.wasm index 4c1993df9..ea4d73e85 100644 Binary files a/testdata/cyberpunk.wasm and b/testdata/cyberpunk.wasm differ diff --git a/testdata/hackatom.wasm b/testdata/hackatom.wasm index 7f38be271..ff73c20a5 100644 Binary files a/testdata/hackatom.wasm and b/testdata/hackatom.wasm differ diff --git a/testdata/ibc_reflect.wasm b/testdata/ibc_reflect.wasm index 03b0cd6d6..a4ba226c6 100644 Binary files a/testdata/ibc_reflect.wasm and b/testdata/ibc_reflect.wasm differ diff --git a/testdata/queue.wasm b/testdata/queue.wasm index 9d786cd09..c3f22866d 100644 Binary files a/testdata/queue.wasm and b/testdata/queue.wasm differ diff --git a/testdata/reflect.wasm b/testdata/reflect.wasm index 16a33decc..6aeb62000 100644 Binary files a/testdata/reflect.wasm and b/testdata/reflect.wasm differ diff --git a/types/checksum.go b/types/checksum.go new file mode 100644 index 000000000..7519c1df2 --- /dev/null +++ b/types/checksum.go @@ -0,0 +1,47 @@ +package types + +import ( + "encoding/hex" + "encoding/json" + "fmt" +) + +// Checksum represents a hash of the Wasm bytecode that serves as an ID. Must be generated from this library. +type Checksum []byte + +func (cs Checksum) MarshalJSON() ([]byte, error) { + return json.Marshal(hex.EncodeToString(cs)) +} + +func (cs *Checksum) UnmarshalJSON(input []byte) error { + var hexString string + err := json.Unmarshal(input, &hexString) + if err != nil { + return err + } + + data, err := hex.DecodeString(hexString) + if err != nil { + return err + } + if len(data) != checksumLen { + return fmt.Errorf("got wrong number of bytes for checksum") + } + *cs = Checksum(data) + return nil +} + +const checksumLen = 32 + +// ForceNewChecksum creates a Checksum instance from a hex string. +// It panics in case the input is invalid. +func ForceNewChecksum(input string) Checksum { + data, err := hex.DecodeString(input) + if err != nil { + panic("could not decode hex bytes") + } + if len(data) != checksumLen { + panic("got wrong number of bytes") + } + return Checksum(data) +} diff --git a/types/msg.go b/types/msg.go index 745fd2612..756bca11f 100644 --- a/types/msg.go +++ b/types/msg.go @@ -135,13 +135,30 @@ type IBCMsg struct { type GovMsg struct { // This maps directly to [MsgVote](https://github.com/cosmos/cosmos-sdk/blob/v0.42.5/proto/cosmos/gov/v1beta1/tx.proto#L46-L56) in the Cosmos SDK with voter set to the contract address. Vote *VoteMsg `json:"vote,omitempty"` + /// This maps directly to [MsgVoteWeighted](https://github.com/cosmos/cosmos-sdk/blob/v0.45.8/proto/cosmos/gov/v1beta1/tx.proto#L66-L78) in the Cosmos SDK with voter set to the contract address. + VoteWeighted *VoteWeightedMsg `json:"vote_weighted,omitempty"` } type voteOption int type VoteMsg struct { - ProposalId uint64 `json:"proposal_id"` - Vote voteOption `json:"vote"` + ProposalId uint64 `json:"proposal_id"` + // Vote is the vote option. + // + // This should be called "option" for consistency with Cosmos SDK. Sorry for that. + // See . + Vote voteOption `json:"vote"` +} + +type VoteWeightedMsg struct { + ProposalId uint64 `json:"proposal_id"` + Options []WeightedVoteOption `json:"options"` +} + +type WeightedVoteOption struct { + Option voteOption `json:"option"` + // Weight is a Decimal string, e.g. "0.25" for 25% + Weight string `json:"weight"` } const ( @@ -254,11 +271,12 @@ type StargateMsg struct { } type WasmMsg struct { - Execute *ExecuteMsg `json:"execute,omitempty"` - Instantiate *InstantiateMsg `json:"instantiate,omitempty"` - Migrate *MigrateMsg `json:"migrate,omitempty"` - UpdateAdmin *UpdateAdminMsg `json:"update_admin,omitempty"` - ClearAdmin *ClearAdminMsg `json:"clear_admin,omitempty"` + Execute *ExecuteMsg `json:"execute,omitempty"` + Instantiate *InstantiateMsg `json:"instantiate,omitempty"` + Instantiate2 *Instantiate2Msg `json:"instantiate2,omitempty"` + Migrate *MigrateMsg `json:"migrate,omitempty"` + UpdateAdmin *UpdateAdminMsg `json:"update_admin,omitempty"` + ClearAdmin *ClearAdminMsg `json:"clear_admin,omitempty"` } // ExecuteMsg is used to call another defined contract on this chain. @@ -285,7 +303,23 @@ type InstantiateMsg struct { // CodeID is the reference to the wasm byte code as used by the Cosmos-SDK CodeID uint64 `json:"code_id"` // Msg is assumed to be a json-encoded message, which will be passed directly - // as `userMsg` when calling `Init` on a new contract with the above-defined CodeID + // as `userMsg` when calling `Instantiate` on a new contract with the above-defined CodeID + Msg []byte `json:"msg"` + // Send is an optional amount of coins this contract sends to the called contract + Funds Coins `json:"funds"` + // Label is optional metadata to be stored with a contract instance. + Label string `json:"label"` + // Admin (optional) may be set here to allow future migrations from this address + Admin string `json:"admin,omitempty"` +} + +// Instantiate2Msg will create a new contract instance from a previously uploaded CodeID +// using the predictable address derivation. +type Instantiate2Msg struct { + // CodeID is the reference to the wasm byte code as used by the Cosmos-SDK + CodeID uint64 `json:"code_id"` + // Msg is assumed to be a json-encoded message, which will be passed directly + // as `userMsg` when calling `Instantiate` on a new contract with the above-defined CodeID Msg []byte `json:"msg"` // Send is an optional amount of coins this contract sends to the called contract Funds Coins `json:"funds"` @@ -293,6 +327,7 @@ type InstantiateMsg struct { Label string `json:"label"` // Admin (optional) may be set here to allow future migrations from this address Admin string `json:"admin,omitempty"` + Salt []byte `json:"salt"` } // MigrateMsg will migrate an existing contract from it's current wasm code (logic) diff --git a/types/msg_test.go b/types/msg_test.go new file mode 100644 index 000000000..1dc89abe1 --- /dev/null +++ b/types/msg_test.go @@ -0,0 +1,109 @@ +package types + +import ( + "encoding/json" + "testing" + + "github.com/stretchr/testify/require" +) + +func TestWasmMsgInstantiateSerialization(t *testing.T) { + // no admin + document := []byte(`{"instantiate":{"admin":null,"code_id":7897,"msg":"eyJjbGFpbSI6e319","funds":[{"denom":"stones","amount":"321"}],"label":"my instance"}}`) + + var msg WasmMsg + err := json.Unmarshal(document, &msg) + require.NoError(t, err) + + require.Nil(t, msg.Instantiate2) + require.Nil(t, msg.Execute) + require.Nil(t, msg.Migrate) + require.Nil(t, msg.UpdateAdmin) + require.Nil(t, msg.ClearAdmin) + require.NotNil(t, msg.Instantiate) + + require.Equal(t, "", msg.Instantiate.Admin) + require.Equal(t, uint64(7897), msg.Instantiate.CodeID) + require.Equal(t, []byte(`{"claim":{}}`), msg.Instantiate.Msg) + require.Equal(t, Coins{ + {"stones", "321"}, + }, msg.Instantiate.Funds) + require.Equal(t, "my instance", msg.Instantiate.Label) + + // admin + document2 := []byte(`{"instantiate":{"admin":"king","code_id":7897,"msg":"eyJjbGFpbSI6e319","funds":[],"label":"my instance"}}`) + + err2 := json.Unmarshal(document2, &msg) + require.NoError(t, err2) + + require.Nil(t, msg.Instantiate2) + require.Nil(t, msg.Execute) + require.Nil(t, msg.Migrate) + require.Nil(t, msg.UpdateAdmin) + require.Nil(t, msg.ClearAdmin) + require.NotNil(t, msg.Instantiate) + + require.Equal(t, "king", msg.Instantiate.Admin) + require.Equal(t, uint64(7897), msg.Instantiate.CodeID) + require.Equal(t, []byte(`{"claim":{}}`), msg.Instantiate.Msg) + require.Equal(t, Coins{ + {"stones", "321"}, + }, msg.Instantiate.Funds) + require.Equal(t, "my instance", msg.Instantiate.Label) +} + +func TestWasmMsgInstantiate2Serialization(t *testing.T) { + document := []byte(`{"instantiate2":{"admin":null,"code_id":7897,"label":"my instance","msg":"eyJjbGFpbSI6e319","funds":[{"denom":"stones","amount":"321"}],"salt":"UkOVazhiwoo="}}`) + + var msg WasmMsg + err := json.Unmarshal(document, &msg) + require.NoError(t, err) + + require.Nil(t, msg.Instantiate) + require.Nil(t, msg.Execute) + require.Nil(t, msg.Migrate) + require.Nil(t, msg.UpdateAdmin) + require.Nil(t, msg.ClearAdmin) + require.NotNil(t, msg.Instantiate2) + + require.Equal(t, "", msg.Instantiate2.Admin) + require.Equal(t, uint64(7897), msg.Instantiate2.CodeID) + require.Equal(t, []byte(`{"claim":{}}`), msg.Instantiate2.Msg) + require.Equal(t, Coins{ + {"stones", "321"}, + }, msg.Instantiate2.Funds) + require.Equal(t, "my instance", msg.Instantiate2.Label) + require.Equal(t, []byte{0x52, 0x43, 0x95, 0x6b, 0x38, 0x62, 0xc2, 0x8a}, msg.Instantiate2.Salt) +} + +func TestGovMsgVoteSerialization(t *testing.T) { + document := []byte(`{"vote":{"proposal_id":4,"vote":"no_with_veto"}}`) + + var msg GovMsg + err := json.Unmarshal(document, &msg) + require.NoError(t, err) + + require.Nil(t, msg.VoteWeighted) + require.NotNil(t, msg.Vote) + + require.Equal(t, uint64(4), msg.Vote.ProposalId) + require.Equal(t, NoWithVeto, msg.Vote.Vote) +} + +func TestGovMsgVoteWeightedSerialization(t *testing.T) { + document := []byte(`{"vote_weighted":{"proposal_id":25,"options":[{"option":"yes","weight":"0.25"},{"option":"no","weight":"0.25"},{"option":"abstain","weight":"0.5"}]}}`) + + var msg GovMsg + err := json.Unmarshal(document, &msg) + require.NoError(t, err) + + require.Nil(t, msg.Vote) + require.NotNil(t, msg.VoteWeighted) + + require.Equal(t, uint64(25), msg.VoteWeighted.ProposalId) + require.Equal(t, []WeightedVoteOption{ + {Yes, "0.25"}, + {No, "0.25"}, + {Abstain, "0.5"}, + }, msg.VoteWeighted.Options) +} diff --git a/types/queries.go b/types/queries.go index d368d4f44..db7e01ecd 100644 --- a/types/queries.go +++ b/types/queries.go @@ -352,6 +352,7 @@ type WasmQuery struct { Smart *SmartQuery `json:"smart,omitempty"` Raw *RawQuery `json:"raw,omitempty"` ContractInfo *ContractInfoQuery `json:"contract_info,omitempty"` + CodeInfo *CodeInfoQuery `json:"code_info,omitempty"` } // SmartQuery response is raw bytes ([]byte) @@ -382,3 +383,13 @@ type ContractInfoResponse struct { // Set if the contract is IBC enabled IBCPort string `json:"ibc_port,omitempty"` } + +type CodeInfoQuery struct { + CodeID uint64 `json:"code_id"` +} + +type CodeInfoResponse struct { + CodeID uint64 `json:"code_id"` + Creator string `json:"creator"` + Checksum Checksum `json:"checksum,omitempty"` +} diff --git a/types/queries_test.go b/types/queries_test.go index edeca8d7e..ea1abf386 100644 --- a/types/queries_test.go +++ b/types/queries_test.go @@ -113,3 +113,69 @@ func TestQueryResponseWithEmptyData(t *testing.T) { }) } } + +func TestWasmQuerySerialization(t *testing.T) { + var err error + + // ContractInfo + document := []byte(`{"contract_info":{"contract_addr":"aabbccdd456"}}`) + var query WasmQuery + err = json.Unmarshal(document, &query) + require.NoError(t, err) + + require.Nil(t, query.Smart) + require.Nil(t, query.Raw) + require.Nil(t, query.CodeInfo) + require.NotNil(t, query.ContractInfo) + require.Equal(t, "aabbccdd456", query.ContractInfo.ContractAddr) + + // CodeInfo + document = []byte(`{"code_info":{"code_id":70}}`) + query = WasmQuery{} + err = json.Unmarshal(document, &query) + require.NoError(t, err) + + require.Nil(t, query.Smart) + require.Nil(t, query.Raw) + require.Nil(t, query.ContractInfo) + require.NotNil(t, query.CodeInfo) + require.Equal(t, uint64(70), query.CodeInfo.CodeID) +} + +func TestContractInfoResponseSerialization(t *testing.T) { + document := []byte(`{"code_id":67,"creator":"jane","admin":"king","pinned":true,"ibc_port":"wasm.123"}`) + var res ContractInfoResponse + err := json.Unmarshal(document, &res) + require.NoError(t, err) + + require.Equal(t, ContractInfoResponse{ + CodeID: uint64(67), + Creator: "jane", + Admin: "king", + Pinned: true, + IBCPort: "wasm.123", + }, res) +} + +func TestCodeInfoResponseSerialization(t *testing.T) { + // Deserializaton + document := []byte(`{"code_id":67,"creator":"jane","checksum":"f7bb7b18fb01bbf425cf4ed2cd4b7fb26a019a7fc75a4dc87e8a0b768c501f00"}`) + var res CodeInfoResponse + err := json.Unmarshal(document, &res) + require.NoError(t, err) + require.Equal(t, CodeInfoResponse{ + CodeID: uint64(67), + Creator: "jane", + Checksum: ForceNewChecksum("f7bb7b18fb01bbf425cf4ed2cd4b7fb26a019a7fc75a4dc87e8a0b768c501f00"), + }, res) + + // Serialization + myRes := CodeInfoResponse{ + CodeID: uint64(0), + Creator: "sam", + Checksum: ForceNewChecksum("ea4140c2d8ff498997f074cbe4f5236e52bc3176c61d1af6938aeb2f2e7b0e6d"), + } + serialized, err := json.Marshal(&myRes) + require.NoError(t, err) + require.Equal(t, `{"code_id":0,"creator":"sam","checksum":"ea4140c2d8ff498997f074cbe4f5236e52bc3176c61d1af6938aeb2f2e7b0e6d"}`, string(serialized)) +} diff --git a/types/systemerror.go b/types/systemerror.go index c6e4921ce..c7ca32029 100644 --- a/types/systemerror.go +++ b/types/systemerror.go @@ -11,6 +11,7 @@ type SystemError struct { InvalidRequest *InvalidRequest `json:"invalid_request,omitempty"` InvalidResponse *InvalidResponse `json:"invalid_response,omitempty"` NoSuchContract *NoSuchContract `json:"no_such_contract,omitempty"` + NoSuchCode *NoSuchCode `json:"no_such_code,omitempty"` Unknown *Unknown `json:"unknown,omitempty"` UnsupportedRequest *UnsupportedRequest `json:"unsupported_request,omitempty"` } @@ -32,6 +33,8 @@ func (a SystemError) Error() string { return a.InvalidResponse.Error() case a.NoSuchContract != nil: return a.NoSuchContract.Error() + case a.NoSuchCode != nil: + return a.NoSuchCode.Error() case a.Unknown != nil: return a.Unknown.Error() case a.UnsupportedRequest != nil: @@ -67,6 +70,14 @@ func (e NoSuchContract) Error() string { return fmt.Sprintf("no such contract: %s", e.Addr) } +type NoSuchCode struct { + CodeID uint64 `json:"code_id,omitempty"` +} + +func (e NoSuchCode) Error() string { + return fmt.Sprintf("no such code: %d", e.CodeID) +} + type Unknown struct{} func (e Unknown) Error() string { @@ -111,6 +122,10 @@ func ToSystemError(err error) *SystemError { return &SystemError{NoSuchContract: &t} case *NoSuchContract: return &SystemError{NoSuchContract: t} + case NoSuchCode: + return &SystemError{NoSuchCode: &t} + case *NoSuchCode: + return &SystemError{NoSuchCode: t} case Unknown: return &SystemError{Unknown: &t} case *Unknown: diff --git a/types/systemerror_test.go b/types/systemerror_test.go new file mode 100644 index 000000000..5f45c7404 --- /dev/null +++ b/types/systemerror_test.go @@ -0,0 +1,54 @@ +package types + +import ( + "encoding/json" + "testing" + + "github.com/stretchr/testify/require" +) + +func TestSystemErrorNoSuchContractSerialization(t *testing.T) { + // Deserializaton + document := []byte(`{"no_such_contract":{"addr":"nada"}}`) + var se SystemError + err := json.Unmarshal(document, &se) + require.NoError(t, err) + require.Equal(t, SystemError{ + NoSuchContract: &NoSuchContract{ + Addr: "nada", + }, + }, se) + + // Serialization + mySE := SystemError{ + NoSuchContract: &NoSuchContract{ + Addr: "404", + }, + } + serialized, err := json.Marshal(&mySE) + require.NoError(t, err) + require.Equal(t, `{"no_such_contract":{"addr":"404"}}`, string(serialized)) +} + +func TestSystemErrorNoSuchCodeSerialization(t *testing.T) { + // Deserializaton + document := []byte(`{"no_such_code":{"code_id":987}}`) + var se SystemError + err := json.Unmarshal(document, &se) + require.NoError(t, err) + require.Equal(t, SystemError{ + NoSuchCode: &NoSuchCode{ + CodeID: uint64(987), + }, + }, se) + + // Serialization + mySE := SystemError{ + NoSuchCode: &NoSuchCode{ + CodeID: uint64(321), + }, + } + serialized, err := json.Marshal(&mySE) + require.NoError(t, err) + require.Equal(t, `{"no_such_code":{"code_id":321}}`, string(serialized)) +}